.Twelve formal security expert groups and twenty-seven preparatory expert groups of the International Intelligence Bureau of the Ministry of Foreign Affairs are entangled with endless defense at the core server of the Tokyo Metropolitan Self-Defense Force, and ambitiously trying to capture Mr. M.
But they didn't know that this was simply a trap set by Shi Lei!
The defense mechanism of endless defense is very simple, and only knows the most basic things, rejection and deletion.
Invade in through the port or pretend to be normal access, then it will be directly denied; Trojans, viruses, malicious data packets, and garbage data packets will be directly deleted... .
Although this defense method is simple, it is very suitable.
The simplest way is, this is the reason. The simpler the way, the less resources the computer consumes, the faster the reaction speed, and the higher the load pressure ability!
To give a simple example, there are three main ways to determine whether an unknown file is a virus.
The first is the most common and the signature structure judgment of all antivirus software. Major security manufacturers have captured virus samples from the large number of honeypot systems arranged, analyzing the virus signature code, and then establishing a huge virus signature database. When a suspicious file is found, the unknown file structure is first analyzed, including a series of shelling techniques, etc., to obtain the signature code of the unknown file, and compare it with the virus signature code of the virus database to confirm whether it is a virus file...
This method has a very popular cloud security in later generations. In fact, it is the anti-virus software uploads the signature code of unknown files. The virus feature library on the server side is a virus. It is still just a basic and common feature code comparison. It has become a cloud security that has been hyped up and brags about something that fools people!
The second method is gene code, which is the upgrade system of the signature code. In fact, it is also a signature code. Each signature code can only correspond to one virus, but one gene code can correspond to one gene series virus.
Although they are both characteristic codes, the gene code effectively reduces the amount of data in the virus characteristic library.
The third method is called inspiration. The principle of this method is somewhat related to endless defense. It judges whether a file is a virus program by comparing the differences between unknown files and normal programs.
There are two ways of inspiration, one is dynamic inspiration and the other is static inspiration. Static inspiration is to decompile the static code instruction sequence to understand the real motivation of an unknown program and determine whether it is a virus.
Dynamic inspiration is sandbox technology, which creates a sandbox environment through antivirus software. Let unknown files run in the sandbox, check what behaviors the unknown program will do, and determine whether it is a virus.
Dynamic inspiration has a big disadvantage. Establishing a sandbox environment will consume a lot of system resources, resulting in a scarcity of computer system resources, causing normal operations to experience hysteresis and stuttering.
What is doing well in this field is Kaspersky, which has the best antivirus effect. But just like its name, it is also called "Kabo crash"!
The above three methods show that no matter which method, a lot of work is required to determine whether an unknown file is a virus program. Doing a lot of work will occupy a lot of system resources, whether it is CPU computing resources, internal storage resources, or other system resources.
It occupies a large amount of system resources, causing poor load capacity of computer equipment, which is slightly more serious. It will cause computer equipment to stutter or even crash!
And Endless Defense only has one step to determine whether an unknown file is a virus!
Just make sure it is a protected file!
If not, delete it directly, and no more work is required, which reduces the pressure on the system a lot.
So, facing the 39th Group, the security experts from the International Intelligence Bureau of the Ministry of Foreign Affairs, endless defenses came down!
After Shi Lei inspected the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs, based on the No. 1 server, he formed a cluster server with the supercomputer Yan and No. 3 server to jointly attack the official website web server.
Due to the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs, it adopts Microsoft's IIS server and uses Asp technology to build it, Shi Lei has a very deep understanding of Microsoft's system!
Controlling the supercomputer Yan, without causing any reports, Shi Lei obtained the low-level permissions of the web server. Then, based on the low-level permissions, he gradually increased the permissions.
First obtaining low-level permissions, then escalating the permissions, which is safer at some point than directly obtaining super permissions. Especially when Shi Lei scans the web server of the International Intelligence Bureau of the Ministry of Foreign Affairs, he found a reporting mechanism connecting to the internal LAN, and it is controlled separately. It is difficult to undo it.
The International Intelligence Bureau of the Ministry of Foreign Affairs, as the largest intelligence agency in the country of Vosang, belongs to the internal network and only a few nodes have links to the external Internet.
The connection to the web server is a node.
However, when Shi Lei obtained super permission, he finally discovered a big problem!
‘Damn it, it’s one-way data!’ Shi Lei snorted coldly in his heart.
The so-called one-way data is a derivative of a one-way link web page technology. If the official website web server of the Ministry of Foreign Affairs International Intelligence Bureau is regarded as a, and the internal data server of the Ministry of Foreign Affairs International Intelligence Bureau is regarded as b.
One-way data means that b can access a, transmit data to a, and browse all situations of a, but a cannot transmit data to b, and b cannot b.
