Super-brain hacker

Chapter 253 Wriggling

At night, Lin Hong sat in front of the computer and checked the messages and files transmitted from the bit messenger.

The Ghhot worm is very efficient. The keywords set by Lin Hong are mainly related to Tesla, such as his name, "ether", "wireless energy transmission", "Tesla coil", "Tesla wave..."

Once the Ghoat worm finds files or pictures related to these nouns, it will be transmitted to the specified bit messenger file terminal, and then use the file sharing and information transmission functions inside to send them directly to Lin Hong's computer.

Because Lin Hong limited the exclusivity of the worm, each computer is only allowed to run one ghoat instance, so it will only occupy a small memory and disk space.

ghoat can be in a lurking and running state.

Usually, it is saved on disk in the form of static files. Of course, it does not exist in the data structure of the disk file system. It is hidden for both users and system administrators, and the existing file detection tools cannot be detected.

In the latent state, only a very fine monitoring thread runs hidden in the background of the system, so that the memory and Cpl resources consumed can reach the minimum standard. Even if it is compared one by one, it cannot be found at all.

The hidden technology used by Lin Hong is his own creation. It directly modifies the data structure of the process in memory, and the detection mechanism that comes with the system cannot be detected at all. It was not until a long time later that someone explicitly proposed a technology called "nootkit" in theory... a little similar to the one used by Lin Hong.

Once the monitoring thread finds what it is monitoring, that is, the trigger condition is reached, it will automatically start the Ghaat main thread to complete some functions.

At this moment, due to the need to start ghoat... Ghoat will appear briefly in the system process space and then disappear.

That is to say, the only time possible to be discovered is the moment when Ghoat Lv moved.

In addition to the exclusive mechanism, in order to prevent GhAAT from being too rampant, Lin Hong can also control the total number of GHAst, so that it can be controlled within a certain range.

In addition...Ghoat will also help the server to kill viruses.

Because Lin Hong is worried that if other viruses or worms interfere, the server will be abnormal, and then it will attract the attention of the system administrator... which is not conducive to data collection.

Therefore, Lin Hong added some additional functions to Ghaat, which is to do good deeds and help the other party strengthen their defenses.

In this way, it is equivalent to sprinkling antivirus to the server. Basically, if any program with virus or worm characteristics tries to break in... it will be killed by Ghast immediately.

These days, Lin Hong has collected so much information that his disk can no longer be stored.

He had to go to the computer and electronics markets to find a larger hard disk.

Fortunately, he knows a lot about hardware technology. Although his notebook lacks the necessary scalability, he has successfully expanded the hard disk space for his laptop computer and connected it to the notebook through his own customized interface.

He is not only cooperating with Heidi these days. Mrs. Rama did some strange experiments... and basically stayed in the room to read these materials.

Tesla's sound is so legendary, and the work he has done and invented so much that his information alone directly fills several 40MB hard disks.

Most of them are in picture scanning format, and they are a little vague. In many cases, there are stains and missing pages, which brings great difficulties to Lin Hong's reading and research.

Many of Mrs. Rama's theories about Tesla are indeed groundless. Lin Hong found a lot of information as evidence, and even the ghost field found the prototype, that is, the Ether energy network.

The work Tesla did in his later years... was all about studying how to "borrow" endless energy from the ubiquitous ade.

The infinite energy transmitter he invented is the medium for obtaining etaric energy. According to Tesla's original plan, he intends to build a seatless "Tesla Energy Tower" around the world. New York is the first, the second should be in Amsterdam, the third is in China, and the fourth and fifth are located respectively. Antarctic and Arctic.

From Tesla's notes, Lin Hong saw his vision for the establishment of these five energy towers. He believed that the earth would become a unified system at that time, and it could be controlled by his preset oscillator. Obtaining infinite energy is only one of the most basic functions. At that time, he You can achieve some abilities that can only be seen in myths and legends.

The energy tower of Tesla is also the focus of some scientists.

Lin Hong saw the research, speculation and investigation of many other scientists on Tesla's energy tower.

Many people think that the first energy tower Tesla built realized some of its functions. At that time, the experience of New Yorkers was the best example. Later, someone went to investigate the residents around the first energy tower and obtained first-hand information.

Lin Hong took a general look. Those materials have great credibility, and the investigation of people's lives, age and address are very detailed.

Some scientists even suspect that the Tongus explosion in the Siberian forest of Russia in 19О8 is Tesla's masterpiece. The destructive power of the big explosion was equivalent to 15-20 million tons of ТNT explosives, and caused more than 60 million trees to fall in more than 2,000 square kilometers.

