Chapter 326 Unusual Connection
In the face of Wu Dong's question, Lin Hong intended to popularize these basic knowledge to them, so he gave a detailed explanation.
Proxy servers have existed for a long time, but many people may never have access to this thing.
Many non-technical personnel can't even understand why this service exists.
In short, this is actually like a channel, which can help you accomplish some things, but because you need to pass through this channel, it will also leave traces in this channel.
Using proxy server intrusion, sometimes there may be only one springboard, but precisely because of the existence of this springboard, the security factor can be increased several times.
If it is on the Internet, this advantage is more obvious, because the proxy server you use may be in a corner of another country. Even if the other party wants to track down, in addition to invading the server, either contact the administrator to retrieve the record, or go directly to the proxy server. In the computer room, log in to his server for inquiry.
It seems to be a very simple step, but it is very difficult to do.
If the intruder's technology is a little higher, and the proxy server is set up by the intruder himself, rather than directly using other people's services, it will be many times more difficult to track.
After all, the way to set up such a proxy service is very simple, and if the other party regularly cleans up the records in the server in time, it can achieve greater invisibility in those books. Unless you are a master, you can only "sigh at the ocean".
Lin Hong finally said: "At present, the most popular proxy server software on the Internet is BitMage. Due to its unique design structure and very strong encryption algorithm, this software can basically achieve real anonymity. Because it is based on point-to-point protocol, it can actually be used within the local area network. Of course, the prerequisite is that there are enough nodes in the local area network.
Bit messenger... The three people present listened carefully. Hearing Lin Hong's solemn introduction of the software, they all left their hearts and decided to study it later.
"In order to achieve a safer camouflage, I need to set up a proxy server on another machine first, and prevent this proxy server from saving access records. The implementation method is also very simple, that is, if the record is generated, it will be deleted immediately..."
Lin Hong said, and then began to officially start the invasion.
"I wrote a small tool before. There are two main functions of this tool. One is to scan the computers active on the network on the specified IP segment to see which computers are online: the other is to scan the specified computer to see which ports or services it has opened."
In the past, in order to find the active host on the network, hackers had to manually write specific commands to operate. If the target host is found, they had to slowly analyze which ports the other party opened, basically one by one to test.
Obviously, this manual method is not only cumbersome but also less efficient.
Later, someone began to write various automated tools, and all operations were processed automatically, as long as the operator entered specific parameters. Even under the graphical interface, the operator only needs a few mouse clicks to complete these actions immediately.
The tool written by Lin Hong is under the command line and must be used with various parameters.
Lin Hong first checked his IP with the network command, then tracked the packet sending path to understand the situation of the gateway, and then entered an IP segment address under his tool. After entering, the command interface begins to constantly brush up the scanned information.
These information is in English, and there are various fixed professional terms and abbreviations. Wu Da and the three of them stood behind and looked at it. They just felt dazzled and couldn't understand what it meant at all.
However, the scene of this kind of characters constantly brushing up is very in line with their imagination of hacking into the computer, and they can't wait to be the person who operates the computer. Although they can't understand the above content, one thing is certain, that is, the boss computer technology in their dormitory is very awesome.
Since they will choose a computer major, they are naturally very interested in computers. Therefore, at this time, they all admire Lin Hong and think that they must let him give advice in the future.
The scanning stopped quickly. Lin Hong opened a file, which is the result of the scan, which saves the host currently active online, as well as a general situation of the host, such as IP address, operating system, opened port, etc.
Some of these hosts are other people's personal computers, and some servers set up by the school. Considering the stability, Lin Hong chose the server.
Most of the systems installed on the server are WINDOW or UNIX. Lin Hong knows some loopholes, but he uses some commonly exposed loopholes. Of course, these loopholes are only circulating in some internal hacker forums abroad, which are basically invisible to ordinary people.
Lin Hongjian pointed out like flying. While invading, he explained in detail what technology he had used to several people in the dormitory. The whole process was like a textbook. He knows every link like the back of his hand, as if he had invaded countless times before.
