Chapter 46 Strange Fortune from Heaven IV
PS: The prodigy of the prodigies can learn by looking at it and not forgetting it, through the perception and perception of the internal power of the neutrino true mustard seed, he can learn an undergraduate student in a day, and he can learn a doctoral student in a few days, and his supercomputer brain driven by a ring of neutrino high-energy particles can contain the knowledge of the entire blue planet. Ask for clicks, ask for subscriptions, ask for rewards, ask for monthly passes!
Chapter 46: Strange Fortune from Heaven IV
Gu Xiaolong, a three-year-old child, also explained: The sentence in "Sauvignon Blanc" "I am willing to be a deep mountain tree, and the branches are even born." At the end of "The Song of Long Hatred", "In heaven I wish to be a winged bird, and in the earth I wish to be a branch." The days are long and sometimes endless, and this hatred lasts forever. The reason why it can become a quatrain of eternal love, if it is not with such a strong message of love, it will not become a quatrain for the ages, the poet has been pursuing the Xiang spirit from beginning to end all his life, and the love for the Xiang spirit is really from the beginning, so it can be said that "this (hate) love is endless".
The two grandparents were really convinced when they heard his explanation, but they became more and more difficult, and every day they didn't know how many learning materials they had to prepare for this three-year-old child, Gu Xiaolong, to meet his learning needs. If you bring it to the university library, it will be a lot of trouble, but it will become a sensationalism, a major news sensation in the university and even the whole country, and it is not a good idea not to spread it all over the country in a day. The grandparents really had no choice, so they had to mobilize the whole family to go out, and the grandparents opened a book list, and the whole family went out to carry books and materials. Are you moving books to play?
Suddenly one day. A laptop brought by a student was opened by a three-year-old child, Gu Xiaolong. This is out of control, in less than half an hour, the three-year-old child Gu Xiaolong can use it freely, seeing this doctoral student open his mouth, he repeatedly exclaimed that the prodigy exclaimed a miracle. It's not a miracle at all, and the next series of events is a real miracle. In view of the fact that the three-year-old child Gu Xiaolong can skillfully use the computer, the grandparents and their families are finally relieved, and they no longer have to prepare and carry huge amounts of books and materials every day as before. Just give the three-year-old child Gu Xiaolong a study list every day, and also buy a high-end personal computer for him, and the network speed is also configured to the highest.
Three-year-old child Gu Xiaolong since he has a computer, like a fish in water, all the learning by leaps and bounds, once the list of grandparents is in hand, just need to take a look, immediately start the computer to search. And what he is searching for must be mainstream knowledge, but non-mainstream knowledge is also included in his attention. This is what my grandparents know through the assessment, every time I see him obviously from the mainstream channel to learn, but the corresponding non-mainstream knowledge somehow can also be stored in his supercomputer brain armed with a ring of neutrino high-energy particles, and he can also answer completely in the exam, maybe this is the so-called sensory perception ability of the mind energy field!
Finally one day, in order to learn software skills, the little child Gu Xiaolong accidentally entered the core computer host of the GUI Valley of the M country, in fact, for Gu Xiaolong, there is no need to use any hacking techniques, he can enter any host without restrictions, because he has the Taoist size of the Zhou Tian neutrino true mustard seed rice internal strength, can be through the particles, electrons, the original information is perceived, you can get all the information and materials, without the need to have a complex set of attack techniques like hackers.
The word "hacker" is a transliteration of the English Hackte, spelled "Hackte". Recently, a very common hacker attack method has tested some of the top big websites in the world in turn, and it turns out that even high-performance commercial websites such as Yahoo with strong technical support can bring financial losses to them. To a certain extent, this has damaged people's confidence in the Internet and e-commerce, and has also caused people to pay serious attention to hackers and think about hacking techniques.
