Chapter 43 System Vulnerabilities

Sure enough, what the engineer said was true.

Just a few minutes later, as the hardware system of the computer system was parsed and the data of the operating system was scanned, the mapping work lasted less than half a minute, and it was completely over.

So far, all the details of a computer, including all its hardware facilities, operating systems, and various software systems installed on it, have been surveyed and mapped, and a complete set of data information files have been established.

The engineer did not need Sima Mulong's other advice, and he had already started the next step of system analysis on his own.

Under a comprehensive and systematic analysis, the content of the manor map was once again greatly rewritten, and I saw that special markers began to appear one after another on the various infrastructures of the manor.

Each of these markers is a system vulnerability that exists on top of the hardware, some of which seem innocuous on the surface, but the combination of several vulnerabilities can make people enter and exit a computer as if they were in a no-man's land, and they can take whatever they want.

And on the bodies of the members of the manor represented by the various applications, there are countless symbols and markings, and each animated villain seems to have been marked with acupuncture points all over his body, or put on a set of colorful clothes.

These special markers are the system vulnerabilities that exist in various application software, and through these system vulnerabilities, all kinds of unbelievable operations can also be completed.

There are vulnerabilities that allow people to easily break into a computer with the software installed. And some vulnerabilities can be used as a springboard to invade the servers of the companies to which they belong. At that time, it is easy to obtain a large number of user profiles.

As for the system vulnerabilities that can cause hidden dangers such as password leaks, they are simply pediatric here, and they are not worth mentioning.

And with the completion of this analysis, what kind of demons and monsters exist in Sima Mulong's entire computer, and since then all the original forms have been revealed.

In that animated version of the manor, you can clearly see that many employees turned into applications are doing their own small actions sneakily while providing services normally.

Sima Mulong took a closer look, yes, which is a part, it is clearly the whole thing, there is no exception, the difference is only how ruthless it is.

The software and applications on the computer were not completely parsed before they were completely analyzed at first, and some of the local applications were playing some small tricks, secretly uploading some of the owner's operating habits and browsing records.

Now that it has been investigated, it has suddenly become a good person in Hongdong County, and some applications that originally seemed to be nothing unusual and seemed to be honest have now become ugly.

Although it is its own computer, after the network, there are already dozens of large and small companies stationed in the computer, and there are all kinds of virus-like things, and they all enjoy the right to use the computer, each doing their own private work, and frequently peeping at the owner's various information, and handing out news at any time.

In contrast, it's just a collection of some user habits, but it's the lightest plot, some of the more serious, that is not let go of any information, the user's identity information, contact information, account password, bank information, that really is where to look at it.

The original owner is poor to death, and he hasn't opened an online bank or anything, otherwise he would have rushed to this scene, not to suffer a little loss, and let the family cheat a few dollars, then it really seems that people are panicked.

Sima Mulong also laughed angrily.

Although he also had this idea, and he wanted to rely on this net to make a profit, and even what he wanted was dozens or hundreds of times more than what these people wanted, but looking at the actions of these guys, Sima Mulong still didn't like it.

His face was a little blackened!

Perhaps, this can also be called peer jealousy.

Anyway, I can do this, but when I see that you are doing this too, I am a little angry and come out of one place.

"Engineer, give me all these viruses, as well as all kinds of software overt and covert, in short, I don't want to see the existence of any system vulnerabilities in my computer, block them for me, and suspend all applications for me first!"

Sima Mulong ordered angrily, he was still a little unrelenting about this, and instead thought about turning around and cleaning up all the things.

"Engineer, is there a way to get into the lair of these guys and control them all? This is called big fish eating small fish, small fish eating shrimp, these people used to eat my computer as shrimp, then don't blame me for treating them as a small fish. ”

The engineer hesitated slightly, "Master, it's not that difficult to hack into their server in turn, but if we are in a hurry now, even if we fight back, there is no strength to speak of, and it may leak our existence, which is probably a bit more than worth the loss......."

