Chapter 204: It Turned Out to Be You
Zhao Weiju is a rather arrogant person, and he does have arrogant capital.
In terms of hacker network security technology, Zhao Weiju can definitely rank among the top 100 in the domestic hacker circle, and he can be regarded as a person.
And he has never given up on learning hacking knowledge.
Because Zhao Weiju knows that he can be ranked in the domestic hacker circle, but on a global scale, his level can only be regarded as the upstream level, not the top.
Therefore, as long as Zhao Weiju is free, he will learn all kinds of programs and software that have just come out on the Internet, and try to fix vulnerabilities while looking for them.
Every time Zhao Weiju fixes a vulnerability, he is very happy, just like a victorious general who has won a big battle.
But how many technologies are there?
The Internet is constantly being updated, and new software, games, and functional aids are popping up almost every other day, which means that new vulnerabilities are created every day.
And those software that has been released for a long time are constantly being updated, which is another source of vulnerabilities.
Therefore, Zhao Weiju felt that the efficiency of slowly finding loopholes by himself was too low.
"If I can find a place for hackers to communicate, maybe I can get a vulnerability that I don't know about much faster, much faster than if I was studying it slowly by myself."
So after work, he used a VPN proxy at home to circumvent the wall, and entered a forum website specially set up for hackers - the Black and Red Alliance Forum.
On this website, Zhao Weiju gave himself an ID, named: Jifu Lao Zhao.
Of course, Zhao Weiju didn't want to violate the discipline of the Security Bureau, he just wanted to keep learning and improving his hacking skills within reasonable rules.
Hacker forums are not only mixed, many people are very realistic, and it is impossible to casually tell you about the vulnerabilities they have found.
Because every vulnerability may have the value of being exploited!
So, in order to learn more about the vulnerabilities, Zhao Weiju pretended to be a businessman who bought the vulnerabilities on the Internet many times, and used the trial version of the vulnerability software sent by the hacker to reverse program them to find the vulnerabilities and try to fix them.
After fixing the vulnerability, Zhao Weiju sold the vulnerability patch to the original software developer at an extremely low price, helping them improve software security while earning some extra money to supplement their families.
No way, the salary of the Security Service is simply too low.
In this way, Zhao Weiju not only learned more loopholes, but also brought himself a lot of extra income.
And what he did did not violate the regulations of the Security Bureau, but rather contributed to cyber security!
I have to say that Zhao Weiju's method is really easy to use.
However, just two weeks ago.
When Zhao Weiju was wandering around the forum, he accidentally discovered that someone was selling the vulnerability of today's most popular web farming game.
When Zhao Weiju first saw the title of the post, he hadn't taken it seriously.
Because there are so many web farming games nowadays, there are page farming games on several portals and social networking sites.
In addition, he himself is most aware of the loopholes in web games, because he is a person who likes to play web games, "It's nothing more than those few methods." β
Zhao Weiju was still thinking at the time, who would buy a plug-in for a page game?
However, out of a learning mentality, Zhao Weiju still downloaded the trial version of the plug-in that "Mr. C" put in the post.
When I used the trial version of the plug-in for the first time, Zhao Weiju found that the technology used in this plug-in was very simple, "The other party's plug-in uses network packet deception technology, this kind of false packet can only deceive the system but not people, and if it is used for a long time, it must be noticed by the administrator." β
Zhao Weiju was still wondering at the time, why did the other party dare to shout such a high price for such a simple plug-in, and still did not accept the buyout price and asked for a weekly sales share?
Subsequently, Zhao Weiju discovered a very magical thing.
The plug-in program I just downloaded stopped running, and a pop-up message was sent, which read: "The trial version has arrived, if you need to use it, please contact the publisher to buy a genuine CD-Key." β
"Buy a genuine CD-Key?" When Zhao Weiju saw this pop-up window, he was stunned.
Then he reacted.
Make no mistake!
Hey, you're a cheat! It's not a genuine game!
Zhao Weiju immediately began to analyze and investigate this plug-in, "This plug-in did not have a Trojan virus during operation, nor did it receive external commands, how could it stop running by itself?" β
Half an hour later......
"It turns out that this is the case, and the other party uses the time node to trigger the stop operation."
Zhao Weiju thought that he had discovered the technology used by the other party, so he directly adjusted the system time back to the time node where he had just downloaded the plug-in.