Hacking is an objective presence on the Internet, and we need not deny it. Like national defense science and technology, hacking technology is both offensive and protective. Hacking techniques continue to push computer and network product providers to continuously improve their products, and have been driving the development of the entire Internet. Just as we cannot deny that the atomic bomb is high-tech because of its destructive power, we cannot leave hacking technology out of the door of science and technology because of its destructive power on the Internet. Discovering and implementing hacking techniques usually requires that the person is very proficient in computers and networks, and discovering and verifying a computer system vulnerability may require a lot of testing, analyzing a lot of code, and writing a long program, which is not much different from a scientist working in a lab. Finders are different from people who look for and use hacking software online that someone else has already written. The distinction is like that between the inventor and the user of a weapon. Just as a country can legislate to prohibit the possession of firearms by civil society organizations and individuals, it is clear that the law cannot prohibit individuals from possessing hacking skills.
As the saying goes, follow the local customs, since you have entered the door of hackers, you must understand the jargon of hackers, and the following editors will introduce hacker-specific terms.
1. BROILER: THE SO-CALLED "BROILER" IS A VERY VIVID METAPHOR, WHICH IS A METAPHOR FOR THOSE COMPUTERS THAT CAN BE CONTROLLED BY US AT WILL, THE OTHER PARTY CAN BE A WINDOWS SYSTEM, OR A UNIX/LINUX SYSTEM, IT CAN BE AN ORDINARY PERSONAL COMPUTER, OR A LARGE SERVER, WE CAN OPERATE THEM AS IF WE WERE OPERATING OUR OWN COMPUTERS, WITHOUT BEING DISCOVERED BY THE OTHER PARTY.
2. Trojan horses: those programs that appear to be disguised as normal, but when these are run by the program, they will gain the entire control of the system. There are many hackers who are keen to use Trojan horses to control other people's computers, such as gray pigeons and black holes. PcShare and many more.
3. Web Trojan: Ostensibly disguised as an ordinary web page file or inserts its own code directly into a normal web page file. When someone visits. The web Trojan will take advantage of the vulnerability of the other party's system or browser to automatically download the server of the configured Trojan to the visitor's computer and execute it automatically.
4. Trojan: It is to put a web Trojan in someone else's website file or sneak the code into the other party's normal web page file, so that the viewer can be caught in the horse.
5. Backdoor: This is a figurative metaphor in which an intruder can implant specific programs or modify certain settings in the other party's system after successfully controlling the target host using certain methods. These changes are ostensibly difficult to detect, but the intruder can easily establish a connection to the computer using a program or method to regain control of the computer, as if the intruder had secretly assigned a key to the master's room. It is the same as being able to enter and exit at any time without being detected by the owner.
Usually most TrojanHorse programs can be used by intruders to create BackDoors
6. Rootkit: Rootkit is a tool used by attackers to hide their whereabouts and retain root (root permission, which can be understood as system or administrator permission under Windows) access permission. Usually, an attacker obtains root access through a remote attack, or uses password guessing (cracking) to obtain normal access to the system, enters the system, and then obtains root access to the system through security vulnerabilities in the other party's system. The attacker then installs a rootkit on the opponent's system to achieve their goal of controlling the opponent for a long time, and the rootkit is similar to the Trojan and backdoor we mentioned earlier. But far more stealthy than that, Hacker Guardian is a typical rootkit. There are also domestic ntroorkits and other good rootkit tools.
7. IPC$: It is a resource that shares the "named pipe", which is a named pipe that is open for inter-process communication, and can be used when remotely managing the computer and viewing the shared resources of the computer by verifying the user name and password.
8. Weak passwords: those passwords (passwords) that are not strong enough and are easy to guess, such as 123 and abc
9. Default sharing: The default sharing is to automatically open the sharing of all hard disks when the WINDOWS2000/XP/2003 system turns on the sharing service, because the '$' symbol is added, so you can't see the shared hand chart, also known as hidden sharing.
