Chapter 73: Exploiting System Loopholes. Advanced hacking red domain skills, scanners

"Comrade Li Xiu, at your level, it will be a little more troublesome to report."

At the beginning, he felt that Li Xiu was just an ordinary novice, so as long as he looked at the software, he could see the level.

But now, a little more complex testing is required.

And.

At present, there are very few people in the information department, and it is in the development stage. So the section chief is also eager to find talent.

Li Xiu's talent for appreciating food and eating made him a little greedy.

He was thinking now that when Li Xiu finished his military academy examination, he would find a way to transfer Li Xiu to the Information Department.

It is a waste for this kind of talent to go to the grassroots troops.

As for now, the section chief has no idea yet.

At the very least, the military academy is to be attended, and it is more conducive to Li Xiu's development in the military academy.

"Come, Li Xiu, will you try this?"

After thinking for a while, the section chief pulled out a chair and let Li Xiu sit on a stool, and at the same time, turned on the computer.

At the same time, the section chief opened a page, and a list of tasks appeared on it.

Li Xiu walked over and saw the content directly on it.

On the side, there is also a word 'Advanced', which represents difficulty.

Li Xiu opened the first test, and a new page immediately appeared.

"Please test the trial program, look for vulnerabilities that arise when the program is running, and fix them."

"This is for our subject test. Why don't you try the first one? ”

The section chief explained.

Then, he said: "Because the task is more difficult, if you don't have ideas, you can try the previous task first." The previous one should be simpler. ”

Li Xiu nodded, and said, "No problem, but it should take a while."

"Is ten days enough? Don't be pressured, just give it a try. The section chief said.

"That's enough." Li Xiu responded: "But now that I have returned to the army, I have to follow the basic training of the army." ”

"It's simple, I'll just contact my superiors for secondment. Also, without a secondment order, you can't use intranet permissions. “

"Okay."

For this proposal, Li Xiu's heart moved.

I don't know, does a secondment count as joining?

If there is an opportunity to drill into the system. Then you will have a chance to complete the task.

Naturally, Li Xiu agreed.

Subsequently, Li Xiu went out to explain the situation to the company commander.

Geng Jun was a little reluctant at first, and he was also worried that Li Xiu would be poached.

After all, in the information department, this kind of treatment is very high, in case Li Xiu is poached all of a sudden, he must not die?

It wasn't until Li Xiu promised to go back after a few days of secondment, that he left.

After Geng Jun left, Li Xiu returned to the computer room of the Information Department and began to operate.

First, I used the vulnerability scanner on my computer to scan it, but as expected, no vulnerabilities were scanned.

Since this task has been said by the section chief, it is more difficult and certainly not simple.

I had no choice but to try something else. Open the development environment software, set up the development environment, and then Li Xiu began to crack the code on the mechanical keyboard.

In his previous life, he was an amateur celebrity, but he still remembers the algorithm architecture of the vulnerability scanner he developed with his mentor. You only need to change the content slightly to make it adaptable to the win98 system, and you can use it.

This software is much more powerful than the general vulnerability scanner published on the Internet. Li Xiu wanted to try if this one could scan out the loopholes.

At this time, Li Xiu also had a little regret, if he joined the Information Department and obtained the 'Advanced Hacker Red Domain' skill, he would probably be able to write a more powerful vulnerability scanner.

If it is seconded, I don't know if this loophole can be exploited.

If he can't, he just gives up.

Still, he decided not to join the Information Section because of the award.

Writing code, Li Xiu wrote it very easily.

The Information Department has an independent network and a very large resource information database, in which Li Xiu can find some technical documents, resource knowledge and tools.

At this time, if it is a domestic network, there are not many resources, but in the resource library, there are a lot.

About an hour later, the section chief leaned over to take a look and said unexpectedly, "Writing a vulnerability scanner?" ”

Li Xiu nodded and immediately said, "Yes." ”

The section chief nodded, he was already looking forward to Li Xiu's performance.

"No, this is a secondment notice, which is equivalent to your leave slip. In our Information Section, we work eight hours a day. More than you have in the company free time. ”

"Come here and sign it."

Li Xiu did so and signed.

Subsequently, the section chief did not bother Li Xiu.

At this time, an electronic voice suddenly sounded in Li Xiu's ears: "Star!" Congratulations to the host for completing the main quest, the informatization special operations special, and the reward for advanced hacker Red Field skills. ”

Suddenly overjoyed in his heart, Li Xiu didn't expect that he would really succeed in exploiting the loopholes in the system.

After ten days on secondment, he was really rewarded.

Open the panel, just like he thought.

The advanced hacking Red Domain skill, like sniping, is divided into many small items.

