Chapter 4: Agni

Among the rivers and lakes of hackers, there is also a "martial arts conference". They will compete in a variety of ways.

And these "martial arts conferences", of course, are also divided into two types.

The first is to show your face. Such competitions are usually held offline. For example, the most famous is the Pwn2Own hacking contest hosted by ZDI, a network security service provider for the Pentagon of the United States. A number of companies, including Software, Google, and Apple, have provided sponsorships. Internet companies in the Republic also hold similar events.

These activities either require hackers to work on existing security software on the spot, or they are required to solve certain technical problems. There are also offensive and defensive battles of a confrontational nature.

These tournaments have a lot of money to attract the best players from all walks of life.

Of course, even in this "white road" arena, hackers are still trying to challenge the rules. Some contestants will hack into their opponent's computer, spy on their opponent's problem-solving process, and then solve it in advance; Some entrants hack into the Organizer's servers to interfere with their opponents' work; Some contestants will secretly "climb over the wall" to find foreign aid in "limited number of participants" competitions.

If it is in a normal sporting event, this kind of unsportsmanlike behavior will only be banned from various competitions.

But in the world of hackers, many people just smile at this kind of behavior. Being found is just that the technology is not in place, and not being found is a very hacker-like behavior.

This is still in the game of "White Road".

And the game of the underworld is even more dangerous and treacherous.

Of course, it must be noted here that this does not mean that the technical level of the "black road" is necessarily higher than that of the "white road". It is possible that some of the famous masters in the "white hats" have a few "underworld" vests. It is possible that the monster thief in the dark world is an unknown network security personnel.

The identities of the two can change from one to the other.

And the game on the black road is more dangerous than the white road.

It is said that a few years ago, a good man developed a new form of hacking competition. The "champion" will leave some "lottery heads" on the preset server, perhaps a virtual currency, or some intelligence that can be sold for a price [such as vulnerabilities that can be used to threaten network security service providers or even sovereign countries], and make arrangements here. The first person to get this information is considered victorious. In that server, contestants can do whatever they want.

Of course, this kind of thing is not without a little risk.

It is possible that the contestants will be directly dug up by the champion to find out their "real names".

In the world of hackers, the "real name" - the identity of the real world is like the real name of the legendary devil.

In the "wizarding world" of the common fantasy of mankind, any cautious wizard sees his real name as the most cherished secret and the greatest threat to his own life. Because once the enemy has his real name, any ordinary magic known to everyone can kill him. From Africa to the westernmost part of Europe to Japan, the easternmost part of Asia, this kind of "spiritual faith" can be seen everywhere.

After the information revolution, "technology" has made magic come again, and people are worried about their real names again.

Once the enemy's real name is mastered, and he is unwilling to be a lackey, then he can only show limited obedience to the person who holds his real name.

Of course, this is also true for the "champion". Only the most powerful electronic wizard would dare to open such a "hero fight".

For academic technicians, this kind of competition is really incomprehensible. They don't understand why they should take a huge risk, so they fight for it.

But those cyber heroes who wander in the gray area are really happy.

In the server prepared by the owner, the hackers who fought could do whatever they wanted. Whether it's a virus, a backdoor, or a privilege escalation, it's all fine.

Some guys who don't think they can do anything also want to make a name for themselves and become champions. This kind of person may even be hacked at the stage of "just spreading hero posts", and the server prepared by himself is stuffed with other people's "honey pots".

In short, it was a time of competition.

Soon, the chaos came to an end. A hacker with the ID "FirewallDragon" put an end to the chaos and became dominant.

……………………………………

"Uh, I'll ...... later" Xiang Shan raised his hand to interrupt Colonel Lei's narration: "What's that guy's ID called?" FirewallDragon? Firewall Dragon? ”

- The name...... It feels so strong when you hear it!

It took a second or two for Colonel Lei to react: "Ah, yes, that's right, that's right. FirewallDragon, the dragon of the firewall, seems to have some literary allusion - speaking to the director, you pronounce this ...... You have to practice. ”

Officer Hu also nodded: "It's a little." Director Xiang, we are also the same age, I probably understand you. But you're also working in an international place now. This English pronunciation still needs to be practiced. ”

Lei Chaoyang did not doubt that he had him, and continued to narrate: "The hacker of the Firewall Dragon is indeed very dominant. Within five months, he opened three heroic fights in a row, and he was called the 'defender of the iron wall', which can be regarded as worthy of his name. However, half a year later, a hacker with the ID 'Loki', aka 'Loki', defeated him. ”

"In order to humiliate his opponent, 'Loki' hacked into the website of 'Firewall Dragon' and left a text message on the homepage of 'Dragonisnotbrave, ignisisbrave' [Dragons are not brave, Ignis is brave]. Ignis is Latin for 'fire', and in some regions it is also considered to be the 'spirit of fire', and also has the meaning of 'god of fire'. You probably don't know, so explain ......"

