Chapter 355: Loopholes
As Avandi walked uneasily into the building, he put his phone in the storage bin as usual, and as soon as he walked through the door, the metal detector went off. Pen fun and pavilion www.biquge.info
"Oh, I almost forgot, I haven't taken out my e-cigarette yet."
Awandi pretended not to care and pulled out the e-cigarette in his pants pocket.
The two security guards guarding the door looked at it, but they didn't say anything, there are too many people of various personalities here, and there are many people who don't like to be restrained, and the company is also very preferential to this, otherwise how could it be possible to design so many facilities that are convenient to take care of.
An e-cigarette didn't attract much attention, and Avandi put the e-cigarette back in his pants pocket in horror, and he cursed secretly, at least a camouflage pen is better than an e-cigarette. But if you think about it, fountain pens are not good for charging, and e-cigarette charging is obviously better camouflaged.
As usual, Avandi walked up to the second floor, came to his treehouse desk, sat down, and wiped the sweat from his forehead.
"Aren't you going to breakfast?"
Vayan on the other side asked curiously.
"No, no, I've already eaten it this morning."
"Then I'll go have some breakfast."
Vayan didn't notice anything unusual and followed him out of the office area.
Originally, Awandi liked to come early, and he was the only one left in the office area at this time.
Originally, according to the requirements, the company's desks all adopted a wireless design, whether it is a keyboard or a mouse, and even if the work data is transmitted between each other, mobile storage devices are no longer used, and there is no USB socket on many desks.
Yes, not only does it not recognize the removable storage device, but it also does not give a USB port.
For the network security protection of the company's headquarters, Avandi couldn't help but feel tricky, this is the first time he feels that a company can do this kind of network security. Maybe he was unheard of, and Evandi thought to himself that maybe the big foreign companies were doing it.
However, the breach is always broken from the inside, although many people do not have a USB socket on the table, but there are a few exceptions, they have high requirements for the precise control of the mouse, and the wireless mouse still cannot meet their requirements very well.
Avandi walked over slowly, taking a deep breath, sweat streaming down his forehead.
Even the arm holding the e-cigarette was trembling, and he quickly looked around left and right, and after finding that no one was there, he immediately pulled out the tail end of the e-cigarette, and then squatted down to pull out the mouse cable under the electric lifting desk, and inserted the end of the e-cigarette with one hand.
โฆโฆ
There is no movement on the dormant host.
This made Avandi breathe a sigh of relief. It seems that it should have been recognized by the host as a mouse or keyboard, and with the vulnerability of the USBHID protocol, no matter what the white man wanted to do, it was time for him to reach his goal. Then he didn't care about anything, waited for more than ten seconds, pulled out the e-cigarette, returned to his original state, and quickly returned to his desk and sat down.
Just like a weak heart and doing a bad thing, for a few hours, Avandi couldn't help but stare at the situation at that desk, and when he found that his colleague was fine, he didn't notice that his host had been tampered with, and he breathed a sigh of relief.
At the same time that Evandi breathed a sigh of relief, in the storage box a few meters under his feet, the turned off mobile phone that was locked into the box by Avadi automatically started with the screen lit up and entered the boot state.
At the same time, all computer monitors in the entire office area began to emit specific electromagnetic wave signals, and the mobile phone that had been automatically turned on quickly entered the FM frequency modulation state, and a hidden electromagnetic wave network was established almost in the blink of an eye, and a piece of data information was encoded as a specific electromagnetic wave to connect with the mobile phone FM by the hardware such as the graphics card and display of the host.
The mobile phone is also connected to the base station network after it is activated, and a series of encrypted data packets are quickly transmitted through the 4G network.
โฆโฆ
In a private house more than ten kilometers away, Wesco drank a cup of coffee and turned his head to look at the monitor.
โโฆโฆ Whew, it worked. โ
With a wave of his fist, Wesco couldn't help but feel a little surprised.
"Of course."
The weak man wearing black-rimmed glasses sighed: "I said a long time ago, if you still think that the ICS/SCADA monitoring data acquisition system can be physically isolated from the Internet, it is absolutely stupid." Today's technology is changing rapidly, but what about physical isolation? No security technology can protect against the new-age hacker social engineering attacks. โ
"But thank you, without your help, this matter probably wouldn't have worked."
Wesco got up and patted the weak man on the shoulder: "Tomorrow the delegation of Ronald Enterprises will visit the headquarters of the hardcore technology company, and I will blend in with the delegation, so ...... Can you get it all done today? โ
"I can't give you an answer."
The weak man stared at the screen, his hands quickly tapping on the keyboard.
"You know, this technique of encoding binary data through FM has limitations, and I have to try to see if I can form a mesh network and see if I can find an Internet interface."
"Okay, I won't bother you."
Shrugging his shoulders, Westco didn't urge the weak man, but walked to the side and looked through the encrypted data on his phone.
Less than half an hour later, suddenly, the weak man over there shouted: "Okay, it worked, damn it, this company actually made three layers of isolated networks, and there are no wireless devices on the core layer to connect, but fortunately there are still vulnerabilities between the first layer and the second layer." โ
The weak man was extremely proud.
"Oh, loopholes?" Wesco walked over and asked curiously.
"Although many industrial control networks have come up with all kinds of seemingly perfect security measures, they can never eliminate vulnerabilities caused by human error."
The weak man explained: "This company is designed a three-layer mesh network that isolates the employees' work network, monitoring system, and core servers, and according to the original design, even if we successfully implant a Trojan horse, we will not be able to invade the monitoring system." Luckily, I found that someone seemed to be a little careless, using his work phone to remotely access the monitoring network system, and using a secure access mechanism with security vulnerabilities, through which I could directly see all the surveillance. โ
"So, everything is going well?" Wesco smiled.
"Make me another cup of coffee."
The weak man pinched his fingers, "The degree of automation employed by this company is simply terrifying...... I'll see, well, this is the urban Internet of Things, hehe, actually let the computer take over all the street lights, monitoring, running water, air conditioning...... Wait, they actually buried a layer of solar panels in the ground? It's really extravagant, and the cost of every ten meters must be at least a million dollars, right? โ
"Hey, I'm sorry about all that."
The man turned: "Most of them are inconsequential Internet of Things, they should have designed several backup emergency grid systems, and they are all in the core network, so if you expect a power outage at a critical moment, I'm afraid it's impossible." โ
"How many spare sets?" Wesco's eyes widened.
"Well, at least two."
The man stretched out two fingers and couldn't help but scold: "Fuยทck, this company is really a waste of money, but I have to say that this company's waste of money has troubled us, because we have nothing to do with their power system." โ
Taking the coffee handed over by Wesco, the man took a sip and exhaled, "Now it seems that I can only turn you off the monitor." โ
"Can you see real-time monitoring?" Wesco said unexpectedly: "Didn't you just say that the transmission speed is limited?" โ
"Thanks to a few internal idiots, I've built a mesh network, but there is no way to reduce the dot bitrate and multi-point latency. Let me see how many monitoring points there are ......"
As soon as he hit the enter key with his index finger, lines of data suddenly appeared on the monitor.
"Hiss......"
"What's wrong?"
Seeing that the weak man gasped, Wesco asked uneasily. (To be continued.) )