Hacking, cracking, compiling, decompiling, analyzing, etc.

Each small skill is followed by a proficiency experience column.

"It's a big gain." A flash of excitement flashed in Li Xiu's eyes.

Advanced hacking red domain skills, the main focus is on invasion and cracking. The liver is full of experience, and no matter how strong the defense system is, it can't stop him.

Of course, he has to continue to improve his experience, otherwise this thing is just an ornament.

Only hard work can be rewarded.

System skills are equivalent to a learning accelerator, and everything is based on the premise of his real efforts.

In the following time, Li Xiu basically entered the retreat mode.

Writing a vulnerability scanner is an intrusion process.

A vulnerability is a flaw in the specific implementation of hardware, software, protocols, or system security policies.

Hackers have to find vulnerabilities or induce flaws in their systems to have a chance to break in.

In the process of Li Xiu's writing of the vulnerability scanner software, Li Xiu's [Invasion] skill experience pillar was also rising slowly.

At the same time, there is also a huge amount of feedback from the volume king value, as well as a variety of invasion methods and routines in his mind.

Li Xiu didn't have much experience in virus writing before, and now, his mind is full of all kinds of virus materials, writing code, packing methods, etc.

A virus is a set of computer instructions or program code that replicates itself.

In addition to sabotage, there are various other functions, such as surveillance, interception of data, attack on system resources, etc.

"It's a pity, this time, the advanced red domain skills do not include anti-tracking, if I invade, there is no way to hide my traces. You can only attack with open cards. However, I can buy anti-tracking skills by accumulating volume king points. ”

Li Xiu sighed.

That's where it's a pity. It would be nice to give him the Red and Blue Gift Pack at the beginning.

After thinking about it, greed is not enough to swallow an elephant.

To be able to invade, it is already invincible. Anti-tracking also has a certain base of red customers.

Time passed day by day, and the progress of Li Xiu's software completion was also improving.

In the blink of an eye, five days passed in a blink of an eye, and the vulnerability scanner tool developed by Li Xiu was finally successfully completed.

Originally, Li Xiu expected it to take at least eight days to complete, but because of the increase in proficiency, it took Li Xiu five days to finish writing the vulnerability scanning tool.

As the [Invasion] skill pillar continued to increase, Li Xiu's level in this area also improved.

This software tool is more powerful than the one he developed with his mentor in his previous life.

Subsequently, Li Xiu immediately began to run the software and check the program.

Soon, the scanner found more and more vulnerabilities.

The first, the second, the third....

Loopholes have sprung up one by one.

These vulnerabilities are not easy to find. A vulnerability is a flaw in the system's security policy, which is not necessarily a lack of protection, but may be a place where the protection tool cannot be identified, or the protection can be ineffective through methods, that is, the protection capability is weak.

In short, no matter what kind of system, there will definitely be weak defensive capabilities.

The difference is that there are big and small defects. Whether it is hidden or not.

Soon, the scanner ran for two minutes and found four vulnerabilities.

Li Xiu did not hesitate and immediately began to repair.

About half an hour passed.

All four vulnerabilities have been patched.

……………………

"Report."

At the door of the office of the Information Department, Li Xiu made a report outside the door.

"Come in."

The door was not closed, and when Section Chief Li Quan saw that it was Li Xiu, he immediately smiled and spoke.

Immediately, Li Xiu walked in.

"The food in the information department is good." The section chief took a sip of hot tea, and when he saw Li Xiu coming, he immediately asked,

"The food is very good, I've been eating very well recently!" Li Xiu nodded.

"That's good. Say, what's the matter? ”

At this time, the section chief turned off the screen of the computer in front of him and said to Li Xiudao.

"Report, I've finished writing the software. Four vulnerabilities have been identified and have been patched. ”

"Around?" The section chief was a little surprised, aren't there only three?

It can't be that Li Xiu made a mistake.

"Section chief, is there any problem?"

The section chief shook his head and did not immediately express his doubts.

"Okay, I'll take a look."

Subsequently, the section chief came to the computer and opened the program and the vulnerability scanner written by Li Xiu.

Li Xiu was also beside him, and he also began to explain the types of computer vulnerabilities and the methods of invading.

The first few sections, the section chief didn't listen much directly.

After all, loopholes, as long as they can be found, are easy to explain.

He focused on the third one, which was beyond the scope of the answer.

And when he saw the specific explanation of this loophole, the section chief was also a little surprised.

He didn't expect that when the program was running, they would ignore such a loophole.

If the level of the intruder is very high, there is indeed a little possibility that the invasion will be successful through the method that Li Xiu said.

What surprised him even more was that the scanner written by Li Xiu was so powerful.

(End of chapter)