typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 26 Invasion of the official website of the game company

Ye Feng remotely accessed a Linux system server. This server has high configuration, but its actual usage is very low. It is used by a relatively well-funded company. Ye Feng prefers to use Linux system servers. On the one hand, it is more hidden and on the other hand, it is more hidden.

The command line interface makes you feel professional. In addition, the Linux system is open source, and many systems are developed based on the Linux system kernel, including some of the mobile phone systems we use are also developed based on the Linux kernel.

Ye Feng called up a website scanning software and began to scan the official website of Messiah Company. Of course, Ye Feng was very cautious, lengthening the time to scan each page, and using a proxy gateway to change his own settings every time a page was scanned.

ip address.

Because if you do not change the IP address and the other party's website protection is good, it is easy to find that a suspicious IP address has been scanning all pages of your website. The intrusion prevention module of the firewall will block this IP and send an alarm message to

Administrator, this will alert others and expose themselves.

Don't watch some hackers on TV. They can crack a computer or website very quickly. In reality, this process may take several months or even longer. In addition, when scanning and invading the other party's computer, it is usually when the other party is late at night or early in the morning.

During this period of time. Because the other party's maintenance and methods are relatively lax during this period, and the probability of accessing and logging into the computer during this period is lower, it is easier to delete the log information recorded by the system after the intrusion.

Fortunately, this website has little content and few pages, so the scan was completed quickly. Ye Feng found a login entrance, which should be used for administrators to log in remotely. Ye Feng first tried to find loopholes to invade, and after scanning, he found this

The server only has 7012udp port and 8080tcp port opened. Port 7012 should be the port used for games, and 8080 is the port used for websites.

The web page of the website is extremely simple, with almost no code, so it is difficult to find loopholes. Ye Feng also tried SQL injection attacks but had no effect. It seems that the only feasible way is to brute force the password. In fact, another way is to hack the computer

The server connects to the operator's network transmission equipment, obtains the data packets, and cracks them to obtain the information transmitted by the data packets.

This method is fine if the other party uses a relatively simple communication encryption method. You can try algorithm loopholes or brute force cracking. But if it is a relatively secure communication encryption method, unless you are very good at mathematics, you can try to use other algorithms instead.

Crack it, Ye Feng is not such a fairy-like figure.

Brute force cracking is to exhaustively try all the combinations one by one. Of course, this is not a manual test but a software test. The speed depends on the computing power of your computer. The better the computer performance, the shorter the time. All encryption can be used in this way.

The way to crack it is just a matter of the length of time. If it can be cracked in decades or hundreds of years, it is almost meaningless.

Ye Feng is not a very powerful hacker, so he chose the simplest and most direct method of brute force cracking and credential stuffing attack. To put it simply, the credential stuffing attack is to first crack an easily cracked website, obtain the account number and password in his database, and then

Use these account numbers and passwords to try to log in to another website with stricter security protection.

If the two websites have the same account and password set by the same person, there is a chance to log in to another website with stricter security protection. After logging in, you can try attacks such as privilege escalation and overflow to obtain higher permissions.

Ye Feng set up the software and set the time period to run in the background. At the same time, through the SMS modem connected to this server, he set up a text message to notify himself when the crack was successful. Then all he could do was wait. Ye Feng cleaned up his login and operations.

Log, then disconnect the remote connection, close your portable terminal and put the portable terminal away.

At this time, Wang Meng opened the study door and walked in. He happened to see Ye Feng putting a portable terminal into a cabinet. Wang Meng shouted: "Old Ye, what are you doing? Is there any movie in the portable terminal that is inappropriate for children?"

?Why are you hiding it? Open it and let me help you refer to it, or you can borrow one first to talk."

Ye Feng rolled his eyes at him and said, "I think about useless things all day long, and my mind is filled with unhealthy things."

Wang Meng argued: "How can this be useless? The country that lived a good life has hatred between the country and the family. We must always understand the enemy. Confucius said: Know yourself and the enemy and you will be victorious in any battle."

Ye Feng couldn't help but rolled his eyes at Wang Meng and said, "That's what grandson said."

Wang Meng said in surprise: "What? When did the seniority decrease?"

Ye Feng covered his head and said, "Forget it, just pretend I didn't say anything."

Wang Meng continued seriously: "So we need to study their culture and watch more of their movies. I chose to start with movies with less dialogue. These movies are very candid, making it easy for the audience to understand deeply."

Ye Feng opened his eyes wide and said, "Huh? You are really a fucking talent."

Ye Feng didn't want to continue chatting with Wang Meng, so he said seriously: "Do you still remember the Panding Planet game on the male spy's phone?"

Wang Meng asked blankly: "I didn't pay attention, what's wrong, you want to play a game?"

Ye Feng said speechlessly: "I just checked, and I think this game and this company are a bit strange. The registration place of this game company, the game server and the backend maintenance personnel are not in the same country."

Wang Meng thought for a moment and said, "Does this mean this is a multinational company?"

Ye Feng originally wanted to discuss and study with Wang Meng to see if he could figure it out. Unexpectedly, the more he talked, the more he felt a headache.

Ye Feng rubbed his temples and said: "The registration information shows that it is a small company, so doing this will only increase the cost. So I think this company is very weird, and the man has almost no apps installed, and it is a bit weird to only install this game."

I think there may be some clues in this game, and I am currently cracking the backend of this game company’s website.”

Wang Meng suddenly realized and asked: "How did you crack it?"

Ye Feng said: "How can it be so fast? I'm hanging on another server to crack it. I will be notified when there is news. Let's talk about it then."

Wang Meng asked: "How long will it take? Can it be cracked tomorrow?"

Ye Feng rolled his eyes at him and said, "How can it be that easy? It may take days or even months."

Wang Meng said disdainfully: "Tch, I guess your skills are not good. I saw those hackers on TV cracking the code in one go. It's easier than opening a lock."

Ye Feng said speechlessly: "You also said that it was a TV. In reality, if the most powerful hacker has cracked all the systems and calculated the average time, the hacker from the Principality of Sha is the most powerful, which takes about twenty minutes. Our country's

Ranking third in the world, it takes an average of four hours. And they can crack it. They crack it through their known vulnerabilities."

"You have to know that not all systems can be cracked by them. Only a small part of them have been cracked. There are still many that they have not cracked. No one knows about them and they will not publish them. Normally, a system does not have known vulnerabilities.

Under certain circumstances, it can be considered fast if it can be cracked in a few days or even more than a month."

Wang Meng asked: "Brother Feng, are your computers very powerful?"

Ye Feng shook his head and replied: "Not great, just a little understanding."

Wang Meng twitched the corner of his mouth and said disdainfully: "Pretend, keep pretending with me, I know you invented an optical bus computer or something in 1999."

"Is the computer operation much faster if the bus is transmitted by light? I read a science fiction novel before, and it said that the operation is much faster if the bus is transmitted by light." Wang Meng asked expectantly.

Ye Feng replied calmly: "Fast transmission and fast operation are two different things. Computer operations are essentially mathematical algorithm problems. For example, for simple addition calculations, computers use electrical signals to perform operations. In the digital logic circuit of the computer,

A low level represents 0, and a high level represents 1. Generally, the low level is 0 volts to 0.25 volts, and the high level is 3.5 volts to 5 volts."

Wang Meng asked: "What about 0.25 volts to 3.5 volts?"


This chapter has been completed!
Previous Bookshelf directory Bookmark Next