HK273 Raphael's Fatal Mistake! (7/42)
. Twelve formal security expert teams and twenty-seven preparatory expert teams from the International Intelligence Agency of the Ministry of Foreign Affairs are engaged in the core servers of the Tokyo Metropolitan Self-Defense Forces, entangled with endless defenses, and have the ambition to capture Mr. M.
But they didn't know what to do, this was simply a trap set by Shi Lei!
The defense mechanism of Endless Defense is very simple, and there will only be two basic moves, reject and delete.
If you come in through port intrusion or disguise normal access, it will be denied. Trojan horses, viruses, malicious packets, and junk packets are deleted.
It's a simple way to defend yourself, but it's very useful.
The simpler the way, the less resources it occupies on the computer, the faster the response speed, and the higher the load pressure capacity!
To give a simple example, there are three main ways for ordinary mainstream antivirus software on the market to determine whether an unknown file is a virus.
The first is the most common, and it is also the characteristic code structure judgment that all antivirus software has. Major security vendors, from the arrangement of a large number of honeypot systems, captured virus samples, analyzed the signature codes of the virus, and then established a huge database of virus signatures. When a suspicious file is found, the unknown file structure is analyzed first, including a series of shelling techniques, to obtain the signature code of the unknown file, which is compared with the virus signature of the virus database to confirm whether it is a virus file.
In this way, there is a very popular cloud security in later generations, which is actually the signature code of an unknown file uploaded by the antivirus software, and the virus signature database on the server side is compared to whether it is a virus. It's still just a comparison of the most basic and common feature codes, hyped up into some cloud security, boasting about something that fools people!
The second way is the gene code, which is an upgrade system of the feature code. In fact, it is also a feature code. Each signature code can only correspond to one virus, but one gene code can correspond to one gene series virus.
Although it is the same as the nature of the signature code, the gene code effectively reduces the amount of data in the virus signature database.
The third method is called heuristic, and the principle of this method is somewhat related to Endless Defense. It compares the difference between an unknown file and a normal program to determine whether a file is a virus or not.
There are two types of heuristics, one is dynamic heuristics and the other is static heuristics. Static heuristics are used to decompile a sequence of static code instructions to understand the true motives of an unknown program and determine whether it is a virus.
Dynamic Inspiration is a sandbox technique that uses antivirus software to create a sandbox environment. Run an unknown file in a sandbox to see what the unknown program does to determine if it's a virus.
One of the big drawbacks of dynamic heuristics is that setting up a sandbox environment consumes a lot of system resources, resulting in a lack of computer system resources. Cause sluggishness and jamming in normal operation.
Kaspersky is doing a great job in this area, and it has the best antivirus. But as its name suggests. Also known as 'card explosion crash'!
From the above three ways, it shows that in either way, it takes a lot of work to determine whether an unknown file is a virus program or not. Doing a lot of work will take up a lot of system resources, whether it is CPU computing resources. Memory storage resources, or other system resources.
It occupies a lot of system resources, resulting in poor load capacity of computer equipment, which is slightly more serious. It will make the computer device freeze or even freeze!
And Endless Defense has only one step to determine if an unknown file is a virus!
Just make sure it's a protected file or not!
If not, delete it directly, no more operations are required, and the pressure on the system is much reduced.
So, in the face of the thirty-nine groups, the security experts of the International Intelligence Agency of the Ministry of Foreign Affairs, the endless defense was topped!
After Shi Lei inspected the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs, he combined the supercomputer Yan and the No. 3 server to form a cluster server based on the No. 1 server to jointly attack the official website web server.
Since the official website of the International Intelligence Agency of the Ministry of Foreign Affairs adopts Microsoft's IIS server and uses asp.net technology to build, Shi Lei has a very deep understanding of Microsoft's system!
Controlling the supercomputer Yan without raising any alarms, Shi Lei obtained low-level privileges from the web server. Then, on the basis of low-level permissions, slowly escalate permissions.
Obtaining low-level privileges first, and then escalating privileges, is safer in some cases than directly obtaining super-privileges in one step. In particular, when Shi Lei scanned the web server of the International Intelligence Bureau of the Ministry of Foreign Affairs, he found an alarm mechanism connected to the internal local area network, and it was controlled separately, so it was difficult to remove it.
The International Intelligence Agency of the Ministry of Foreign Affairs, as the largest intelligence agency in the country of Vozsan, belongs to the internal network, and only a few nodes are connected to the external Internet.
The connection of the web server is a node.
It's just that when Shi Lei obtained super permission, he finally found a big problem!
'Damn, it's one-way data!' Shi Lei snorted coldly in his heart.
The so-called one-way data is a derivative of a one-way link web page technique. If the web server of the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs is considered A, the internal data server of the International Intelligence Bureau of the Ministry of Foreign Affairs is considered B.
One-way data means that B can access A, can transmit data to A, can view all cases of A, but A cannot transmit data to B, nor can B browse.
Even if A's data service request is stored in A, B arrives at A to access and read, and then replies to the corresponding data request.