Even if a's data service request can only be kept at a, b arrives at a for access and reading, and then reply to the corresponding data request.
If it is an ordinary hacker, there is no way to encounter such one-way data. After all, web server a cannot send any data to internal server b, and can only be independently explored by server b.
However, Shi Lei is a world's peak-level hacker. Even if one-way data can block many people, Shi Lei is definitely not included among the people who block it!
Shi Lei directly entered more than 100 lines of code into the web server, and then chose to execute the code.
There are more than 100 lines of code execution, and these data requests will cause memory overflow and cause the data server of the International Intelligence Bureau of the Ministry of Foreign Affairs and the internal LAN to be suspended instantly.
At the moment when the service is aborted, the one-way data limit is naturally lifted, and two-way data communication is restored. Memory has error checking and correction functions. Before memory recovery, enter the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs.
Shi Lei owns the supercomputer Yan, and is also connected to the No. 3 server of PKU. Through the special cluster system of the No. 1 server, the two supercomputing resources are gathered together and quickly invaded the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs.
Entering the International Intelligence Bureau of the Ministry of Foreign Affairs. Shi Lei did not act rashly or attempted to tamper with the data. Instead, he implanted the backdoor program written in advance and implanted the system bottom layer of the International Intelligence Bureau of the Ministry of Foreign Affairs. The plan permissions were approved. Shi Lei had entered the International Intelligence Bureau of the Ministry of Foreign Affairs and clearly knew the server situation of the International Intelligence Bureau of the Ministry of Foreign Affairs.
Therefore, the backdoor program written by Shi Lei this time uses assembly language. It sinks directly into the bottom layer of the system, which is very concealed and inconspicuous, making it convenient to enter the International Intelligence Bureau of the Ministry of Foreign Affairs next time.
After processing the backdoor procedure, Shi Lei prepared to go to the top secret database of the International Intelligence Bureau of the Ministry of Foreign Affairs to see if they have any needed information.
However, just as Shi Lei was about to check the top-secret database, the web server of the International Intelligence Bureau of the Ministry of Foreign Affairs was attacked again!
If it's just an attack, that idiot hacker actually forcibly attacking the web server without any concealing his behavior.
Not only that, after obtaining low-level permissions, the new hacker actually tampers with the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs and left public messages to provoke!
‘Mr. m, aren’t you that awesome? Why are you besieged by the International Intelligence Bureau of the Ministry of Foreign Affairs? The great Raphael is waiting for you here. Do you dare to come?’ Raphael
Shi Lei was almost so angry that he vomited blood when he looked at this message!
What does it mean to have a narrow road to enemies and what does it mean to be self-tricked? This is now!
Raphael thought that Mr. M's vest was collectively besieged by the International Intelligence Bureau of the Ministry of Foreign Affairs in the Tokyo Metropolitan Self-Defense Force. Taking advantage of this opportunity, Raphael showed off his power and hacked the official website of the Ministry of Foreign Affairs International Intelligence Bureau, leaving behind a language that humiliated Mr. M.
But this backfire caused the news from the International Intelligence Bureau of the Ministry of Foreign Affairs and the web server to make the experts of the International Intelligence Bureau of the Ministry of Foreign Affairs feel that they will definitely return to their nests.
In this way, Shi Lei's invasion of the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs will definitely be exposed.
Shi Lei, who was angry and embarrassed, quickly returned to the web server and found Raphael's connection IP address record, preparing to save the record, and then leave it in the web server, so that the International Intelligence Bureau of the Ministry of Foreign Affairs can deal with Raphael.
However, that bitch Raphael is worthy of being a hacker at the peak of the world. He is actually copying Shi Lei’s connection IP address record just like Shi Lei’s idea!
‘Raphael of the dog, you are forcing me!’ Shi Lei was angry and did not disturb Raphael. Instead, he found the top secret information of the intelligence department in the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs, and selected a file called "So Plan" and disguised it as an attempt to view and copy it.
Then change the connection IP address to Raphael's connection IP address!
On the web server, Shi Lei pretended not to discover Raphael's action and asked Raphael to connect his temporary broiler to the IP address and reserve it in the system record.
Raphael thought he was doing everything perfectly and was not discovered by Shi Lei.
But Raphael made a fatal mistake!
(To be continued.)
ps: Please subscribe to "Hacker" within 24 hours to give positive energy to the mountains! This month's update method, single ri 3 updates, double ri 4 updates, the old rules of 0:00, 12:00, 16:00, 20:00. Please everyone! Let "Hacker" go further! The lonely and the night is in the sky, reminding Xingyu 1, reward 588. Friend 0402, top secret flight, eternlty, reward 100.