10. shell: refers to a command referring environment, for example, when we press the "start key + R" on the keyboard, the "Run" dialog box appears, and when you enter "cmd" in it, a black window for executing the command will appear, which is the shell execution environment of WINDOWS. Usually we use the remote overflow program to successfully overflow the remote computer, and the environment we get for executing system commands is the shell of the other party
11. WebShell: WebShell is a command execution environment in the form of web page files such as asp, php, jsp or cgi, which can also be called a web page backdoor. After hacking a website, hackers usually mix these asp or php backdoor files with normal web page files in the web directory of the website server, and then they can use a browser to access these asp or php backdoors to obtain a command execution environment to achieve the purpose of controlling the website server. You can upload and download files, view databases, execute arbitrary program commands, and more. Commonly used WebShells in China include Haiyang ASP Trojan, Phpspy, c99shell, etc
12. Overflow: To be exact, it should be "buffer overflow". The simple explanation is that the program does not perform a valid detection of the input data it receives, resulting in an error, which can be caused by a crash or execution of an attacker's command. It can be roughly divided into two categories: (1) heap overflow; (2) Stack overflow.
13. Injection: With the development of B/S mode application development, more and more programmers use this mode to write programs, but due to the uneven level of programmers, a considerable number of applications have security risks. The user can submit a piece of database query code to get some data he wants to know based on the results returned by the program. This is called SQLinjection. Namely: SQL injection.
14. Injection point: is the place where injection can be carried out. This is usually a connection to access a database. Depending on the permissions of the account that runs the injection point database, you will be given different permissions.
15. Intranet: Generally speaking, it is a local area network, such as Internet cafes, campus networks, company intranets, etc. If the IP address is within the following three ranges, it means that we are in the intranet: 10.0.0.0—10.255.255.255,172.16.0.0—172.31.255.255,192.168.0.0—192.168.255.255
16. Extranet: directly connected to the Internet (Internet). You can access each other with any computer on the Internet, and the IP address is not a reserved IP (intranet) IP address.
17. Port: (Port) is equivalent to a kind of data transmission channel. It is used to receive certain data, then transmit it to the appropriate service, and the computer processes the data and then transmits the corresponding recovery to the other party through the open port. Generally, the opening of each port corresponds to the corresponding service, and to close these ports, you only need to close the corresponding service.
18.3389, 4899 broiler: 3389 is the default port number used by Windows Terminal Services (TerminalServices), the service is launched by Microsoft in order to facilitate the network administrator to remotely manage and maintain the server, the network administrator can use the remote desktop to connect to any computer on the network that has turned on the terminal service, and after successfully logging in, it will operate the host as if operating their own computer. This is very similar to what remote control software or even Trojan programs do, and the connection to the terminal services is very stable. Moreover, no antivirus software will detect and kill, so it is also loved by hackers. Hackers after hacking a host. Usually try to add a backdoor account of your own first, and then open the other party's terminal services, so that you can use the terminal services to control the other party at any time, such a host, usually called 3389 broiler. Radmin is a very good remote control software, 4899 is the default use of Radmin and is often used as a Trojan by hackers (it is for this reason that the current antivirus software also kills Radmin). Some people are using the service port number. Because Radmin's control function is very powerful, the transmission speed is faster than most Trojans, and it is not killed by antivirus software, Radmin is used to manage remote computers with air passwords or weak passwords, hackers can use some software to scan the host with Radix air passwords or weak passwords on the network, and then they can log in to remotely control each other, so that the controlled host is usually made into 4899 broilers.
19. Non-killing: It is to modify the program through techniques such as packing, encryption, modifying feature codes, and adding flower instructions, so that it can escape the detection and killing of antivirus software.
20. Packing: It is to use a special algorithm to change the encoding of the EXE executable program or DLL dynamic connection library file (such as compression and encryption) to reduce the file size or encode the encryption program, and even avoid the purpose of antivirus software detection. At present, the most commonly used shells are UPX, ASPack, PePack, PECompact, UPack, Immunity 007, Trojan Horse Coat, etc.
