typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 434: Another battlefield (Part 2)

The little king mentioned by Zhan Keren is surprisingly Wang Qingchen from the Cyber ​​Security Center of HKUST.

As the current top expert in network security in the Academy of Sciences, he was also transferred to the press conference to assist with security this time.

I saw him quickly blocking a round of attacks, and at the same time said:

"The attack intensity is very high, including DDOS, CSRF, and SYN Flood attacks. We just defended against a very strong attack five minutes ago."

"If nothing else happens, we should usher in the next round of offensive within five to eight minutes."

"If we hadn't prepared a defensive system a few days ago, I'm afraid we would have to fight the opponent with bayonets now."

Zhan Keren's expression immediately became more solemn after hearing this, and he asked:

"Xiao Wang, can you hold on?"

【Can you hold it?】

be honest.

In the past six months, Wang Qingchen has heard this sentence more than once.

Whether it is the live broadcast of cockroach disinfecting at HKUST.

It was still the day when the product ‘One Mantis Killer’ was first launched.

Or the scene of the HKUST public opinion press conference.

Different people asked Wang Qingchen this question.

Wang Qingchen's answer every time was a very confident "can", and he truly fulfilled his promise.

But this time...

He was a little unsure.

This time, the network security team of the Academy of Sciences was divided into two groups, A and B, based on individual abilities and response methods.

Group B has a larger number of people, probably about a hundred people, and is defending at the famous National Supercomputing Center in Chengdu.

They mainly target common attacks with high traffic but relatively low technical skills, such as conventional DDOS, and their main function is to intercept traffic.

In game terms, it is used to clear mobs.

As for module A...

It is a 'special operations' team composed of Wang Qingchen, Xiaorong and elites from the Institute of Information, Chinese Academy of Sciences.

There are a total of 31 members in this group, all of whom are big guys in plaid shirts with high hairlines and borderless hairlines.

You can put it this way.

Except for those masters who have quit the industry or work in private companies, all the top hackers in the country gather here.

This is the top lineup in the network security industry, and can theoretically crush 99.99% of opponents.

But the problem is...

What Wang Qingchen, Xiaorong and others faced this time was from the 0.01% headed by Haidang Duan.

It can also be seen from some habits that many of them are Wang Qingchen...or old acquaintances of Huaxia Hongke.

even.....

Wang Qingchen was still in the middle of an attack when he vaguely caught a glimpse of a figure that shouldn't appear on this occasion:

Eric Raymond.

Let’s look at some details.

Basically, we can rule out the possibility of his disciples or disciples being involved, and it is 100% that he himself will be the one to end it.

This big boss has been pulled out, which shows how many strong troops have been invested across the sea this time, and how determined their attitude is.

without any exaggeration.

This is the most official confrontation between the two sides.

Except for the furry bear next door, no country is currently qualified to compete with either of the two.

So to be honest.

Wang Qingchen really doesn't have much confidence that he can defend the opposite side - after all, attacking is easier than defending.

But at this juncture, he was not allowed to say depressing words, so this well-known celebrity who looked very artistic suddenly gritted his teeth and puffed out his chest and said:

"No problem, Director Zhan, don't worry, I won't let those guys ruin our live broadcast!"

After making a guarantee to Zhan Keren.

Wang Qingchen immediately focused his attention on network security maintenance.

Bang bang bang——

The security center was filled with the sound of typing on keyboards. From the outside, it seemed that behind Gujing Wubo's live broadcast, there were invisible swords and swords.

After terminating a computer worm attack, a hoarse male voice suddenly came from beside Wang Qingchen:

"Brother Yi! The TCP connection is under attack, and the program keeps returning ACK messages!"

The speaker was a middle-aged man with dark circles under his eyes, and his hair was as messy as a bird's nest. You could tell at a glance that he was a middle-aged Internet addict.

What he shouted was not Wang Qingchen’s name, but Wang Qingchen’s original code name in the Hongke Alliance:

Wings of Chaos.

That's right.

This person was also a member of the original Hongke Alliance and participated in the Sino-US hacker war that year.

Or to be more precise...

Among the 31 people present, more than 60% were members of the original Honker Alliance.

The remaining part basically has some intersection with Wang Qingchen, Xiaorong and others.

Or they were apprentices they had personally taught.

Or have taken their courses.

This is actually quite normal.

After all, the participants in the original Sino-US hacker war were all top domestic hackers, and there were not a few people like Wang Qingchen who were recruited.

Even Xiaorong was no exception - he worked for the country until 15 years before being hired by Xu Yun to join Huadun Biotech.

I heard the news from the man with dark circles.

Wang Qingchen immediately went on defense.