The other three people in dormitory 604 are intoxicated. They are not stupid. In addition, under Lin Hong's deliberate intention, although they are not fully understood, the basic process and principles have been understood. Although the amount of information mentioned by Lin Hong is very large, this kind of live demonstration teaching has made them very impressive and had a great impact on them in the future.
Lin Hong set up three proxy servers manually, and then took this as a springboard and began to brazenly look for the database server of the Academic Affairs Office.
The method he used was to find the software Wu Da said.
"The next work is a little boring. Because I don't know the IP address of the server, I can only try one by one. All kinds of methods are available. For example, you can directly find the counselor's computer, and then use that computer to find out how convenient it is anyway.
A vulnerability I'm using now is basically a problem with the default settings of the computer. These default settings, because the user did not modify them in time, gave the intruder the opportunity to take advantage of..."
Looking at Lin Hong constantly connecting to other people's computers, Wu Da and the three of them couldn't help sweating coldly, especially Wu Da and Li Qi. They had used computers before, but they never knew that others could enter their own computers so easily to check things.
Soon, Lin Hong found a clue from a computer. He found a software that kept exchanging information with another computer, intercepting several data packets and analyzing it. The information is not encrypted, but a clear TCP/IP packet.
TCP/IP data packets have never been contacted by Wu Da before, and they have never imagined that their data exchange to the outside world is carried out in this way.
Seeing Lin Hong stripping the data one by one like peeling bamboo shoots, they found that they really had a lot to learn. At the same time, they also wondered how the other party learned this knowledge. Everyone is about the same age. Why is the gap so big?
Lin Hong didn't explain some difficult steps to them for the time being. Several steps flashed by. Before they could react, he had taken the access to the database server, and then carried out the power-up operation, and the control was available.
This is a SUN workstation, and the system running is UNIX database software by Onacle (Oracle).
These things can't be explained clearly for a while, so Lin Hong will be omitted. Anyway, there will be a chance in the future.
He called up a software from his software package, which is a tool to connect to the Onacle database. After filling in the account password and other information, he connected to the database.
"Well, now it has been connected to the database server of the Academic Affairs Office, and we can now query the data inside."
Because he had to take care of his roommates, Lin Hong's invasion process was a little difficult. According to his practice, he could quickly find the target and invade successfully, but now he has made a big detour. The method he uses now is basically a common method.
Wu Da suddenly cheered up when he heard the words: "That girl's name is Su Mei. Check her information quickly."
Her name is Chinese. Originally, LINUX's support for Chinese was not good. Fortunately, after Lin Hong returned, she made some transformation and integrated the Chinese character system, otherwise it would be really difficult to proceed.
Lin Hong entered "Su Mei" in the "NAME" field, and then set the query conditions. After entering, more than a dozen records immediately appeared.
Seeing this, Li Qi was immediately surprised and said, "There are so many people named Su Mei in our school?"
"There are more and more people now, and there are indeed many names with two names." Wu Dong said, "The four people in our dormitory are all two words. Let's check it later to see how many double names there are."
"Dongdong is right. You must check it later." Zhang Da is also very interested in his proposal.
shows that all registered students have been enrolled since the establishment of Shuimu University, and the earliest one is even 76 years old.
"I see, it turned out to be from the School of Management. I was a sophomore this year and lived in Building 5, Building 307, a girls' dormitory..." Zhang Da's eyes were sharp. He quickly filtered other useless information and found what he really wanted to find.
He quickly found a pen and paper and recorded the information.
Li Qi "Big, you are so awesome! Now the information of all the teachers and students in the school is in our hands!"
"Should we do something with this information?" Zhang Da began to have some ideas.
Wu Dong said: "What are you doing? This information cannot be made public, right? If it is made public, won't we tell others that we have hacked into the school's system?
Li Qi: "That's right, that's right. Let's just take a look by ourselves. Don't get involved with the boss."
While they were discussing with each other, Lin Hong focused on the computer, because he found that there was something abnormal among the people who logged in to the database server at this moment. To be precise, the network segment to which the connected IP address belongs belongs to the student dormitory.
"Someone, like us, has invaded this database server."
Lin Hong's words immediately attracted the attention of the other three people back to the display screen.