21. Flower instructions: It is a few assembly instructions, so that the assembly statement can make some jumps, so that the antivirus software can not judge the structure of the virus file normally. In layman's terms, "Antivirus software looks for viruses from head to toe in order." If we turn the head and feet of the virus upside down, the antivirus will not be able to find the virus."
Of course, hacking skills must also have more professional and complex skills, since the Internet and computers and computer terminals, the birth of countless hacker masters, good and evil masters, the world's top ten hacker masters are as follows: 1. The world's best hacker Nabai? Jack died suddenly and mysteriously in San Francisco, USA. It is reported that he originally planned to show an amazing hacking stunt at the 2013 "Black Hat" hacker conference that opened on July 31 - remote control killing, but he never thought that he would cause death. As the U.S. police refused to disclose the details of Jack's death, Jack's death immediately sparked all sorts of crazy conspiracy theories, and at the same time, it also caused a lot of concern about the hacker community. Next, let's take a look at the world's most famous hackers. The 35-year-old famous hacker Banabay of country M? Jack (pictured) used his ingenious hacking skills to make ATMs spit out money at the 2010 "Black Hat" hacking conference. Become the world's best "star hacker".
Second, Mitnik used to be the most wanted criminal in country M. He has hacked into the computer networks of institutions such as the Pentagon and the American Digital Equipment Corporation. Mitnik has been arrested and jailed several times for hacking. It also made him a celebrity in the industry. He started Mitnik Security Consultants in Nevada and is also a writer. His most famous hacking is his latest book, Ghost in the Line, which depicts the capture of Mitnik in the mid-90s, is the story of his novel Hacker's Arrest. Since his release from prison, Mitnik has remained in the public spotlight, frequently invited to speak and book autographs.
3. Hortz is a 22-year-old hacker who jailbroke an Apple iPhone. and cracked Sony PS3, and became famous, and the crack of PS3 eventually made Hortz and Sony go to court. Sony filed a lawsuit against Hortz, and the two parties eventually reached a settlement, with Sony banning Hortz from cracking the product. The hacker group A inherited Hortz's business and launched a retaliatory attack against Sony. Hortz has since been recruited by the social networking site F.
4. Adrian was arrested in 2003 for hacking into the New York Times' computer network, adding his name to a series of Op-Ed contributors and searching through an account. He was sentenced to home confinement. Adrian returned to the public eye in 2010. Adrian reported to the government of Country M at the time that Bradley Lee, a former Army intelligence analyst for Army M. Manning said. He has leaked classified government diplomatic documents to WikiLeaks. Manning was accused of illegally passing on information, while Adrian was seen as a traitor by some of his peers in the industry, which led to his accusations at the Internet and hacker conferences.
5. Robert was already infamous in 1988, when he was a graduate student at Cornell University, and he published the first widely circulated worm on the Internet, causing thousands of computers to crash. Robert is the son of the chief scientist of the National Center for Computer Security in Country M (part of the National Security Agency (NSA). Robert said the procedure was a research experiment and that the experiment got out of control. He became the first hacker to be charged under the Anti-Hacking Act, which makes it illegal to hack into federal computer systems. Robert was eventually fined $10,000 and ordered to perform 400 hours of community service. Some security experts consider this sentence to be excessive, given the fact that this type of internet attack now occurs almost daily. Robert is now a professor of computer science at the Massachusetts Institute of Technology.
6. Battle was an FBI's informant who ran a credit card theft website, one of the largest business crime sites on the Internet, with thousands of users, and Battle, which runs from his home in San Francisco. A series of mistakes, including the use of stolen credit cards to spend at retail stores, led to the discovery of the site, the arrest of Battle, and the imprisonment of Battle. As a result of stealing information on 2 million credit cards and fraudulently costing $86 million, Battle was eventually sentenced to 13 years in prison.
7. Michael's fame rose to prominence in 2005 when Cisco went to great lengths to stop Michael's demonstration of a software vulnerability that could allow hackers to attack and take control of Cisco routers. Cisco threatened to file a lawsuit and ordered employees to destroy 2,000 CDs containing presentations. Michael left Cybersecurity Systems, which said the company pressured him to stop his demonstrations. Michael ended up making a presentation and becoming a hacker hero. Michael now works for Cisco's competitor Juniper Networks as a Senior Engineer.