Click on the plug-in again......
"Still unresponsive?"
So Zhao Weiju discovered a very interesting technology, after the other party's plug-in trigger stopped running, this trigger was actually irreversible!
"It's a little interesting, no wonder I dare to shout a high price, this is the first time I've seen this kind of technology."
Subsequently, Zhao Weiju once again pretended to be a plug-in businessman and sent a station letter to the guy who posted the farm plug-in and was nicknamed "Mr. C" on the forum. (Chen's ID in the hacker forum is the same as Dream Game Theory's, also known as "Mr. C.") οΌ
However, in the conversation with the other party, Zhao Weiju discovered some new uses of some small technologies added by the other party.
"The encryption lock program of the envelope is very strange, and it must have been designed by the other party himself."
In addition to marveling at the new technology used by the other party, Zhao Weiju also admired the imagination of the other party.
"You can actually use the form of CD-Key,Count the sales volume,You can also activate and stop the operation of the plug-in software at any time,This anti-piracy software technology,Generally, it is always in a stand-alone game,I didn't expect the other party to use it in a plug-in program,This usage absolutely breaks through the conventional mode of thinkingγ
So, in order to thoroughly master the other party's technology of making plug-ins, Zhao Weiju gritted his teeth and said directly to the other party: "Can this share be changed?" Three-seven? β
However, the other party didn't seem interested in bargaining, and directly refused: "It's over, the share can't be less, if you are interested in the software, then contact me." β
Zhao Weiju wanted to study the other party's technical means very much, and there was no other way for a while, so he directly chose to compromise: "OK, OK, I'll just talk about it casually, it's no problem to divide it, can I try your plug-in first?" Also, How do I pay you? I would like to explain in advance that I will not be responsible for the handling fee if it is a remittance to an overseas bank......"
In fact, Zhao Weiju said this, but also hid a heart, "Maybe the other party is just more clever in plug-in technology, and the concealment technology may not be very good, as long as I can get the other party's bank account, I can follow the vine and touch the melon......"
But it's a pity that Zhao Weiju's idea was shattered again, the other party didn't want the money in reality, what did he want...... That's right, Futcoin!
"What the hell!"
This virtual currency is completely generated by a special algorithm, which is commonly known as "mining" in the industry.
In Zhao Weiju's opinion, this is something that low-level programmers only play, and he won't touch it at all!
Zhao Weiju had no choice but to buy a bunch of Richcoin out of his own pocket, and then buy a large number of CD-Key activation codes by himself, and then continue to research the plug-in software.
It's a pity that Zhao Weiju has been studying for two weeks, and so far he has only solved the cracking of the envelope technology loophole, and after providing it to Penguin, the other party's plug-in software was able to change the encrypted content of the envelope in the first time, which is obviously a new algorithm.
Zhao Weiju's mood at that time can be imagined......
So, Zhao Weiju knew that he had met a master this time.
Zhao Weiju has been searching on the Internet recently, which hacker master has a nickname called "Mr. C." β
However, before he could find this master of cheating, this morning, the bureau issued another task.
The task seems to be urgent, return to the Security Bureau as soon as possible, which makes Zhao Weiju very unhappy.
However, Zhao Weiju still hurried back in accordance with the requirements of the leader, but it was a pity that he was on the night shift yesterday, and this head has not fallen on the pillow!
At that time, Zhao Weiju slandered in his heart: "It is estimated that the second generation of which family is causing trouble, let's wipe the on the Internet." β
Zhao Weiju knew that the security bureau where he was located was just a sub-bureau, and the twenty-four technicians in the technical department usually had no important work, and even if there was important work, it was similar to deleting posts.
However, when Zhao Weiju arrived in the bureau, he felt that this mission was a little different.
Listening to the tone of the head of the department, this task is quite important, not to mention the high level of secrecy, it is still very urgent, and everyone is required to arrive at the bureau within half an hour.
Immediately afterwards, before Zhao Weiju could understand the cause of the incident, he was assigned work by the head of the department, "Xiao Zhao, your defense technology is one of the best in the department, you lead your first group to defend the work, and all the addresses that need to be defended have been sent to your work mailbox, you can take a look." β
"Defense?"