TCP problems fall under the category of SYN Flood attacks, which are flood attacks, which are much more difficult than simple DDOS attacks - of course, this refers to DDOS attacks below a certain level.

Students who have been programmers in this life should all know this.

Usually the establishment of a TCP connection includes three steps:

The client sends a SYN packet to the server;

The server allocates certain resources and returns SYN/ACK packets, and waits for the final ACK packet when the connection is established;

Finally, the client sends an ACK message.

In this way, a connection between the two is established and data can be transmitted through the connection.

The process of a SYN Flood attack is to send SYN messages crazily without returning ACK messages.

When the server does not receive the confirmation packet from the client.

The specification standard stipulates that the SYN/ACK request packet must be resent, and the entry will not be deleted from the unconnected queue until timeout.

SYN Flood attacks consume CPU and memory resources, resulting in excessive system resource usage, inability to respond to other operations, or the inability to respond to normal network requests.

This chapter is not finished yet, please click on the next page to continue reading the exciting content! At the same time, because TCP/IP believes in the source address of the message.

Attackers can forge source IP addresses, making tracing very difficult.

It is impossible to disconnect the network during the live broadcast, so Wang Qingchen and others must solve this problem before the server exceeds the load.

Wang Qingchen first used the stat -na command to check the port connection status and found that the queue was filled with a large number of semi-connections, and the destination port numbers were all uncommon port 23.

See this situation.

Wang Qingchen quickly established a gateway timeout setting and increased the maximum half-connection to strengthen the TCP/IP protocol line.

influenced by.

Some external video signals paused, and the screen went black for a full 6.7 seconds. A burst of question marks flashed across the live broadcast platform.

Fortunately, this pause did not last long, and Wang Qingchen took this opportunity to complete the settings of the filtering gateway.

The attack has been suspended for now.

But before Wang Qingchen could take a breath, another exclamation came to his mind:

"Oops, my link layer was attacked! TCP was a feint!"

Wang Qingchen was stunned for a moment.

Fortunately, there were many capable people at the scene. Before Wang Qingchen could react, another expert from the Information Institute of the Academy of Sciences helped fill the gap.

A few minutes later.

The entire loophole was completely closed.

The tasks faced by Team A are urgent and difficult, but they are not many in number.

So after solving these problems.

Wang Qingchen and others finally had a chance to breathe.

"Here, Xiao Wang."

The little banyan next to Wang Qingchen's seat threw a can of Devil's Claw at him. After Wang Qingchen took a big gulp, he asked pointedly:

"Xiao Wang, do you feel that this wave of attacks is familiar?"

Wang Qingchen was stunned for a moment and said in surprise:

"Why, Brother Rong, do you feel this way too? I thought I was overthinking."

Seeing this, Xiaorong was silent for a moment, and an inexplicable smile appeared at the corner of her mouth:

"It seems that I felt right...Xiao Wang, those real old friends from 2001 are here."

When Xiaorong said these words, there was still a hint of emotional fighting spirit in his eyes.

Mentioned earlier.

The Rabbit Eagle hacker war in 2001 was the most intense and widely known Internet battle in China’s history.

However, although we broke into many websites across the sea in that war, our own damage was not small.

Throughout the ten-day offensive and defensive battle.

More than 1,000 websites were destroyed in China, including more than 600 important websites - in the context of 2001, the coverage of this number is actually very wide.

Across the sea, as many as 1,600 websites were destroyed, including 900 important websites.

It's just that relatively speaking, our portal has not been breached.

Therefore, the battle at that time was said to be "offensive and defensive", but in fact it was almost all about offense.

The length of defense is actually very small.

By the way.

The tactic of unplugging the network cable was also carried forward in that battle...

Now 20 years have passed.

Xiao Rong did not expect that she would unexpectedly reunite with those old friends on this occasion.

To know.

In the previous attacks, Xiaorong saw some familiar figures here and there.

However, the number of those figures was generally only one or two, and some were later determined to be the actions of the opponent's apprentices - after all, the magnitude of many previous incidents was not high.

But today, what Xiaorong and the others met was not as simple as one or two acquaintances.

Such as this feint attack.

This is the skill that Kevin Poulsen became famous for...

That's right.

Kevin Poulsen.

He was one of the top five hackers across the sea. He was the first computer criminal to be charged with espionage after hacking into the Fifth Avenue Building.

However, Kevin Poulsen was recruited after he was released from prison in 1996. He was working as an investigative reporter on the surface, but in fact he was working for Across the Sea.

In the hacker war of 2001.

Several well-known websites such as the Chinese Academy of Sciences' Education and Research Network, Pig Farm Portal, and Shuguang BBS were all captured by Kevin Poulson's team.

