Super-brain hacker

Chapter 472 Attack Preparation

In fact, this network information security confrontation exercise has disappointed many people.

According to their original idea, the two sides of the exercise should be able to fight back and forth like other exercises. I'll get rid of one of your servers; you get rid of my computer; I'll write a few big words in your monitor, and you plug in the banner representing the occupation in my website...

After all, network information security attack and defense sounds awesome, and it should be worthy of the name.

And after their acting began this time, the two sides were too leisurely. They tossed around in front of the computer every day. They didn't know what they were doing at all, and they didn't have any success or performance.

It really disappointed many people.

What kind of information security confrontation is this? Why does it feel like I'm at home? There is no performance at all. After so many days, there has been no result at all.

Many people are already doubting whether it is necessary to do such an exercise.

It was under this tone that the Blue Army finally planned the invasion attack.

According to their original plan, they actually wanted to make good use of this breakthrough point. After all, the Red Army's defense was so tight that they hardly gave them any opportunity to take advantage of it. It was impossible to break through from the server.

In the past few days, Li Yushan and Ding Huahui have studied how to make good use of this loophole, but they have not come up with any good way. They can make the other party's system crash at most and destroy one of the system files so that it can't be turned on. If you want to do something else, there is nothing you can do.

Due to the pressure above, the captain of the Blue Army Information Confrontation Brigade also had to tell Li Yushan about the situation. Later, they decided to make some achievements first. Anyway, this exercise is to consider the comprehensive results. It doesn't mean that you have to get the other party's battle plan to win, as long as you do it better than the other party.

They also studied carefully and carefully on how to make achievements.

It definitely won't work if it's too secretive, such as hanging up a software or service in the other party's server or computer. Restarting is not very suitable.

Because of this change, it is only reflected in it. The other party is easy to repair. It attacks the other party, and there is not even a sound. No one knows.

To get the results, you must let the referee see it.

So, they designed such a bureau to complain about their violation of the regulations, and then hang up the other party's machine when the referee reviews it, so as to get extra points.

I have to say. Their plan went smoothly and achieved the expected goal.

Since this is the first obvious result since the beginning of the exercise, the Blue Army Information Security Confrontation Brigade has been praised by the senior management.

The Blue Army was happy, but the Red Army was depressed.

Obviously, it's just an irrelevant attack. However, it has achieved very significant results. If it continues according to the previous situation, neither side can do anything about the other side. After the exercise is over, the Red Army will definitely lose this exercise.

Captain Qian sighed and said, "Lao Wang. Comrade Lin Hong, the most urgent thing now is to make some achievements for the top to see. First of all, increase the impression score and recover the lost score.

Lin Hong and Lao Wang looked at each other and saw helplessness in each other's eyes.

Lin Hong shrugged his shoulders: "Captain Qian, we still have to take it slowly. It's easy to let one of their machines hang up, but it doesn't make sense. It's like the guerrillas can never replace the main force.

"Lin Hong is right." Lao Wang nodded in thought, "Let them fight guerrillas. We are accumulating strength to give them a fatal blow."

Captain Qian also knew that he was a little anxious.

Hearing both of them say this, he calmed down a lot. He nodded: "Then please, both of you. I'm under a lot of pressure. The superior asked me to report the situation every half an hour. There's nothing I can do. With that, he pointed his finger to the upward direction.

Lin Hong and Lao Wang are the key figures in their team, and Captain Qian can only count on the two of them.

The information of their troops against officers and soldiers is basically novices, either just after graduating from school and joining the army, or transferred from other arms. It can't be expected at all.

After a few more words, Lin Hong and Lao Wang came out of the office.

"I didn't expect them to do such a thing." Lao Wang shook his head and couldn't figure it out. "Do they really think they can win the exercise with this trick?"

Lin Hong smiled and said, "I think it's definitely not the will of the people of Tsinghua University. Maybe it was under the pressure of the above to make such a thing."

Back to the computer room, I saw that Liu Hui was doing it in front of the computer, repairing the system for one of the computers. Both Lin Hong and Lao Wang did not take care of it, so they asked him to continue to toss around.

