No. 017 Hackers

No. 017 hackers

Starting the reserved computer of the Internet café, Wei Dongsheng first entered a string of high-strength passwords, aimed at the microphone to recognize the voice features, and aimed at the camera to recognize the face and pupil features, and successfully activated the subsystem of cyanobacteria lurking in the Internet café.

Cyanobacteria are computer intelligence life rooted in integrated circuit components, and the invasion routines of contemporary hackers cannot escape its five fingers. However, cyber security attack and defense technology pursues not only to keep out the enemy, but also to fight back against intruders to obtain the opponent's accurate IP address.

In order to confuse the intruders, Cyanoza encountered a hacker invasion and first disguised himself as a home computer and guided to the decoy computer that Wei Dongsheng had prepared for him. The decoy computer stores many mainstream plug-ins, many source programs of unknown significance, and many video files that seem to involve secrets. Decoy computers have relatively low bandwidth, and hackers will spend a lot of time flipping through them online or trying to download them. Wei Dongsheng found the accurate IP address of the other party, and if he had the power to mobilize the local police force or other forces, he could take advantage of the time difference to arrest the culprit on the spot.

Unfortunately, the hacker was very alert.

Cyanobacteria records show that he began his invasion at 12:10:11, rummaging through the scattered source code files of the decoy computer, and quickly exiting at 12:13:46. The hackers spent only three minutes and thirty-five seconds on the decoy computer, after which they frantically cleaned up the traces of the broiler springboard, apparently keenly aware that the bait computer was a trap.

However, the technology generation gap is the technology generation gap.

The hacker tried to hack into the Internet café at 12:10:11, and Cyanobacteria reversed his inversion at 12:10:15, leaving his real IP address in the record: somewhere in Haxingerbin City, Longjiang Province, Heixing. Cyanobacteria is developing, and the current network security function module is limited, so it is not possible to quickly analyze the real identity of the hacker for the time being, and can only know that he is surfing the Internet somewhere in Haxingerbin City, Longjiang Province, Heixing, but it is impossible to determine whether he is a local household registration or a guest living here.

Wei Dongsheng was analyzing the hacker from Haxingerbin City, when the blue-green algae suddenly warned that a new intruder had been discovered. Cyanobacteria automatically reverse reverse intrusion, showing the real IP address of the new hacker: somewhere in Suxingzhou City, Jiangxingsu Province.

Wei Dongsheng was about to investigate the hackers in Suxing City, and the blue-green algae red font warned that a new intruder had been discovered: from a certain place in Chengxing City, Sixingchuan Province.

Okay!

Bait computers have become a busy city.

The hacker from Suxing City and the hacker from Chengxing City quickly discovered each other, and the two couldn't help but fight. The fight was fierce, and the blue-green algae red font warned that another Yanjing hacker had come, and the Yanjing hacker was stronger, and he kicked the Su Xingzhou hacker and the Chengxingdu hacker like a dragon across the river, and methodically flipped through the bait computer. However, the Yanjing hacker quickly discovered the inappropriateness of the bait computer like the Haxing Erbin hacker, and calculated the time he kicked the Su Xingzhou hacker and the Chengxing hacker, and only stayed for two minutes and twenty-seven seconds, and began to frantically wipe the traces of the broiler springboard, and fled in embarrassment.

You sang and I appeared, and after the Yanjing hackers, there were three waves one after another.

Wei Dongsheng vaguely understood that these hackers did not rush together by chance, but consciously used social engineering. Generally speaking, you need to have lunch at noon and need a lunch break, and the probability of staying in front of the computer is relatively low. Ordinary netizens are just that, and it is difficult to detect hackers when they stay in front of the computer. But the tricks between masters, attacking an unguarded computer and attacking a guarded computer, are definitely two concepts and two difficulties. These hackers overestimated Wei Dongsheng's combat effectiveness and consciously chose this point in time at noon.

The question is, why?

Why are game studios getting so many hackers?

It's a pity that cyanobacteria has been around for too short a time, Wei Dongsheng mainly guided it to load encrypted function modules such as voice feature recognition and face recognition and pupil recognition last night and this morning, and only a few simple functional modules such as permission control and IP tracking were loaded in terms of network security, making it difficult to really fight back against those cunning and clever hackers. It seems that the Haxing Erbin hacker and the Yanjing hacker noticed the inappropriateness of the bait computer within two or three minutes, and immediately erased all traces of the broiler springboard, and it was difficult for Wei Dongsheng to fight them with his network security attack and defense technology.

Wei Dongsheng was depressed when Cyanobacteria suddenly warned that another Shenhai hacker had arrived, and tried to download all the sensitive content stored by the bait computer.

Wei Dongsheng was stunned: Ya is very ostentatious, he started downloading as soon as he entered the door, and the target was all sensitive content.

However, Wei Dongsheng glanced at the detailed address of Shen Hai's hacker, and suddenly felt familiar: "Huh? ”

Wei Dongsheng once again determined the detailed address of the Shenhai hacker, and couldn't help complaining: "I'll go, this is the main master!" ”

The real IP address of the Shenhai hacker turned out to be the headquarters of the legendary operator Shengxing Network. Obviously, Wei Dongsheng became famous for some reason, alarming a group of hackers, and also alarming the main Shengxing Network.

Wei Dongsheng never dared to underestimate the cyber security energy of large Internet companies, you must know that the elite of hackers will one day go ashore to launder their dreams in order to make a living, and the security departments of various Internet companies are often their best destination.