And now Kevin Poulsen can come forward...

To put it conservatively.

At least 50% of the old acquaintances from back then should also appear today.

After confirming the ‘reunion of old friends’.

Wang Qingchen and Xiao Rong once again cheered up and quickly returned to their seats to wait.

in the next ten minutes.

Although Team A still encountered several attacks, it was generally calm.

However, Wang Qingchen and Xiao Rong had no intention of slacking off.

They knew very well that those old friends were all experts in making large sums of money.

If you don't take action, it will be fine. If you take action, it will be a storm.

Another four minutes passed.

Wang Qingchen suddenly focused his eyes:

"Brother Rong, here we come!"

In fact, without Wang Qingchen’s prompting, Xiaorong also noticed the changes in the detector in front of him:

In just five seconds, the live broadcast server suffered a DDOS attack with a peak value of 0.11Tbps!

A DDOS attack is an ordinary chicken attack. Common DDOS attack script boys can create it, and it is not difficult to defend against it.

But if it is a high-level DDOS attack, that is another concept.

The highest DDOS attack in China occurred on April 8, 2018.

At that time, a game on Tencent Cloud suffered seven consecutive DDoS attacks from 19:13 to 19:50, with a peak value of 1.23Tbps.

That's 1.23 megabits per second.

The 'appetizer' that Wang Qingchen and the others encountered today reached 1/10 of the original record.

Almost in just a few seconds.

Xiaorong then realized the identity of the other party:

The king of DDOS across the sea, Setu!

This was also one of the core members who initially attacked China Internet.

However, unlike Kevin Poulsen who was first imprisoned and then reorganized, he was serving the official service across the sea as soon as he debuted.

In a sense.

He is the ‘Hongke’ across the sea.

Fortunately, the Chinese Academy of Sciences was well prepared for the hacker attack this time and had prepared a high-level bandwidth in advance.

In the case of hard bandwidth resistance.

Xiaorong carried out cleaning and drainage, and finally suppressed Setu's offensive.

And the price...

The video quality of all viewers in the live broadcast room was slightly reduced by half a notch.

Fortunately, many institutions are still conducting experiments at this time, and the camera perspective is either a bird's-eye view, or it is locked on the commentators of the respective media.

The reduction in image quality is relatively inconspicuous.

But for Xiaorong and others, this is just the beginning...

Setu's attack implicated Xiaorong, the most capable hacker on the scene, and temporarily prevented him from assisting others.

at the same time.

Far across the sea.

The Pentagon. (This place name is not easy to describe in Chinese characters. It seems a bit sensitive. I don’t know what place it is. You can search it on Baidu. I will refer to it in English next time.)

In a closed but quite open room.

Hundreds of programmers are in front of the computer, tapping the keyboard quickly.

These programmers have different skin colors, some are white, some are Hispanic, and some are black.

There are even a few...

Asian.

There is an area at the front of the room that looks higher in standard. There is a man sitting in one of the areas, cracklingly inputting instructions.

Judging from his skin color, this person should be a Hispanic, in his forties, with fairly regular facial features.

However, every ten seconds or so, the muscles on the left side of his face would twitch heavily, as if there was some problem with the facial nerves.

Behind this person were six men, all of whom seemed to be in their forties or fifties.

after awhile.

The man on the seat made an ouch, made a fist with his left hand, and punched the palm of his right hand in frustration:

"FXXK!"

Behind him, a big man with a round belly and a beard couldn't help but whistled:

"Aha, Setu, I'm willing to accept the bet and lose, and I'll give you $100."

The man named Setu reached into his trouser pocket and took out a crumpled banknote, and slapped it on the table angrily:

"Take it!"

The bearded man hummed the tune "La La La" and happily picked up the money:

"Setu, I haven't seen you for so many years, and your skills haven't improved much. Are you still the king of DDOS?"

Setu's facial muscles twitched violently again. He didn't know whether it was because of anger or an original nerve twitch. He couldn't help but raise his middle finger towards the other party:

"Shut up, you. Even a hundred dollars can't shut up your mouth. It's as loose as the front and the back. Do you know who is on the other side?"

The bearded man didn't seem to care at all about Setu's sarcasm, but asked curiously:

"who is it?"

Setu glanced at him:

"xiaorong, the accuracy is no less than 90%."

I heard the name xiaorong.

The surrounding atmosphere suddenly condensed, and the smile of the bearded man also instantly faded.

A few seconds passed.

One of the handsome guys, who looked somewhat similar to Beckham, suddenly showed a hint of violence that was inconsistent with his appearance:

"It turns out it's him..."