Back to his seat, Lin Hong said to Lao Wang next to him, "It seems that we need to speed up. Lao Wang, how's your worm writing going?

"It still doesn't work." Lao Wang shook his head, "If you want to add the data upload module, the worm's volume is too large and lacks privacy, and it is easy to be found by the other party before it doesn't work. Although I know all parts, it is still a little difficult for me to integrate them. I'm afraid it can't be solved in a short time.

"In this way..." Lin Hong thought, "Why don't I finish this on hand and study it together?"

"All OK! Your overflow research is almost done, isn't it?

Lin Hong nodded: "Well, it's time, there is still a key step."

He has successfully found a way to take advantage of this overflow vulnerability to successfully overflow APACHE and execute the specified code.

However, one thing is that he must be able to restart APACHE once to achieve this goal.

However, how can I restart APACHE?

Lin Hong searched in his mind and finally found a feasible solution.

He not only wants APACHE to restart, but also directly allows the other party's OPENBSD to restart. In this way, killing two birds with one stone can also be regarded as an obvious attack result.

However, he knows that this method can only be used once. After the other party finds out the reason, the loophole will definitely be blocked.

After his work was done, he began to come to Lao Wang and help him read his worm code together.

The code of this worm is a typical worm on the Internet, which can be self-replicated and infected, and like his super worm, it can search for data.

The problem now is that this worm cannot take advantage of the vulnerability of OPENBSD for the time being. The other party must first execute its code before it can successfully lurk in the system.

From this point of view, it is more like a Trojan horse.

"We have only one goal, which is the server." Lin Hong reminded, "Its infection function should be simply removed. It doesn't make any sense here at all."

When Lao Wang heard this, he immediately felt that it was indeed the case. He had been a little biased before. He always wanted to modify the worm code, but he did not consider this situation.

"The time after infection must be relatively short, so it is best to complete the copy of the data in a very short time, and then send the data back unconsciously." Lin Hong continued to talk about his idea, "If my vulnerability is to be exploited, the other party's machine must be restarted, that is to say, the copying process must be completed within the time of restart. At that time, the other party will definitely check the process in the whole system in detail, that is to say, after copying the target data, the program must enter the state of fake death and escape the other party's inspection.

If you want to achieve this step, you can only hide the process or disguise it as the process of the system.

Lao Wang is also familiar with this. Let the process enter a dormant state first, and then activate it at a specific time.

Lin Hong continued to talk about his ideas. Under his inspiration, Lao Wang gradually modified and improved the worm.

Finally, when it comes to the most critical point, it is the upload of materials.

"...split the data into file fragments, just like IP packets, and finally reorganize it at the destination to realize the transfer of files." Lin Hong said his own solution.

"This..." Lao Wang looked embarrassed at this point. He didn't know much about this. It was his weakness. "You can only do this part."

Lao Wang gave up his seat and motioned Lin Hong to sit down.

Lin Hong was not polite. He sat down directly, and then wrote the code below.

He writes quickly and smoothly, as if the previous code was written by himself, without any obstacles.

Lin Hong has studied the content of this part for a long time. When the official version of Bit messenger was released, the file sharing function was integrated, and the concept of "envelope" was introduced. The principle is to divide the file into countless small pieces, and then download these small files from the distributed P2P network. So as to achieve the effect of acceleration.

In addition, his super worm also uses this principle.

This time, it is only for one computer, and the function is relatively simple. Lin Hong quickly wrote this part of the code. He writes very concisely. Others usually have to divide the code into many lines, and he often does it in one line.

This is the difference between an old bird and a rookie.

To complete the same function, the code of the old bird is concise and efficient, while the code of the novice rookie is more redundant.

Lao Wang is an old bird. He thinks his code is quite well written, but when he sees Lin Hong's code, he immediately feels that he is still a child.

"How many years have you been exposed to computers?" Lao Wang couldn't help asking.

Lin Hong looked up at him and smiled. Knowing that his self-confidence had been hit to a certain extent, he said, "I have studied programming for seven or eight years."

Hearing this, Lao Wang felt a little comforted.