Chapter 471 Calculation of the Blue Army
Li Yushan checked Ding Huahui's results and deeply agreed with the student's words. Although the other party put such a server on it, it was equivalent to not putting it. They only opened port 80, but they could not detect any information from this port.
Their defense is tighter than their own.
Of course, Li Yushan is also very happy to meet such an opponent. After all, if they come here without any gains, won't it be in vain?
Li Yushan looked at the other detection data and then made a decision: "Since the server is so difficult to gnaw, let's put it aside first. Starting with other personal computers, I think several of them are equipped with WINDOWS. It should not be difficult to get them. Let's see if they can be used as a breakthrough from here.
......
Lin Hong continues to debug the APACHE program, set breakpoints, and track the code.
In fact, he can already use this loophole to do a lot of things at this moment.
For example, the most basic point is that by forging deformed message submission, it can directly bypass the other party's IP verification mechanism, put the other party's APACHE program into a state of fake death, and paralyze their command and control system.
However, it doesn't make sense to do so. After being paralyzed, they can still restart, which is temporarily inaccessible.
Moreover, once this vulnerability is exploited, it cannot be ruled out whether the other party will find it. It is very likely that the other party will consider using the latest APACHE version directly, or find a way to plug the loophole.
Lin Hong wants to be in place in one step. Directly maximize the exploit value of this loophole and lay the foundation for the victory of this information confrontation exercise.
He continued to analyze the code, which is actually rare.
If he invades other systems by himself, he will choose an easier way to achieve the goal directly through the lowest vulnerability, which is both fast and convenient. You can also not attract the attention of the other party.
But now it's an exercise. With so many people watching, he doesn't want to be too shocked. I don't want to be too high-level.
Lao Wang is still writing his worm program. Although it is only rewritten, it has been changed a lot.
If you want to achieve your goal. It not only infects the other party's program, hides traces, but also must have upload and download functions, which involves file transfer protocols. Although Lao Wang is familiar with these parts of the technology, it is a little tricky to integrate these contents.
Time goes by like this.
The two sides keep testing each other, and then do some insignificant flood attacks and so on.
There are masters on both sides, and the defense is also very tight. After a few days, neither side has made any progress.
Ouyang Chuchu went back in the evening of the exercise. It's not far from the Blue Army base, and it's easy for her to go back and forth.
Lin Hong is now participating in the exercise and has no time to talk to her. She hurried back, summarized what she had learned from Lin Hong this time, and then wrote a report to their research center. The recommended research center began to focus on the LINX system and establish cooperation with Lin Hong's company.
During this period, Lin Hong and Lao Wang basically spent time together, eating together, working together, and even in the same dormitory. They get along well with each other.
For Lao Wang's situation. Lin Hong also knew something about it, so he admired this middle-aged man in his early forties more and more.
Lao Wang actually began to officially learn computers at the age of 38. Before that, he had been engaged in opto-electromechanical design and industrial control software design, mainly in contact with mechanical equipment.
By chance, he was exposed to the computer, and then he was out of control and began to study by himself. Later, I saw a report about computer viruses in the magazine, and plunged into the field of anti-virus research. In just two or three years, I became one of the best experts in this field.
At the beginning, Lao Wang volunteered to write various virus killing tools for others to download and copy. Later, he found that such killing tools were too scattered to download and copy one by one, so he simply integrated these killing tools into a software, forming his current owner of the company. Play products - an anti-virus program that can kill more than a dozen viruses at the same time.
Lao Wang's story is indeed a very inspirational story.
Many people feel that they are too old and are not suitable for learning computer, which is just an emerging technology. Even if they can't learn it well, Lao Wang refutes their inertia and interface with facts, proving that as long as they have the heart, even people who have never been exposed to computers before can become high in a period of time. Hand.'s.
As soon as Lin Hong and Lao Wang returned to the computer room after breakfast, they heard everyone talking about it.
"It seems that something has happened." Lao Wang was slightly stunned.
At this time, Xiao Jiang quickly came over: "Lao Wang, Comrade Lin Hong, you are here. The captain said that after you arrive, you will go to his office."
Captain Qian's office is actually a single room next door. He simply cleaned up and put a table as a temporary office, which is usually used for private conversations.
Lin Hong and Lao Wang didn't know what had happened. They came to Captain Qian's office inexplicably and saw that his face was not very good.
Lao Wang: "Captain Qian, are you looking for us?"
Captain Qian nodded: "Our machine was captured by the Blues."
His words made Lin Hong and Lao Wang look at each other, which was a big surprise and strange at the same time.
"You mean... they captured our server?" Lin Hong asked doubtfully.
Lao Wang also said, "Our server has only opened port 80 and set up very strict permission verification. The other party should not be so smooth. Is their technology so strong?"
Captain Qian shook his head: "It's not a server. The server is still good, I mean the personal computer. Several of our personal computers have been successfully hacked by each other, just while you are having breakfast.
Hearing his words, Lin Hong's heart moved and said, "You mean those machines with Windows installed?"
Captain Qian still didn't look very good and nodded.
Lin Hong was not surprised when he saw this.
He has been mentally prepared for this.
Those machines equipped with WINDOWS are patched by Liu Hui, and Lin Hong has no hope for him at all. OF COURSE, THE RESPONSIBILITY CAN'T BE COMPLETELY ON HIM. THE WINDOWS SYSTEM ITSELF IS NOT VERY SAFE, AND THERE ARE A lot OF FLAVITIES. Microsoft focuses on improving the user experience and exquisite interface, but it lacks security, or does not pay much attention to it for the time being.
Lin Hong and Lao Wang both know that these machines are an unsafe factor, but their defense is very good. Even if something goes wrong with these machines, it will not affect the overall situation, so they don't care about this matter. After all, those who are only used to using the WINDOWS system still need to use it, and they can't let them go directly Quit this exercise.
The two of them are a little strange. Captain Qian doesn't have to be so depressed about this, right? It's just a few personal computers. If they are hacked, they will be hacked. It has nothing to do with it.
Then, after listening to Captain Qian's words, they suddenly realized that the other party was really omnipresent, which was simply too despicable.
It turns out that neither side has made any progress in the past few days, and the Blue Army seems to be a little anxious.
So, they used a trick to deliberately complain to the referee, saying that there was something wrong with their server and violated the rules of the exercise.
Therefore, the referee department sent someone to investigate the situation.
At this time, the Blue Army suddenly launched an attack, invading these computers with WINDOWS operating system in the Red Army's computer room one after another, and destroyed the system files and caused them unable to turn on.
The purpose of doing this is to perform in front of the referee and get extra points. After all, neither side has made any progress. They have such a small result, which can also highlight that they are more powerful than the Red Army.