8. Gonzalez, a former informant for the Secret Service of Country M, was sentenced to 20 years in prison for being accused by the authorities of State M of committing the largest credit card theft in the history of Country M. Gonzalez was confirmed to have stolen 40 million credit card information from U.S. retailers TC, OM and BWC, among others, along with international crime syndicates. Prosecutors noted that more than $1 million in cash he agreed to give up was found buried in a bucket in his parents' backyard.
9. Poulson, a proven guilty computer hacker, has transformed himself into a top-notch, security-based journalist. He is the author of the book "KG". Poulson specializes in attacking telephone networks, and he once attacked the telephone lines of the KIISFM radio station in Los Angeles. In order to be the winner of the "Win a Porsche on Friday" (WPBF) program. Poulsen was sentenced to five years in prison.
10. Apple's co-founder was a telephone flyer in the early days. They exploit vulnerabilities in the phone network to make free calls. Called "Olaf? Tubak" and Woznia, known as "Berkeley Blue". They sold "blue boxes" of stolen phone lines until they were robbed at gunpoint in the parking lot of a pizzeria in Silicon Valley. Mr. Jobs, who died in October 2011, said that his hacking experience was the inevitable precursor to the creation of Apple. Wozniak now serves as Chief Scientist at a computer storage company based in Salt Lake City.
The above hackers are both good and evil, and there are five really top decent master hackers: 1.SW: alias WOZ, often referred to as the second Steve Jobs, the founder of Apple. Together with Steve Jobs, he created the Apple computer. WOZ began his hacking career by making blue boxes, which is a technique through detours. Enables users to make long-distance calls for free. WOZ and Jobs sold these blue boxes to their classmates, and even used the blue box phone to call the Pope impersonating Kissinger. WOZ invented his own computer after dropping out of university halfway through. Steve Jobs suggested selling the computer as a self-assembled computer circuit board, which was the prototype of the original Apple computer. They sold Apple computers to a local distributor for $666.66 per unit. WOZ is now committed to philanthropy and is no longer a full-time employee at Apple. He now appears to have 'adopted' the entire Los Gatu-Saratoga Union High School campus, which has a large number of Asian American students, personally learning from students and teachers, and donating some top-notch equipment.
2.TB-L: He is considered the founder of the World Wide Web. He has received numerous accolades, including the Millennium Invention Award. While he was still a student at Oxford, he and his classmates were banned from using the school computer after they were found to have used the computer to steal passwords. TB-L believes that hypertext should be linked to computer networks. When he recalls how he managed to combine the two, he says, "I just linked hypertext to TCP and DNS, and that's how the World Wide Web was born." After the creation of the World Wide Web. He founded the World Wide Web Association at the Massachusetts Institute of Technology. The members of this association call themselves a group of members who come together to develop the rules of the web page. B-L's World Wide Web and all the rules set by the World Wide Web Association are not patentable and do not require any royalties.