The people present had all participated in the hacker war 20 years ago, and were naturally deeply impressed by Xiaorong, the main attacker who had personally planted the national flag on the homepage of the White House official website.

This is indeed a difficult opponent.

The handsome guy who spoke last had already suffered a big fall on Xiaorong back then.

Just when the atmosphere was a little solemn.

A little old man with gray hair walked up to the front left of the crowd and asked Setu and others:

"Guys, how is the situation now? Can you break through the Chinese defense?"

Setu shook his head, sighed, and explained:

"I'm sorry, Mr. Abbott, I failed too."

"The defense system of the Chinese Academy of Sciences has a preliminary screening module. It should be specially prepared for this live broadcast these days. The logic and code are perfectly matched."

"If we don't break this layer of defense, we can only achieve 50% to 60% effectiveness during an invasion."

"I'm not afraid of xiaorong in an all-out battle, but the outcome is only between two and one, and with the blockage of this module... I definitely won't be able to capture the core node - not to mention that there's more than just xiaorong on the other side."

The other people also nodded in agreement.

Although their experience of watching the battle from behind is not as intuitive as Setu's, a lot of information can still be perceived.

As Setu said.

The Chinese Academy of Sciences has directly blocked many overseas visit applications, forming a solid protective layer.

To use film and television works as an example, it is somewhat like the barrier Hogwarts put up before the final battle in Harry Potter and the Deathly Hallows.

Unless this barrier is broken, it will never be possible to enter a frontal battlefield battle.

Not to mention that before Setu took action, several of them had also tried attacking, but the results were also not very satisfactory.

See this situation.

The little old man named Abbott looked around at the people and asked:

"Gentlemen... Oh, and sir, this psychological woman, are you sure that we can't break through the defense of the Chinese Academy of Sciences through a frontal attack, are you?"

Everyone nodded without hesitation:

"That's right."

"I am very sure."

"I'm sorry, but this is indeed the case. After all, the Chinese Academy of Sciences has a long time to build a defense system in advance..."

"Mr. Abbott, I said please call me Ms. Salfin..."

After getting everyone's affirmative reply.

Abbott stood there like a sculpture, with a dignified and complicated expression on his face.

seem......

What are you weighing?

As the director of The Pentagon's China Strategy Department, Abbott has already entered the upper echelons of power across the sea.

Both the information they possess and their perspective on things are far beyond what hackers like Setu can match.

It can be said that since October 1, 1972, the blockade of China has never stopped across the sea.

This chapter is not finished yet, please click on the next page to continue reading the exciting content! The first ones are technology, trade, and equipment.

In the past thirty years, it has turned to education and awareness, and has done everything possible to implement "de-Chineseization."

A very representative one is the word New Year.

Working in tandem with Bangzi, they patiently spent eight years changing "chinese new year" to "Lunar New Year".

Now "Lunar New Year" has become a synonym for political correctness on the Internet, euphemistically called the Lunar New Year in the East Asian cultural circle.

For eight whole years, just for this one word.

There are many, many similar small actions.

While they are blocking and suppressing China's right to speak, they are also distorting China's right to public opinion.

For example, a certain neon company released a poster of a dog among flowers on the Martyrs’ Day, accompanied by the great fortune teller Yongmei.

For such an obvious and ridiculing thing, there are still people who complained about China's shameless behavior after the official banned the company's Weibo.

How ridiculous.

all in all.

in this case.

Abbott...or the will behind him will never allow China to have such an important definitional right in the field of particle physics.

Otherwise, it will not only be basic physics that will be affected - decades ago, a senior who held the same position as Abbott, named Daniel Kimbell, once stumbled upon this matter.

.

Daniel Kimbell once said something regretfully in his autobiography:

"We have made countless wise decisions in our relations with China, but the failure of that release decision made all the previous correct decisions meaningless - if we had known today, we should have given up the 11 captive pilots."

Therefore, although this confrontation only took place online, the nature of what it involved was no less than that of the original incident.

The Chinese Academy of Sciences' practice of ranking all institutions for live broadcast has caused all the plans on the other side of the country to be scrapped.

That is to say...

The only turning point now is the dark side of The Pentagon.

As long as the live broadcast signal is cut off, the 'power' of the Chinese Academy of Sciences over the public will be cut off.

Tomorrow will still be beautiful.

Maybe China can win a Nobel Prize based on this achievement, and then that's it.

Without the ranking and public attention of the live broadcast, everything can be manipulated again.

In Chinese terms.

This is a battle between two sides...

The battle for national destiny!

.........


This chapter has been completed!
Previous Bookshelf directory Bookmark Next