An incredible word came out of the mouth of the person in charge of technology, which surprised Zhao Weiju, and secretly wondered in his heart: "Is it the hackers of the Dongying Kingdom next to him making trouble, or the ...... on the other side of the Atlantic?"
However, there is a confidentiality system in the bureau, and since the leader has issued a work request, it can be implemented, so don't ask too much.
So, Zhao Weiju immediately sat in his seat and began to check the addresses written in the mailbox.
After that, it was natural that these twenty-four people, including Zhao Weiju, fought against Chen Ming's network hackers on the Internet.........
β¦β¦
"I don't believe it, your defenses will always be watertight!"
Zhao Weiju was tapping on the keyboard, and he seemed to grit his teeth fiercely, as if someone had stolen his pants, and he was annoyed and angry.
His appearance naturally fell in the eyes of the head of the department, "This Xiao Zhao has the ability, but he is always arrogant, and he just put down the defense work in his hand without authorization......"
Yes, when Zhao Weiju began to attack the "broiler" that Chen did not know, the person in charge of the second group in charge of the attack found that there was a stream of data assisting him.
Therefore, the leader of the second group reported to the person in charge at the first time.
To be the person in charge of the technical department, it is natural to be a person who understands technology.
The person in charge of the technical department just took a turn in the department and immediately found Zhao Weiju.
"He's attacking?" A hint of displeasure flashed in the eyes of the person in charge.
However, when he found out that Zhao Weiju's attack was indeed effective, he spoke out to criticize something, after all, the current work is all about results.
Zhao Weiju has the ability to work, and now is a critical moment, of course the person in charge of the technical department will not choose to punish Zhao Weiju at this time, "Hmph, this Xiao Zhao will act without reporting, and when this mission is over, talk to him well." β
As a result, the head of the technical department returned to his seat and replaced the area that Zhao Weiju was in charge of defense before.
And all this that the person in charge did, Zhao Weiju doesn't know now.
Zhao Weiju now only wants to compete with the hackers on the opposite side and decide the winner.
So when he attacked, he also used the "broiler" he controlled.
Every hacker has a "broiler", and the number varies from tens to thousands.
It's all about personal ability and preference.
Some hackers like to win by numbers, and the number of "broilers" is five or six hundred at every turn.
Some hackers, on the other hand, are quality-conscious, and they have no interest in ordinary home computers, and they only use the servers of large companies as "broilers".
As an excellent hacker, Zhao Weiju certainly has his own "broiler".
Zhao Weiju is a hacker who prioritizes quantity first, and what he is best at is the way of traffic attack, and the number of his "broilers" is more than 900!
Therefore, the DDOS traffic attack he launched is very large, and it is also the largest attack team of the Security Bureau.
And such a big traffic attack naturally became a nail in Chen Bu's eyes.
It's a nail, then of course it has to be pulled out!
Chen decided to pull out the nail before tracking down the other party's real address.
"A child's slingshot, no matter how many shots it has, can't compare to an adult's gun."
Chen Bufu tracked the other party's address while attacking the other party's "broiler" and counter-robbing the other party.
However, Chen Bufu is a hacker who believes in quality, he got these "broilers", and after checking the information inside, he discarded all these "broilers", and also did a system formatting to prevent the other party from regaining control of these "broilers".
Poor owners of those computers, just now they were complaining that their computers were too stuck, and in a blink of an eye, they found that the computers were automatically formatted......
In addition to the more than 50 "broilers" that Chen Bufu bought from the hacker forum at the beginning, all the "broilers" that Chen Bufu took down were all data servers used in the company.
After getting these excellent "broilers", Chen Bufu discarded the more than 50 "broilers" he had purchased from the hacker forum.
"Ridiculous defense, just now I didn't take it seriously."
After Chen Bujian captured this broiler, he was suddenly stunned.
"Huh? This ......"
Chen Bufu had just broken through one of the other party's "broilers", and found a new IP address in the system operation record, but Chen Bufu looked at the new IP address displayed in the "broiler", and suddenly felt a little familiar.
"I think I've seen this broiler ......"
Chen can't see for sure, this address is the one I saw recently, and the tail number 95.27 is a very easy number to remember.
Where did you see it?
Chen Bujian began to try to recall when he used hacking techniques to look at other people's IPs......
That's right!
Come to think of it!
The corners of Chen Bu's mouth raised slightly, "I remembered, it turned out to be you!" β