Chapter 473 Stop responding
While Lin Hong and Lao Wang were writing worm code, bad news came one after another.
There are also several computers in this computer room that have also been tricked. Either they are restarted or suddenly unable to get on the Internet, especially those that detect or attack the other party's machines more frequently.
Lao Wang took time to run over there to have a look, and found that the IP used by the other party was actually their own.
The Red Army's network is not only this computer room, but also some subordinate units, or superior units, but the documents of the combat headquarters are just placed here.
Now it seems that the other party must have lost some points of the subordinate unit, obtained their permissions, and then bypassed the filtering rules based on IP authentication through those machines as a springboard, and successfully attacked some machines.
Fortunately, the communication scheme they use is based on the bit messenger. Needless to say, the security of this software is very robust. Unless the other party directly connects to the computer remotely, it is difficult to find the existence of this software.
However, because they are already on guard, even if they pretend to be subordinate units and ask for the transfer of files, they will definitely not succeed.
To transfer files, it is not only as simple as IP authentication, but also the password they set in advance. And this code will change every once in a while, and you can contact it directly by phone.
Due to the existence of bit messengers, they have basically eliminated the possibility of the other party secretly stealing files. Unless they break through the server, there is nothing they can do.
This may also be the reason why the other party is getting more and more anxious.
They had some doubts before whether the other party did not connect the server to the network at all. This time, they asked the referee team to review it. In fact, there was also a tentative factor in it.
The Blue Army may have realized that the way the Red Army communicates is not WEB or FTP.
In the face of their crazy attacks, Lao Wang once again strengthened his security policy and limited some of the access rights of his subordinate institutions. Of course, it was not all sealed, and they were left some space for them to make a difference. After all, in the two situations of predictable attacks and unknown attacks, Lao Wang still feels that predictable attacks are more reassuring.
Blue Army Information Computer Room...
"Mr. Li, take a look at this." Ding Huahui said to Li Yushan not far away.
Li Yushan is organizing manpower to carry out crazy invasions and attacks on the subordinate agencies of the Red Army, which is also the strategy they formulated. Since they can't get the other party's documents, let's strive to get more other results. This is good for the overall performance.
Hearing Ding Huahui's words, he immediately came over.
"What did you find?" He asked.
"Look at this agreement. It's very strange." Ding Huahui pointed to a piece of code in the display and said, "This is a piece of packet information I intercepted from a machine of the Red Army. It should be the way the other party communicates, as if through an instant chat software."
He analyzed the data packet format and felt that it was very strange and had never seen it.
Li Yushan looked at it for a while. He held the black-framed glasses and said with some uncertainty, "I seem to have seen this protocol format somewhere..."
He carefully searched his mind for a while. Finally, he punched his palm and said, "I remember! IT IS A FOREIGN SOFTWARE PROTOCOL, WHICH IS CALLED BITMASSAGER.
With, he directly opened the browser, visited the official website of the bit messenger, and said, "This is the software. A student told me about this software before, and I took a look at it at that time.
After opening the website, he directly turned to the part about the description of the communication protocol, and then compared the content with the data packet format intercepted by Ding Huahui. The structure was really very similar.
"It seems to be right! This is the software they use!" Ding Huahui said. I quickly browsed the content of the website.
Finally, he had to shake his head helplessly: "This software is too abnormal. How can there be such software?"
"I just took a look at it at that time and didn't study it in depth. It seems that I missed something good." Li Yushan also read the detailed introduction of this software carefully this time and found that he had missed a very good software.
At that time, his student just mentioned it casually. So he found the website through search. The title on it was exaggerated, as if he was bragging about how safe he could avoid any monitoring.
Li Yushan's first feeling was unreliable. He directly turned to the content of the transmission protocol and didn't understand it very well. In addition, he had other important things at that time, so he left this matter behind. Today, when he saw the data intercepted by Ding Huahui, he remembered the software again.
Now it seems that the Red Army must have used this software as a means of communication.
"Is this still open source software? Study his code to see if there are any exploitable loopholes. At this time, Li Yushan noticed that the code of this software is open source.
Ding Huahui looked at the historical version of the software and suddenly smiled bitterly: "Teacher, instead of studying the loopholes of this software, it is better to explore the loopholes of the system. This software has been out for so many years, and it is open source. After being tested by so many people around the world for so long, the possibility of vulnerabilities is extremely slim.
When Li Yushan saw the list of long software versions that could not be fully displayed on the whole display screen, he immediately felt that he had said nonsense.
"No wonder their port 80 has no response at all." Li Yushan shook his head with a wry smile, "That server is just to confuse us. They didn't open the WEB service at all!"
Can it be said that the Red Army violated the rules?
It seems that this can't be said. The rule-making party of the exercise certainly did not expect this to happen before. At the beginning, the Red Army put itself in an invincible position. No matter what they did, it was impossible for them to get the combat information of the other party.
In this way, the strategy they are taking now is still very reasonable. As long as they continue like this to ensure that their servers are not allowed to be captured by the other party, they can basically win steadily.
While thinking about this, I suddenly heard someone shouting, "Strange, why did our server stop responding?"
Li Yushan and Ding Huahui suddenly changed their faces. They looked at each other and immediately ran towards the server.
Li Yushan immediately tapped a few buttons on the keyboard and found that the system had entered a state of crash at this moment, without any response, and the light on the keyboard did not turn on when pressing the case switch key and the number key.