Chapter 8: Hartmann
"Hello." Xiang Shan crossed his arms and greeted Hartman in a friendly manner.
Hartman was wandering. But it was a reaction. He immediately stood up and said in a loud voice, "Yes, sir. β
"That...... I'm not your commander......"
"Leader of the Hanuman Working Group, Xiang Shan. Yes, you're right. For now you are my chief. β
Xiang Shan didn't expect this hacker to be such a one-sided character. He was a little embarrassed, and just asked, "What are you doing now?" β
"Are you asking about the progress of the work? Sir? β
Hartman's voice was quite loud, and several people from the security department not far away heard it. They took a look and found that it was Xiang Shan, so they didn't care.
After all, Xiang Shan is indeed the boss now, yes. And this boss has been trying to "communicate academics with that group of hackers" these days, and now that Hartman is here, it is natural for the boss to ask.
After all, there's really nothing he can't ask.
"I'm scanning these electronic devices to deduce the spread of the electrovirus, sir."
Only then did Xiang Shan notice that there were indeed several personal devices piled up on this table.
"Did you find anything?"
"Still scanning, sir. I just sifted out the 'whitelist' files. The remaining suspicious objects are being analyzed with the toolkit. Hartman said, "Actually, I can probably guess the modusion, but I won't make a judgment until I'm sure." β
Xiang Shan asked, "Can you tell me?" β
"I speculate that it is a Trojan horse that knows the common characteristics of research materials, retrieves the data that matches the characteristics throughout the computer, and then sends it to a designated location when there is a public network. Once all this is done, the Trojan will be automatically deleted to prevent itself from being retrieved. Therefore, those scholars who have already leaked secrets will definitely not find the virus. But there will always be traces. β
Human immunity is divided into "non-specific immunity" and "specific immunity". Non-specific immunity will clear out the "non-self" in the whole person. Specific immunity, on the other hand, targets only specific pathogens. In general, once a pathogen enters the body, it is attacked by non-specific immunity. A piece of malicious RNA can't get it directly into the cell, so it needs a protein shell β that's the virus.
Pathogens such as viruses will disguise themselves to activate the receptors on the surface of human cells, pretending to be a substance that a cell needs, and enter the cell. Viruses that multiply in large numbers activate the resistance of the specific immune system. Helper T cells recognize the antigen and in turn read the records encoded within the memory T cells, which in turn produce the antigen.
This set of logic can also be roughly presented in computers and computer viruses. Computer systems are defined by engineers as "legal" and "illegal", and some operations are inherently difficult to perform. Purely malicious code is difficult to take effect directly. So hackers will add a "shell" to the malicious code. The virus either extracts permissions, or exploits vulnerabilities to disguise its own modifications as "legitimate operations". Antivirus software and analysis software can retrieve the code of these "shells" and compare them with the virus database to detect and kill them. Security software and virus databases represent helper T cells and memory T cells.
But viruses written by humans are the product of intelligent design, so they often have unimaginable "manipulations" of natural evolutionβsuch as self-deletion.
The virus destroys its own "shell" and does not give the immune system a chance to recognize it.
The spread of computer viruses also follows epidemiology. However, a virus that "disappears and does not produce antibodies" will inevitably make it difficult to identify "Patient Zero".
But it seems that "Agni" can find "traces of virus modification" - or "records of symptoms" - and then deduce the trajectory of transmission based on "records".
Speaking of this, Hartman was a little proud: "Actually, I still know a little about 'Zhurong'. β
Xiang Shan felt a little strange: "You are friends? Or is there a feud? β
"I don't know." Hartman shrugged: "But I've studied him. β
"Have you studied him? Then why not catch him? Xiang Shan felt very strange: "You have already caught this guy, isn't there so much to do?" β
"I'm not a police officer, and I'm not an IRS (United States Internal Revenue Service) guy." Hartman was also very strange: "If there is no order, what are you going to do with this economic criminal?" β
"Economic criminal......" Xiang Shan couldn't understand it at all. In the eyes of this hacker, can the behavior of "Zhu Rong" be summarized as an economic criminal......
No...... It seems that it does meet the definition of an economic offender, but ......