Xiang Shan nodded with an expression that he had fully understood, and even got some special jokes: "Oh, and then what? ”

"And then? The following year, a hacker named 'Agni', which translates to 'Agni' in Chinese, "joins and defeats 'Loki', and then changes the signature of some of Loki's community to 'Lokiisnotbrave, Agniisbrave' [Loki is not brave, Agni is brave] 'Agni' and 'Ignis' are cognate words. ”

Xiang Shan frowned: "Wait, according to the timeline you just said, this incident was also six or seven years ago, right?" This 'Agni', that is, Jakubu Hartman, was only a teenager at that time, right? The level is already so high? And play so big? ”

"Not really." Senior Colonel Lei shook his head: "At that time, the ID of 'Ajini' did not belong to Jakubu Hartman. According to later intelligence, the first generation of 'Agni' should be the firewall dragon. He changed his ID and made a comeback to avenge his shame. ”

Xiang Shan nodded: "Oh. ”

"But this 'Agni' was dug up by Hartmann for his real name three years ago. The hacker, who had a criminal record, was sent to prison by the FBI, and even if he was released, he would have to face a lifetime restriction on access to electronics. "According to the rules of hackers, the ID of 'Agni' belongs to him. It is said that Hartman's defense and anti-tracking techniques were taught online by the firewall dragon. ”

Officer Hu sighed: "It's a ruthless character. I'm afraid that in the eyes of this Hartman, this is called righteous annihilation. ”

Senior Colonel Lei continued: "This matter has become a trend. Loki was originally the god of fire, but also the god of fraud, lies, and pranks, which is very much in line with the aesthetics of some hackers, so it can be regarded as a 'not too rare ID' in the hacker world. And Ignis and Agni were supposed to be just vindictiveness in a small circle. But unexpectedly, the signal was released - this is the battle between the 'Vulcan' and the 'Vulcan'. ”

As a result, the ID of the 'Vulcan' in various myths was dug up and used as the name of the hacker. From that time on, holding the vest of the 'Vulcan' was the most glamorous thing for hackers. It is precisely because of this that the hacker's competition is more disciplined. ”

Xiang Shan was stunned: "It means to say ......"

"Hmm. If the loser admits defeat and agrees to hand over this vest, the winner will stop on the spot and not dig up the loser's real name. This kind of ring competition has also become more orderly. This has also become a kind of 'rules of the rivers and lakes' and a 'cultural phenomenon'. It can be said to be a kind of 'martial virtue'. ”

Xiang Shan nodded: "Understood." Hartmann, a court eagle dog and a scum of the rivers and lakes, has no martial virtue. ”

Although Colonel Lei was tempted to point out that "everyone present has official status, and it is not bad to use the word "imperial eagle dog", he still dutifully explained: "In a community for the general public, hackers don't do anything." But in hackers' own communities, hackers avoid using IDs with Vulcan's name. There is a stunned Qing who accidentally took a related one, and it is likely that the guy who can't see it will dig out his real name, and he can't go deep into the circle from now on. Everyone will consciously maintain the majesty of the master. ”

"But at the same time, outside of the game, hackers wearing Vulcan vests will become hunting targets for those who want to make a name for themselves, and they will often face challenges."

"It can be said that every 'Vulcan' is a hacker who has been tempered and skilled."

Xiang Shan said: "Then this 'Zhurong' may be from our Republic?" ”

"Not necessarily." Lei Chaoyang shook his head: "'Agni' is the god of fire in Hindu mythology, but the two 'Agni' before and after were born in the United States. Under the name of the Roman god of fire 'Vulcan', it was Indian. The hackers in Japan have the ID of the Greek god of fire, Hephaestus. They are also very attached to the ID of 'Kagu Earth Life', but they have not been able to snatch it. ”

"At the end of the day, this ID is all about global competition. Even if the first person to apply is based on their own cultural background, the person who snatches it is not necessarily the same. Moreover, cultural integration is a general trend nowadays, and it is common to like foreign myths and stories. ”

Xiang Shan nodded: "In other words, we don't know anything about 'Zhurong' now?" And what about the other 'Vulcan'? ”