Sima Mulong also came back to his senses, he has just established a system model for a desktop computer now, in this Internet world, the share is probably less than 1/10,000, although with advanced technology, you can gain insight into the existence of various vulnerabilities, but, these guys who have viruses and start companies, none of them are easy to mess with, I'm afraid even if there is no supercomputer, at least everyone is not short of servers.

Now, I still know very little about the server, although I rely on some system vulnerabilities at hand, I may not be able to sneak in, but I really want to make some big moves, and I am not familiar with the system structure in others, I am afraid that I will miss some horses or something, which is also inevitable.

Forget it, you can't lose a big one because of a small one, and let them go first, and then settle accounts with them later!

Sima Mulong touched his nose stupidly, and explained to the engineer, "Okay, let's put this matter on hold for the time being, but you can record them for me first, and then clean them up one by one when the conditions are ripe!"

The engineer said yes again and again, his hands and feet were numb, Sima Mulong just gave instructions in front, and he had already finished the work later, and the voice here had not yet fallen, and he had already sealed the loopholes on the computer over there, and he had also closed the applications that should be closed, and he had also taken care of some messy things in those applications.

Even the characteristics of the virus, the traces when they invaded, the clues they pulled down, and so on, were all recorded, and a long list was pulled down, just waiting for the other side to do another game with these guys.

Seeing Sima Mulong's face better, the engineer also hurriedly crossed the topic and said, "Master, you don't need to worry, none of these people can run, since they have been here and left traces, they will be caught by us sooner or later, how to concoct it when the time comes, isn't it up to you?" Compared with our technical means, they are simply weak, sooner or later they can't run away from them, you can't miss your business, this is the key. ”

As he spoke, the engineer counted the process of the gang of heymen.

Speaking of which, most of these hey customers are only superficial.

As a standard intrusion process for Heike: they usually find an IP first, and then take out the scanner to scan it, according to the results of the scan, if you have an understanding of the host being scanned, know the details and vulnerabilities inside, break through the security settings (find the front door, type the correct password, or find the vulnerability), enter the host, and the matter is done.

But this thing is simple to say, if you really want to do it, you have to accumulate deeply, and you can't decide how long you will be immersed in hard practice.

If you want to enter a host, you have to understand its security rules, you have to try, you have to explore the scan, you have to try, you have to attack, you have to study the data, you have to study the model, if you have a ready-made vulnerability, if you don't, you may even have to use the theory of social engineering, rely on the existing information, pretend to be the staff of some unit or company, get relevant information, experiment with passwords, and finally break in.

Therefore, these hey customers, sometimes they can't tell whether they rely on technology or deception, in short, they also have their own difficulties.

Being a hey guest is not only difficult, but also very dangerous, and he will die when he sees the light, either he will be arrested by the government, or he will be used by people in the rivers and lakes, in short, it is far from being as beautiful as imagined.

Those legendary monthly salaries of tens of millions, calling for wind and rain on the Internet, extorting large companies if they want to extort large companies, and making millions of top hey customers with random shots, are really rare, and they can't learn at all.

Generally, the little hey who has just debuted, that is, with ready-made tools, sweeps east and west on the Internet, and it is easy to catch a zombie and form a small zombie network, and he is so excited that he is like something, in fact, in addition to peeping at other people's personal **, there is no use for fart.

Think about what secrets can be put on the computer of ordinary people, if you want to make money from this aspect, it is a big net to scatter fish, batches and batches have to try, one by one has to touch, many of them rely on gangs to commit crimes, win by quantity, how many levels, how many downlines, in order to really make money, taste the sweetness of profits, and usually can do this, are already senior elite heyke.

Don't look at the variety of viruses and traps on the Internet, there are so many people, and it is rare to really be able to do this.

"These hey customers, compared to us, it is not a realm at all, low-end, they are too low-end!"

"However, although these people are low-end, but that is also compared with us, the technical gap is too big, that is bullying them, to be honest, technically, they are worthy of the elite of the times. ”