Tracing the history of hackers in Huaguo, the Green Corps, founded in 1997, is a key word that cannot be bypassed, and it is known as the Whampoa Military Academy of Huaguo hackers. In July 2000, the Green Corps split due to internal disagreements and its personnel were displaced. In April 2002, the Internet Society of China announced a stop to organized attacks and denied the so-called Red League gathered under the banner of patriotism. The vast majority of hackers are not willing to lie dormant in the night, and have gone out of the mountains to find new support.

Whether it's a hacker or a white customer, the technology is real.

After this group of top hackers came ashore, they were immediately invited by Internet companies.

For example, in the previous life, the big brother of the Internet company Tencent, the leader of its Xuanwu Security Lab, was Yu Yang, who was born as a medical student and was nicknamed the "Holy Hand of Gynecology" by netizens. Yu Yangyuan worked for NSFOCUS Technology, and NSFOCUS was a predecessor of NSFOCUS Technology, which was the famous Green Corps.

Another example is that Netstar Yi News quoted the five major hacker masters who were promoted by the East Evil and West Poison, the Southern Emperor and the Northern Beggar, even the most controversial and even ridiculed as "ping him", Wan Tao, also established the Eagle Eye Safety Culture Network to entertain himself. After the Five Uniques, there are two Chen Sangongzi who are particularly famous, one is Chen Sanyan, and the other is Chen Xingdanian.

Chen Xing Danian is Chen Xing Tianqiao's younger brother.

Chen Xingtianqiao is the head of Shengxing Network.

Wei Dongsheng will never underestimate Shanda Network's network security technology background.

Wei Dongsheng's achievements in his previous life were limited, although Xiaofu Xiaogui had his own career, he had no channels to contact Chen Xingtianqiao and Chen Xing Danian. has never had in-depth communication, nor has he been mixed into their circle network, Wei Dongsheng naturally doesn't know their details. Wei Dongsheng couldn't determine the intention of Shengxing Network, did he want to appease Wei Dongsheng with good intentions, or was he ready to kill the game studio from the source with malicious intentions?

The art of war is cloudy, and the enemy is lenient.

Regardless of the purpose of Shanda Network, Wei Dongsheng decided to first raise his own value and increase the cost of the other party's decision-making.

The technical personnel want to raise their value, which is nothing more than to show their technical level in the confrontation, so that Shengxing Network understands that Wei Dongsheng is not an ordinary plug-in maker, but the top hacker standing at the top of the food chain. Wei Dongsheng's own network security attack and defense technology can't do this, but he has a black technology that transcends the times - computer intelligence life cyanobacteria.

Wei Dongsheng ordered the blue-green algae to invade the opponent's system and quietly took the highest authority. The opponent uses a laptop and has a Linux system installed. Slightly different from the indos system, the txt notepad that users of the indos system are familiar with, corresponds to vi in the Linux system; The office_ord that users of the indos system are familiar with is vim in the Linux system. Wei Dongsheng preferred vim, announced his arrival simply and straightforwardly, and typed in a few lines of big characters: "The studio is in urgent need of money, and I implore your company to uphold the morality of emergency relief in the rivers and lakes and release the guillotine slowly." In the past, now, and in the future, I will strictly control the amount of equipment released, and do my best not to affect the normal operation of your company. ”

Wei Dongsheng was unwilling to negotiate with the other party and even leave a handle, unilaterally asserted sovereignty, and immediately retreated to the nest after saying a word, kicking the other party out of the bait computer. In order to show his refusal to communicate more thoroughly, Wei Dongsheng ordered Cyanobacteria to block the IP of all Shenhai addresses, and even the bait computer was not allowed to enter.

The confrontation between Wei Dongsheng and the hackers from Shenhai Shengxingda Network Headquarters lasted only forty-seven seconds. At 12:47:18, the other party began to invade; At 12:47:34, Wei Dongsheng decided to show the level of network security technology; At 12:47:38, Wei Dongsheng invaded the opponent's Linux system; At 12:48:05, Wei Dongsheng kicked the opponent out of the decoy computer.

Starts forty-seven seconds ago and ends forty-seven seconds later.

After deducting the time to start the vim editor and the time of the codeword, Wei Dongsheng almost instantly invaded the headquarters of Shengxing Network, and Shengxing Network should be able to clearly understand Wei Dongsheng's strength. If Shengxing Network insists on tearing its face, or banning all accounts for game work, or using its influence to block game studios or hunt down Wei Dongsheng in reality, it will definitely do more harm than good to win.

For more than ten minutes after that, there were no new hacker visits. Wei Dongsheng speculated that there should be two reasons, the first is that the noon break is coming to an end, and he has lost the advantage of social engineering; The second is the failure of the Haxing Erbin hacker, the Yanjing hacker and others, which dispelled the tentative idea of the secondary hackers.

However, as Wei Dongsheng was about to leave the computer, Cyanobacteria unexpectedly warned of a new hacker visiting.

Wei Dongsheng sat back on the computer, directly reversed the invasion, and was surprised to find that the other party's computer was actually open to the camera. The camera that comes with the laptop, the department suspected of keeping it secret will be banned by the department of the company with a sticker, not to mention the hackers wandering in the black rivers and lakes? But how confident should this newcomer be when he uses a desktop compatible machine and doesn't turn off the camera?