Chapter 70: Super Hacker Showtime
The situation with the virus in the arsenal master control system is also very different from that in Security Station 5.
First of all, when the No. 5 security station system was just hit by the virus, Su Jianqing shut down the operation, that is to say, the "Goat Pentagram" virus has not completely infected the data of the entire computer, in just a few seconds, no matter how powerful the virus is, it is impossible to completely destroy the computer's operating system, if the virus is removed in time, the computer can still continue to operate normally; Most of the general control system of the armament arsenal will not be shut down, and the data infection degree of the general control system must be extremely high, otherwise, there will be no shutdown accidents.
Secondly, the system host of the No. 5 security station can only be regarded as the performance of a small physical machine, and the system memory and disk capacity are not on the same order of magnitude as the supercomputer of the arsenal, and it will undoubtedly be more difficult to recover the original system data of a large computer.
The "Goat Pentagram" virus must be powerful enough, but any computer virus can only destroy the data files of the current operating system, and the virus cannot destroy the data of other disk partitions outside the current operating system.
For example, if there are two sets of operating systems A and B installed in the same computer (dual-system host), when you run operating system A, system B must be shut down, and after the virus in system A, no matter how powerful the virus is, it can only destroy the data files that system A can access, while the data that system B can access must not be destroyed by the virus. System B often appears as a backup system or a security system, which provides a means for system recovery.
Our common security model is actually such a security protection principle.
An important military base like Koulvator will definitely carry out system backup processing, and the core system will be safely backed up by dual systems. However, in the case of virus threats, it is very likely that the backup system will also be infected by viruses, so when restoring the system, it is necessary to block or isolate the virus first.
In view of the particularity of the arsenal system, Su Jianqing's system recovery method is naturally different.
If you use the extremely inefficient micro-operating system on Pantsir to scan the core system of the arsenal for viruses, it would take several hours to scan a few hundred terabytes (terabytes) of data. At that time, the aliens had already invaded!
Su Jianqing first used the micro operating system on the armor to directly format a host in the main control room, directly removed the virus in this host, and then reinstalled the new system with virus protection.
The performance of this host must be much higher than the micro system on the armor, and after that, Su Jianqing used this host to start scanning the core host of the general control room, and this way of scanning supercomputers is several orders of magnitude more efficient.
In about ten minutes, the virus on the core host was disposed of, and Su Jianqing took less than a minute to strengthen the virus protection for the core host system, and it took more than ten minutes for Su Jianqing to restore the backup system.
When Su Jianqing restarted the host and several monitors in the main control room displayed the system login interface at the same time, Xiao Er and Kai were stunned, they never expected that Su Jianqing would restore the core system of a supercomputer at such a speed.
Xiao Er and Kai shouted a little unreservedly, Su Jianqing turned his head to look at the two of them calmly, learned Ronaldo's gesture to press down, and said with a pretending B: "Calm!" Calm! It's all small scenes! ”
Indeed, for a professional hacker, recovering a supercomputer system and recovering a home computer's system are basically the same routine, plus the assistance of hacking tools, it is not difficult to restore a system in a short period of time!
Under the guidance of the system operator, Su Jianqing quickly entered the authorization opening interface of the mecha warehouse, and the way to authorize the opening of the mecha warehouse was actually an astonishing 64-bit password authentication method, and a second-level authentication method was set up.
If you enter the wrong authentication password three times in a row, the authorization of the mecha warehouse will be automatically locked, and only after the EDC headquarters carries out the second-level authorization, it can be unlocked, and then the password can be entered again, and after Su Jianqing's analysis of the second-level authorization, it was found that the second-level authorization is also the 64-bit password authentication of the pit father.
Su Jianqing was very depressed, he couldn't understand why many large systems always like to increase the difficulty of password decipherment by lengthening the password length!
If the traditional password breaking method of password collision attack is used, it is obviously unrealistic to crack the 64-bit password. In layman's terms, the so-called password collision attack is to test the real password by continuously entering the forged password, that is, to authenticate the password again and again through the fake secret, until the real password is tried.
Why is it unrealistic to crack 64-bit passwords with password collision attacks?
Assuming that a one-digit password may be composed of one of the forty characters on the keyboard, then the 64-digit password means that there is a permutation and combination of 40 to the 64th power of the password, and there is also a 40 to the 64th power experimental password, what is the concept of 40 to the 64th power? It's about 34 followed by 100 zeros, which is an order of magnitude of horror.
In terms of the performance of the core system computer of the current arsenal, this computer can experiment with about 10,000 kinds of passwords per second, which means that if you want to test all the passwords, it will take about 34 plus 96 and so many seconds, and it will only take 86,400 seconds a day, how many days will it take to experiment?
What's more, this is only the unlock password for cracking the second-level authorization, and there are 64 digits for the authorization password of the mecha warehouse. Opening the mecha warehouse by means of password collision attack, that is not a matter of the cucumber vegetables being cold, it is a matter of Su Jianqing and their corpses being divided into white bones!
Su Jianqing, who understands the truth, naturally will not use this outrageously stupid method, if he wants to crack the authorization password in a short time, Su Jianqing uses a more efficient, but brain-burning memory analysis method!
The so-called memory analysis method is to directly obtain the original data of the computer in memory through the memory interception tool, and then manually analyze the original data of the computer to restore the original data to the password information that people use normally.
Password authentication authorization is nothing more than comparing the password entered by the user with the password originally set, and if the password is consistent, it will be authorized, and if the password is inconsistent, the authorization will be denied.
As long as the computer is comparing passwords, it will definitely read the correct password that was originally set into memory, and if the memory resources at the time of comparison are copied with a specific memory interception technology, the original memory data of the computer in a specific format can be obtained.
These memory data contain the correct password information, but these password information is the data in a specific format of the computer, in short, it can be regarded as a bunch of binary data in the form of 01, this kind of data must not be understood by normal people, normal programmers must not understand, the vast majority of normal CTO can not understand, only supercomputer program enthusiasts who are extremely perverted can understand them! Su Jianqing is undoubtedly such a pervert!
Understanding the 01 base code of these computers is enough to brain, and the key is to find out the password information from these 01 numbers, which is amazingly difficult to complete in the short term! It is estimated that Su Jianqing will die of countless brain cells today, and his hair will be gray and lose a lot!
Think about the idea, Su Jianqing just do it, super hacker - Showtime!
******************
Is this chapter a lot of book lovers dizzy, foggy, and unintelligible? Expertise is a bit excessive! Actually, this chapter can be regarded as my deliberate design, I hope that book friends also have a simple understanding of some information technology-related knowledge, maybe can fool a few high school junior students to choose IT-related majors in the future, of course, it is better to fool primary school girls!
The most important thing is that I am also stinky and shameless!