If it is an ordinary hacker, there is no way to see this kind of one-way data, after all, web server A cannot send any data to internal server B, and can only be explored by server B independently.
However, Shi Lei is the pinnacle hacker in the world, even if it is one-way data that can block many people, but among the people who block, Shi Lei is definitely not included!
Shi Lei directly entered more than 100 lines of code in the web server, and then chose to execute the code.
These more than 100 lines of executed code, a total of more than a dozen data requests, will cause a memory overflow to the International Intelligence Agency of the Ministry of Foreign Affairs. The data server of the internal LAN is interrupted instantaneously.
At the moment of service interruption, the one-way data restriction is lifted, and two-way data communication is resumed.
This time course is short, because the memory of the data server, unlike that of a regular personal computer, is ECC memory, which has error checking and correction functions.
After the memory data overflows, the ECC memory will automatically correct the error, and Shi Lei must before the ECC memory is restored. Access to the internal LAN of the International Intelligence Agency of the Ministry of Foreign Affairs.
Shi Lei owns the supercomputer Yan, and also connects to the No. 3 server of Pukong Company, and through the special cluster system of the No. 1 server, the two supercomputing resources are gathered together, and quickly invades the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs.
Enter the International Intelligence Bureau of the Ministry of Foreign Affairs. Shi Lei did not act rashly, nor did he attempt to tamper with the data. Rather, it is a backdoor that will be written in advance. Implanted in the bottom layer of the system of the International Intelligence Agency of the Ministry of Foreign Affairs.
Because last time, for the permission of the Robot plan, Shi Lei had entered the International Intelligence Bureau of the Ministry of Foreign Affairs, and he clearly knew the server situation of the International Intelligence Bureau of the Ministry of Foreign Affairs.
Therefore, the backdoor program written by Shi Lei this time uses assembly language. Directly sinking into the bottom layer of the system, it is very hidden and inconspicuous, which is convenient for the next entry into the International Intelligence Bureau of the Ministry of Foreign Affairs.
After dealing with the backdoor procedures, Shi Lei prepared to work at the International Intelligence Bureau of the Ministry of Foreign Affairs. A top-secret database of the intelligence services to see if they have any information they need.
However, just as Shi Lei was about to check the top-secret database, the web server of the International Intelligence Bureau of the Ministry of Foreign Affairs was attacked again!
If it was just an attack, it would have been forgotten, but that idiot hacker actually forcibly attacked the web server without any concealment of his actions.
Not only that, but the new hacker, after obtaining low-level permissions, actually directly tampered with the official website of the International Intelligence Agency of the Ministry of Foreign Affairs and publicly left a message to provoke!
'Mr. M, aren't you that awesome?' How did you get besieged by the International Intelligence Agency of the Ministry of Foreign Affairs? The great Raphael is waiting for you here, dare to come? —Raphael
Shi Lei looked at this message and almost vomited blood in anger!
What is the narrow road of the enemy, what is self-defeating, this is the moment!
Raphael thought that Shi Lei's Mr. M vest was under collective siege by the International Intelligence Agency of the Ministry of Foreign Affairs in the Tokyo Self-Defense Forces. Taking advantage of this opportunity, Raphael flaunted his military might, hacked the official website of the International Intelligence Agency of the Ministry of Foreign Affairs, and left behind a language that humiliated Mr. M.
Unbeknownst to him, this self-defeating incident caused an alarm from the International Intelligence Bureau of the Ministry of Foreign Affairs and the web server, and the experts of the International Intelligence Bureau of the Ministry of Foreign Affairs were alerted and would definitely return to their lair.
In this way, Shi Lei's invasion of the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs will definitely be exposed.
Annoyed and angry, Shi Lei quickly returned to the web server, found Rafael's connection IP address record, and prepared to save this record, and then left it in the web server, so that the International Intelligence Bureau of the Ministry of Foreign Affairs could deal with Raphael.
However, Raphael's slut is worthy of being a top-level hacker in the world, and he is actually copying Shi Lei's connection IP address record with Shi Lei's thoughts!
'Raphael, shit, you force me! Shi Lei was annoyed in his heart, and did not alarm Raphael, but found the top secret information of the intelligence department in the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs, and selected a file called "SO Plan" in it, disguised as an attempt to view and copy the operation.
Then change the connection IP address to Raphael's connection IP address!
On the web server, Shi Lei pretended not to find out about Raphael's actions, and asked Raphael to reserve the IP address of his temporary broiler connection in the system record.
Raphael also thought that he had done it perfectly and was not discovered by Shi Lei.
It's just that Raphael made a fatal mistake!.
(To be continued.) )
PS: Please subscribe to "Hackers" within 24 hours and give Shanshan positive energy! This month's update method, 3 shifts in a single day, 4 shifts in two days, and the old rules of time are 0 o'clock, 12 o'clock, 16 o'clock, and 20 o'clock. Please, everyone! Let's take Hackers even further! ——[Thanks] Lonely Night Fan, Tell the Star Shower 1, Tip 588.Friend 0402, Top Secret Flight, Eternlty, Tip 100.