3.LT: Torvalds created L, a U-based operating system. He made himself an engineer. It says its ideal is simple: I just want to have fun making the best operating system in the world. T's hacking career began as a teenager. A CVic-20 microprogram was written in assembly language on an 8-bit computer in his home, and the main reason for using assembly language was that he didn't know that other programming tools were available at the time. In the summer of 1991, six months after he got his first PC, he felt he should download some files. But before he could read and write to disk, he had to write another disk driver. At the same time, the file system needs to be written. In this way, with the task conversion function, with the file system and device drivers, it becomes U, or at least the kernel of U. Thus was born. He then applied to the University of Helsinki for FTP server space, which allowed others to download the public version of L, use the GPL for L, and improve it through hacker patches to integrate well with GNU's existing applications. In this way, L had a graphical user interface overnight, and it continued to expand. In recognition of his outstanding contributions, an asteroid was named after him, and he received honorary doctorates from RD Stockholm University and the University of Helsinki in Finland, and was called the 'Hero of the 60s'
4. RS:S, named after the GNU Project, was dedicated to developing a free operating system. To do so, he became the spiritual leader of free software. His famous 'serious biography' states that fee-based software makes users helpless and independent, unable to share or replace. A free operating system is essential when people use computers freely, and S began his career as a hacker while attending MIT. And he has become a professional hacker in projects such as E. He harshly criticized the use of computers to intervene in the lab. Whenever a password for a lab computer is installed, he has to break it and set it to an initialized state. Then send an email to the user of this computer. Notify them that the password has been removed. S's journey to free software began with the printer. The first printer bought by MIT Artificial Intelligence Lab came with the source code of the driver. The hackers at MIT AI Lab can fix the printer driver bugs themselves or modify the printer driver according to their needs, which brings great convenience to their work. Later, MIT bought another laser printer, this time only providing a binary printer driver, which was the only software at MIT that did not have source code. RS wanted to modify the driver for work, but he couldn't. Because he doesn't have the driver source code. This brings a lot of inconvenience to the work. It also made S realize the value of free software, and S is still committed to the development of free software. He was opposed to the protection of digital copyright, believing that the act of attaching source code was ethical. He has received many awards, including many awards, as well as honorary doctorates, and is currently a member of the National Academy of Sciences in country M.
5.TS: TS's fame was unfortunate in that he was attacked by the hacker KM, and later he made it his career to help the FBI capture KM in Country M. TS's capture of KM is commendable, but in the process, TS also hacked into AT&T Telephone's servers to listen to calls on Capitol Hill. On one occasion when he was listening to a Capitol Hill call, an FBI investigator was with him. S USED HIS OWN MODIFIED VERSION OF TCPDUMP TO RECORD KEVINMITNICK'S ATTACK ON HIS SYSTEM. With the help of a telephone company's technicians, Mitnik's apartment was located by analyzing the frequency direction detection antenna and analyzing the modulated signal carrying the bearing information. He later wrote about it in a book, which was later adapted into a movie.
And if the three-year-old child Gu Xiaolong wants to enter any computer host or terminal, there is no need to be so troublesome, as long as the other party has any information, such as ciphers, firewalls, interfaces, etc., or there is a piece of information, network cable, power cord that can be linked to this terminal computer or host, he can enter unimpeded arbitrarily, and there is no footprint at all, all the information will be perceived by him with the neutrino-sized Zhou Tian Mind Energy Field, and no one will know that someone has ever visited the Dao.
Maybe it's the child's playful temper, when he entered the GUI Valley host of country M, he found that this is the most difficult to decipher the host in the world today, on a whim, he immediately used his own supercomputer brain, coupled with the feeling and perception of his own neutrino size Zhou Tian's mind energy field, and it was only a few seconds to easily enter the host system of GUI Valley, and in just a few seconds, all the computer data information of the host system of GUI Valley and even the terminal entered his supercomputer brain.
This can cause a big trouble, the CIA of country M has been monitoring many high-tech technology enterprises in GUI Valley day and night, once it is found that there are visitors from country C, they enter the host of GUI Valley in a grand manner, and extract all the hosts, terminal information, data, and immediately report to the Pentagon and the White House of country M, and country M immediately lodged a strong protest to country C, and it is justified and factual. The National Security Bureau of C was also taken aback, and immediately traced it down, only to find that it was a three-year-old child who entered the other party's host system in a grand manner, and the purpose of entering was just to learn and have fun. The ambassador of country M to country C personally questioned the three-year-old child and reported to the Pentagon and the White House of country M: Country C has produced a prodigy who is even more superhuman than Superman, and all the secrets of country M and the blue planet in the future will no longer be secrets, as long as this three-year-old child wants to know the way, there will be no secrets, and any laws and constraints will be pale and powerless in front of this only three-year-old child. (To be continued......)