HK054 Deja vu Yan Returns First Class Broiler Chicken
Ess Company, Xia Guo's name is Aikexin Company. It was founded in 1984 and is headquartered in Tokyo, Wasang. It mainly involves management consulting, software development, mobile network services, and Internet browsers! Browser, in Wasang
The share of China Mobile's equipment is quite high!
In order to use the name of supercomputer swallow, this company, which is mainly based on the Internet, applied to rent the use rights of supercomputer swallow from Tokyo University of Technology.
After finding this news, Shi Lei immediately searched the homepage of Aikexin Company through the Internet search engine. From the homepage of a company, you can know a lot of things, such as the company's recent situation, the company's financial statements, and even the individuals of company members.
Passwords, etc. can be seen from the homepage of a company! The browser partners are actually the two giants, ntt and Sony.
After browsing for a while, Shi Lei tried to scan the vulnerability of the Aikexin company homepage to enter the website. As a company in the IT industry, Aikexin company homepage really has its own du Li server, not a rented network service provider
, the server space provided.
After Shi Lei judged the server system, he immediately drilled into the server from an unreleased vulnerability. The server of Aikexin's homepage stored many files. Shi Lei browsed carefully and finally found him interested.
Something.
Aikexin company has few system resources for renting supercomputer Yan, so they have powerful servers themselves. The reason why they rent supercomputer Yan is just to increase the company's popularity!
Shi Lei actually found the login account and login password of the supercomputer Yan in the web server of Aikexin Company. It turned out that Aikexin Company gave the rented supercomputer Yan's account and password to every senior employee of the company.
Publish. They can use the part of the supercomputer resources rented by the company. This is not that Aikexin Company is generous, but that their own research projects are in need of confidentiality and cannot be sent to the supercomputer for processing, and they are reluctant to waste the supercomputer.
Yan’s resources. So senior staff were allowed to use the supercomputer Yan’s resources at will!
Originally this was a benefit of Aikexin Company, but now it has become a convenient channel for Shi Lei to invade the supercomputer Yan!
Shi Lei browsed all the web servers of Aikexin Company. After thinking about it secretly, he decided to use Aikexin Company's servers as a first-class broiler and officially prepare to invade the supercomputer Yan!
Aikexin's servers are pretty awesome!
This company has five core servers, forming a server group. The computing speed of each core server reaches 0.2 trillion times. The computing power of the entire server group reaches 1 trillion times per second, which is equivalent to one
A small supercomputer!
In 2006, the world's supercomputer ranking ranked 500th in the calculation speed was only 2.7 trillion times. In other words, the server group of Aikexin Company is definitely in the ranks of advanced in the world!
After deciding to use the server of Aikexin Company, Shi Lei began to invade Aikexin Company. Because Aikexin’s server group reached the level of a small supercomputer, Shi Lei carefully controlled the server No. 1 and scanned the other party’s server group to open.
port.
Shi Lei has invaded the web server of Aikexin Company, but the web server is only used for the company's homepage and to store some unimportant file information. The company's core information is all contained in a server group composed of five core servers!
The computing speed of server No. 1 was ultimately unsatisfactory. Shi Lei couldn't help but feel anxious, but he was helpless!
While waiting for the scanning results of server No. 1, Shi Lei fantasized that in that kind of science fiction novel, a broken notebook can blackmail the super power of satellites. If he also had that kind of ability that was against the will of heaven, how great would it be!
In hacking, intrusion, acquisition, and control have different meanings. For example, a server that stores confidential files does not intrude into the server and can obtain confidentiality.
There are many permission settings in the same server, and confidential files are generally equipped with du li passwords. Therefore, even if you obtain a confidential file, you may not necessarily get a confidentiality, and you still need to crack the password.
As for controlling a server, it is the most difficult! It is extremely difficult to obtain control of a server, especially the control of a high-level server!
Although the xing ability of advanced servers is very powerful and is also very enjoyable to use. But at the same time, the security policy of advanced servers and the server firewall are even more difficult to handle. And there are security guards!
Although Shi Lei knows many server systems and has not announced vulnerabilities, he is not at will. He will hack anyone who wants to. Every hacker intrusion will definitely establish a network link. After establishing a network link, data exchange will occur.
The security guards of senior servers observe data flow at any time, and any abnormalities will be discovered. For example, the server is compared to a pool full of water, and the network link is compared to a water pipe connected to an outwardly. When the server is normal,
When there is no data exchange, that is, when the water pipe is not flowing outward. If the hacker secretly adds a water pipe to the loophole and releases water, can the security guards still find the leak?