Xiang Shan asked, "Then what are you studying it for?" β
"Hackers are people who look for vulnerabilities in the system, some people are good at finding holes accidentally left by builders, and some people like to drill holes themselves." "If you follow in the footsteps of other hackers, it's easy to find the hole," Hartman said. I've specialized in other hackers. But I rarely take the initiative. Normally I just follow them, looking for something to take advantage of. β
Xiang Shan has indeed heard of such a thing. Some little black hats, the bottom of the rivers and lakes like peddlers' pawns, will only learn some special basic techniques from some big hackers. [They may even only use scripts written by big hackers, so-called "script kiddies" (Script Kiddie) fart] After they use some scripts to hack innocent websites, the Trojan files generated by those scripts in the websites may have exactly the same password.
These script boys are more like the furnace and puppet of the script master. They will hack into some innocent websites, slightly modify the material on the homepage and so on to prove themselves, and then proudly put their "achievements" in the anonymous community to be worshiped by others. But all this is to facilitate the stealthy operation of the big hacker behind the scenes.
But Xiang Shan really didn't know that hackers of the level of "Agni" also did this kind of thing......
In other words, a hacker of the level of "Zhu Rong" can actually be treated like a script kid......
"For me, reversing a Trojan written by other hackers is actually a little more interesting than breaking a complex system." Hartmann put it this way: "I'm not saying I'm not good at the latter. In fact, I'm also good at finding vulnerabilities, but compared with other hackers, I can't close the qualitative gap. But I like to figure out the little tricks that everyone else has played, sir. 'Vulcan', that mediocre thing left on the Internet, I cracked it all over. I knew that he still had several things that he hadn't explained...... A lot of famous hackers, you think they've confessed to all their crimes. Ever watched Harry Potter? It says that the wizards liked to tease Muggles, so they put a fire spell on themselves during the witch hunt, and then stood in the fire and shouted twice. Those hackers may not be so laid-back when they stand in the courtroom, but they must be holding back the thought of 'you know so much'. I'm different......"
Hartman realized something and straightened up again: "I'm sorry sir. I might be a little wordy. β
Xiang Shan doesn't hate this kind of person very much. He felt that this guy had a kind of "tech nerd" smell in him. He waved his hand: "So you know a lot of evidence of the big hackers?" Can you send them to jail at any time? β
"Not that exaggerated, sir. The most I can do is confirm 'what this ID has done online' or 'which IP address this ID has used to log in'. In many cases, if you want to convict those criminals, you still have to dig up their real-world identities, or even snatch their devices to collect evidence while they are operating their own accounts. Hartman was honest: "The FBI is very professional in this area. β
As he said this, he glanced at the former FBI watchman next to him. The former FBI monitor actually nodded honorably.
Xiang Shan scratched his head: "You can't lock the position of 'Zhu Rong' soon?" β
Hartman was surprised, "Don't you know, sir, my main job is to investigate the computer virus infection and assess the extent of the intelligence leak. As for catching 'Zhurong', we have to wait until this thing is done. β
Xiang Shan nodded: "I thought I could find that person directly through you." β
"Well, maybe I'll be there when I finally arrest someone and keep her online by provoking things like that. But in most cases, social engineering is the best way to attack. β
Xiang Shan nodded: "You are still very transparent." I thought you were proud of your skills. β
"No, I'm proud." Hartman says, "My technology maximizes the power of social engineering. The right order is the right use of my power. β
Xiang Shan said: "That's why you want to ...... Army? β
Hartman nodded.
"Then why don't you sign up for the army normally?"
"I have a technical advantage, but not a physical advantage, sir." "I don't really understand what the normal process should look like," Hartman said. But people like me can't play at my level. Now that computer science is advancing so fast, if I had been relaxed from my studies because of my daily military training, I might not be the best hacker in the world. β
Xiang Shan probably understood why those United States soldiers didn't like this person at all.
It's weird to like it.
And this guy doesn't seem to hide his intentions at all, and actually told himself, a "foreign governor", on this occasion.
Xiang Shan even noticed the look on the face of the former FBI monitor. I'm afraid he also thinks this colleague is ridiculous. But he didn't seem to be allowed to speak, so he didn't say a word.
Hartman even happily said, "I'm going to be the FBI's deputy director one day." As long as my skills are combined with the power of the FBI, cybercrime in the United States will definitely be eradicated by me! β
Hearing this, the original FBI personnel showed a smile, but quickly reined in.
- This poor boy doesn't know how he is isolated......
However, Xiang Shan can't hate this kind of technology nerd.
He chatted with the "Agni" for a while.