"Didi--"

Lin Hong, who was reading materials, couldn't help but switch to the bit messenger client interface that has been running in the background.

His laptop speaker called the alarm, which means that his Ghast worm has been found.

Soon, an IP address was immediately sent from the bit messenger interface.

Lin Hong hesitated for a moment, and finally copied the IP address to start the proxy function of the bit messenger, and then launched a small tool to scan and analyze the IP...

A few minutes later, he quietly successfully invaded the server that entered the target IP.

"I found the existence of Ghaat so quickly. This network management technology is good."

Lin Hong quietly stood aside and observed for a while, and he couldn't help but feel a little.

Unexpectedly, the way the other party found Ghaat was to use bait to lure him. After finding abnormalities, targeted detection and analysis were carried out.

This is really a very effective way.

Lin Hong continued to observe again. To his surprise, the other party did not seem to intend to kill Ghaat at all, but kept using worms to lure Ghast to stimulate and analyze its reactions and actions. Finally, he used these stimuli to try to copy Ghast.

"What the hell do they want to do?"

Lin Hong saw that their other computer was connected to this server and seemed to want Ghoat to infect that computer.

Lin Hong checked the computer in curiosity and finally found an abnormality. It turned out that the machine had been infected with a large number of worms and almost stalled.

"They actually want to use GHoat to kill these worms and treat GHoat as an antivirus program."

When Lin Hong learned about this result, he immediately couldn't laugh or cry.

He checked the situation of other nodes and then monitored the other party's online conversation, only to find that the whole spAN network was facing a very serious worm crisis at this moment.

And this worm, which they call TREE, seems to have the same purpose as Ghast, to steal confidential information.

It's just that this kind of worm is too ugly to eat. It not only eats unscrupulously, but also breeds randomly. Perhaps only in this way can more information be collected in a short time.

Those network security experts were helpless about the worm crisis. Finally, they accidentally discovered the existence of GHoat and entrusted the task of eliminating worms to Ghast.

"The information has almost been collected this time. Now that you have found the existence of Ghast, let's do you a favor and take it as the cost of these materials."

Lin Hong originally wanted to let Ghast unconsciously destroy himself after the information collection was over, but now he decided to help them as a good thing.

So, he immediately launched a function that had already been written and completely turned off the information transmission function of Ghast, so that even if the other party captured the sample of Ghast, he could not analyze Ghoat's real intention at all.

Then, he lifted the limit on the number of Ghaat.

It's very simple to complete these two steps, just two switches. The bit messenger he used himself integrates the IRC command function, which directly uses the network of the bit messenger for command transmission and instructs Ghoat to generate actions.

This is not a secret. After others read the source code and protocol of the bit messenger, they can also develop the software specifically. The API is ready-made. As for whether it is used for good deeds or bad things, this is beyond Lin Hong's control.

Since he decided to officially open source the bit messenger, he has stopped maintaining it. All these tasks are left to the community to complete.

He has built a platform that everyone can use to do what they want to do. Just like the calculator platform of the TI series, only in this way can we gather the wisdom of everyone. After all, a person's power is always limited.

With Lin Hong's lifting of the limit on the number of Ghaat, Edward of SPAN Network Security Laboratory also cheered in surprise, because his seduction experiment against the Ghoat worm had been successful, and another server infected with the TREE worm recovered almost in a very short time. Normal.

It's really not easy to say. In order to study Ghaat, Edward removed the hard disk from Fermi's laboratory and brought it back directly. Fortunately, DEC's machines are all configured in the same configuration, otherwise, he may have to consign the whole server back.

After bringing it back, he has been carrying out various experiments on the new server, but there was no response. Ghaat stayed in his own place honestly and never ran outside.

Later, Edward remembered the network characteristics of the worm and connected it to the network. Unexpectedly, the effect was immediate. The Ghaat worm finally took the initiative to kill all the damn TREE worms on the other server.

Edward saw that his way was feasible, and there was hope to kill the TREE worm, and he was immediately in a good mood.

At this time, the phone next to him rang, and he picked it up: "Hello? I'm Edward from the Cyber Security Center.

"Mr. Edward, what the hell are you doing? Haven't you just been here before? Why did you send someone here again? Several more came at a time. Do we still want our laboratory to work normally? Anthony complained rudely on the phone.

Edward was stunned when he heard the words and sent someone over again? Why don't I know?