Chapter 102: I'm not afraid that the other party will change it again this time!
Replication is the basic function of a computer.
The bottom layer of the computer will have the replication function, and the implementation of the replication function does not require code at all, but only needs an execution instruction, but if you want to rely on your own computer to copy the data transmitted by other computers and not yet recognized, the difficulty is completely different.
Zhao Yi thought about making a 'hang IP suffix' data packet, and glued the packet to the information sent by the target host, so that the 'navigation' function of the IP could be realized, and the information would be dragged 'navigation'.
It's not copying, it's intercepting.
The target information was not copied, but was intercepted and sent elsewhere.
"Replication is too hard to do unless you can get more privileges or leverage the target host for replication. β
This is not something that can be solved in a short time.
If the target host is used to achieve the replication function, it is relatively simple, but it is also equivalent to controlling the target host, and the way is very simple, that is, to put it bluntly, it is to put a Trojan horse program.
"Hanging a Trojan must break the interceptor program and cannot be identified as a Trojan. Hiding is the most important, but it can be identified as soon as it is run. β
"It's as simple as destroying it, just make an infinite copy, or run it with some program......"
Zhao Yi shook his head.
Even if it is a Trojan horse program, the purpose is definitely not to cause damage, and it is meaningless to harm others and oneself, and it will involve serious legal problems.
The Trojan must not be destructive, and preferably have a self-destruct function......
Self-destruct function?
Zhao Yi suddenly remembered that in the Dota game, there is a hero called Goblin Engineer, whose ultimate move is to commit suicide directly, and it bursts out with great power on the spot.
In this way, the other party will not be able to get the head, and the effect will be good in the case of death.
"If the execution of the Trojan is a one-time thing, there will be no sequelae, and even if it is detected, it doesn't matter, it's just a one-time run anyway. β
"And a lot more at the same time?"
Zhao Yi's eyes lit up when he thought about it, and he immediately wrote it according to his ideas.
If the code is simple enough, it will be very easy to embed it in other software, programs, and documents, but it must have the advantages of being easy to put and execute, and not easy to be detected, otherwise it will be meaningless.
That's the hard part.
Zhao Yi decided to write it with the underlying code, which can be embedded in various places, and also directly call and execute some underlying computer functions to improve the ability of his own program.
Soon.
Relying on the ability of "The Law of Cause and Effect" and "Contact Rate", he completed the 'one-time Trojan horse framework'.
The next step is to add features.
Zhao Yi's purpose is to break the police website, it is best to find the management entrance of the website, put the Trojan horse on the computer of the police department, and copy the web page record information, which is a good choice.
This feature is too simple to implement.
Because they are all using the same operating system, the file path of the browser's default history browsing record, many of which are exactly the same, only need to use the underlying instructions to perform the copy function operation, and make a function to send to the specified IP.
However, in order to protect the period, he still decided to start from the bottom, first find the file path, and then copy and transfer operations.
Transmission is much more difficult than copying.
In order to transmit, a connection must be established, and the default IP host of the Trojan must also have a port for direct connection.
Zhao Yi made another receiving procedure.
The program must run all the time before it can receive the information transmitted by the Trojan execution.
Here's the final step β dropping the Trojan.
"Make a website with a Trojan horse, and hide the IP so that others can't easily find it?"
"Do you want to stop designing a program?"
"That's not right!"
Zhao Yi shook his head suddenly, his target was a police website, and it didn't have to be so complicated at all.
Open the listening log.
There were dozens of penguin accounts and passwords on it, and he logged on to check one, found a group related to policing, and then sent a group email with a Trojan document.
Landing on the second.
"Logistics director, Zhou Hongwen?" Zhao Yi looked at in surprise and found that there was no need to log in anymore.
This one Penguin can top ten!
......
On this day, Li Jiandong was on the night shift.
Compared with other police departments, the logistics department is relatively relaxed, and logistics is rarely used in emergencies, and the night shift of logistics is relatively relaxed.
Li Jiandong was not relaxed at all, he was worried that the police website would be hacked again, so he looked at the website link over and over again, and carefully paid attention to whether it had been modified.
He stared until eleven o'clock.
"It seems that it's okay, after hiding the management entrance, it is impossible for the other party to do anything. β
Li Jiandong exhaled lightly, and found that a group email notification appeared in the lower right corner, there was a new email in the penguin mailbox, he generally didn't care, most of them were advertisements and scammers, but this email was completely different.
It was an email from Director Zhou.
Li Jiandong hurriedly clicked on it and looked at it, and found that the email only had one sentence--
Let's take a look at the documentation below!
"Documents?"
Li Jiandong found out that the email was attached to the document, he clicked on it directly without thinking too much, and the document was opened in the browser, and there was indeed a lot of garbled characters in it.
"What's wrong?"
Li Jiandong didn't understand it for a long time, and he downloaded it and then opened it, but there were still a lot of garbled characters in the document, "Maybe it's a mistake, right?"
Li Jiandong didn't care.
He graduated with a bachelor's degree in computer science, and when he entered the police, he continued to do computer-related work, and he still has a certain degree of confidence in his computer level.
For example, the firewall on his computer has always been the highest protection, and the antivirus software on the computer is always turned on at any time.
As long as the firewall and anti-virus software don't prompt, you don't need to pay special attention to it at all.
Zhao Yi had just finished washing up and was about to go to bed, and after scanning the computer screen, he found that the program had received the information?
Someone opened the email so quickly?
He opened the document, and there were hundreds of links in it, and the function of the Trojan was to copy the last 100 historical links in a single execution.
It's kind of a casting net.
In fact, this is the case with the Trojan horse, and there is really some luck in how many fish you can catch by casting the net.
Zhao Yi used the Penguin to launch it at a fixed point, and his luck was also very good, he found a few connections related to policing, and opened them separately to find the management entrance.
After reading the suffix of the entrance, he had a feeling of sudden realization.
No wonder you can't find it!
This guy has modified the connection entrance to almost gibberish.
Zhao Yi tried a few record IDs and passwords, and then directly entered the management page, and then put the flash animation and link of the eagle flying, and also put a super difficult Olympiad competition question hidden.
Special reminders are also indispensable--
(Multiply the answer to the question by Ο is the password, come on!)
And then ......
"That's right!"
"This guy has hidden the management entrance, and it's really not easy to find it. Just embed a functional program directly in the source code of the website!"
Zhao Yi wrote it energetically.
It's easy.
He hid the program in the code of calling the database, loading pictures, and files, and the function was to display the connection of the management entrance, the management account, and the password in the three-level interface of a long news.
Of course.
The information displayed is scrambled and the others must not be able to understand it.
If you are an experienced programmer who is good at website design, you will probably find that something is not quite right when you see a part of the program in the website code that calls the database.
That also needs to be looked at carefully.
The garbled code of the three-level news interface,It's not easy to see it.,One is that there are too few people to visit.,The other is that one piece of news.,It's a very official way.γBasically didn't say anything.,It's a bit of a headache to look at.,It's estimated that it's difficult for someone to click on it within the police.γ
"I'm not afraid that the other party will change it again this time!"
Zhao Yi went to sleep satisfied, but kept thinking about programming in his head.
'Replication and listening' failed to do it, and I always felt very unwilling, and found the management entrance by dropping Trojans, and the means were a little worse.
But......
The Bomberman Trojan Horse framework is not bad, with high concealment, easy to launch, there are many places that can be improved, and it is also very useful and promising.
That's a reward.