Server No. 1 slowly scanned out Aikexin Company. The server group port opening was open, and Shi Lei waited for the flowers to fade. After finding the appropriate port, Shi Lei directly used Aikexin Company's web server to simulate it as Aikexin Company.
Internal communication, requesting access to the server group.
After the server group received the request from the web server, since both parties belonged to Aikexin Company, the firewall of the server group did not block the request from the web server. Shi Lei successfully sneaked into the server group through the unpublished vulnerability through the unpublished vulnerability!
After entering the server group, Shi Lei did not act rashly, but began to spy on the firewall composition of the server group. If the firewall is not solved, I am afraid that Shi Lei had just cleaned up the permission group and the firewall would issue a report!
Shi Lei used No. 1 server to analyze the firewall while manually spying. Aikexin's firewall is obviously not a mass product on the market, but a customized firewall system entrusted to a network security company.
To borrow a saying from the hacker world, a free firewall has zero defense effect!
It took nearly two hours before Shi Lei could basically understand the situation of the firewall. Aikexin's firewall was actually provided by Norton!
In his previous life, Shi Lei specially studied Norton's firewalls, and Shi Lei was very familiar with every product of them. Although the firewall of Aikexin Company is a customized product by Norton, its source code is also developed based on the Norton series.
Shi Lei wrote malicious programs inside the server group and prepared to pierce the firewall to invalidate the firewall!
The best way to destroy a firewall is to grasp the server system vulnerabilities, enter the server, and destroy the firewall from within the server, just like Shi Lei.
After all, the firewall has a strong external defense, but its internal defense is much weaker!
After spending more than ten minutes, Shi Lei compiled a malicious Trojan targeting the Norton firewall, and then began to destroy the firewall from the inside. The specially customized Norton firewall still cannot get rid of the Norton mode, and was strangled by the malicious Trojan written by Shi Lei from the inside!
The function of the firewall was gradually replaced by malicious Trojans. The whole process was silent and did not attract the attention of the security guards at all.
After the malicious Trojan strangled the Norton firewall, the Norton firewall's signature code could not be detected, and it began to self-destruct and clear it from the server.
Shi Lei put his hands on the keyboard, with a successful smile on his face. He didn't expect that it would be so smooth that he got the Norton Firewall!
After typing a few lines of code on the keyboard, all the authorized users inside the Aikexin company's server group were listed on Shi Lei's computer screen.
On the surface, the server group only has three super permission users, as well as more than ten authorized users of all levels, large and small. Shi Lei carefully continued to typing the code and injected the permission authentication system of the server group.
After a moment, two accounts were displayed again on the monitor. The permissions of these two accounts were actually above the three super permission users on the surface!
"Damn, he is as dangerous as Brother Shitou. He likes to hide the real super permission users!" Shi Lei showed a disdainful expression on his face.
Hiding the real super permission user is quite common in advanced servers. If a hacker invades the advanced server and obtains the super permission user on the surface, he starts to do whatever he wants and establish his own super permission user.
It will be exposed in that moment!
Shi Lei found out the hidden real super permission user of Aikexin Company, but he did not touch these two super permission users, nor did he establish his own super permission user. Instead, he began to write code and replace the server group system.
, the original permission system.
If you use the server group system, the original permission system will create a super permission user, even if it is hidden. Once the super permission user of Aikexin Company checks the server permission user group, the newly created super permission user will be exposed.
That's equivalent to the exposure of invasion.
Therefore, Shi Lei needs to establish a new permission system to graft instead of the original permission system in the server group. In the new permission system, the two hidden super users on the surface are still the highest permissions. But in fact, Shi Lei will establish
A more advanced super permission user, hidden in the system.
Because of the use of the new permission system, even if the original two super permission users are thoroughly checking the server situation, as long as they do not find that the permission system is replaced, they cannot find the super permission users hidden by Shi Lei. Generally speaking, the security guards are on duty.
, there is no doubt that the system has been replaced.
Because, the job of replacing the system is definitely a high level of difficulty, and only a world-class hacker like Shi Lei can do it!
———————————————————————————————————————————————
ps: It’s still a little short of the target of recommendation votes, but Shanshan is believed to be able to reach it!
Please recommend votes~ Friends who have not collected it yet can collect it! Please click on members and help Shanshan click the list!
Please give me a reward, please comment, please reply to the book review area~!
In addition, only one person won the prize in the last small event, and a couple account was left. If someone needs it, the book review area will post. We will start another small event. This time we will get an eight-digit Tencent signal, or seven digit yy number! If necessary, the book review area ~
——
[Reward Thanks] Waka Ye Ying blows snow, reward 588.