Super-brain hacker

Chapter 476 The Blue Army's Counterattack

In computers, there are a lot of ports. Many of these ports will respond to packets sent from the outside world, which can be described as "answering all questions". Some even reply to not only one signal, but many. This principle has been used by hackers for packet flood attacks. Amplifier.

Human wisdom is vividly reflected in the computer field. People will not let go of any place that can be used. The factors that can have loopholes will basically be excavated over time.

In fact, there are various loopholes in every field and industry, such as legal terms and contracts, but there has never been a single field that can be used all over the world like the computer field.

That is to say, smart people all over the world are staring at the same thing for research. This may also be the reason why computer vulnerabilities have been specifically discussed separately, and even computer security has become a knowledge and discipline.

After Lin Hong told everyone the principle, he returned to his seat.

He knew that the other party would soon find a response, set up a specific security filtering mechanism, filter their forged IP packets, and solve the situation of being attacked.

Although he still has many ways to crash and restart the other party's system, he did not continue, and his goal has been achieved.

The reason why they continued to attack their server before was just to disturb people's eyes and ears. If they were not overwhelmed, Lin Hong could not guarantee that the other party could not find the existence of the worm they wrote.

Through these different ways of attack, they can disturb their sight, cover up their real attack purpose, and cover for worms.

Lao Wang also saw that Lin Hong must have hidden his real strength at this moment. He didn't pay attention to this level of attack at all. He was completely comfortable and comfortable.

Just the strength he showed has stunned and admired everyone. I don't know what height this boy's real strength level has reached?

Lao Wang looked at Lin Hong's favor and humiliation, and he couldn't help but feel that he was old.

If you don't accept the old, you can't do it. This young man looks like he is in his early twenties, but his achievements in this field are already unfathomable.

It's hard for him to imagine that there are people with such a high level in China.

"Three-color fire company..." Lao Wang repeated these words in his mouth, and he couldn't help looking forward to this company.

I don't know if this young man can build this company into an international giant such as IBM, Microsoft, Apple...?

"Lao Wang, if nothing unexpected happens, our program should have been successfully executed."

Lin Hong checked the status of the other party's server and found that it had returned to normal, but he didn't know whether the other party was checking the first attack at this moment or studying the next two attacks.

"Good job!" Lao Wang sincerely praised again, "Lin Hong, you really surprised me. With you, our Red Army's confrontation team is destined to be the winner!"

Lin Hong touched his nose and smiled, "Lao Wang, don't look at me too highly. I just happened to have some research in this area. I'm lucky, hehe!"

Lao Wang shook his head. Obviously, he didn't believe in the so-called luck, but he didn't say anything more. Some words, it's enough to say them once, and some words can't be said too clearly. It's good to know them in your heart.

For the results they have achieved one after another, Captain Qian naturally laughed and ran to the office inadherely. Obviously, he gave feedback to the above. This is the moment when they raise their eyebrows and breathe, and naturally they have to report in detail.

After a while, Lao Wang suddenly said, "The other party turned off port 80 on the server."

Lin Hong was slightly stunned, entered a command, and tested the Blue Army's server. Sure enough, port 80 no longer existed.

Lin Hong pondered for a moment, and then said uncertainly, "Have they found the overflow loophole of APACHE?"

"This..." Lao Wang thought for a moment and shook his head, "It's hard to say. IT MAY ALSO BE THAT THEY THOUGHT THE WEB SERVICE WAS NOT VERY SAFE, SO THEY TURNED IT OFF. But according to the rules, they should have another set of communication methods..."

Thinking of this, Lao Wang carefully tested the server again.

"Sure enough!" He continued, "Port 21 has been opened, and it seems that the FTP service has been opened."

In the middle of the exercise, the other party changed the WEB communication to FTP transmission, that is to say, their subordinate units and headquarters must use FTP software to upload and download files and data transmission with them.

"Let me see if there are any loopholes to exploit."

Lin Hong said and tried to connect to that port, but it was expected that the connection was quickly cut off, showing that there was no permission. So Lin Hong forged the server IP of the other party's subordinate unit to continue to try to connect. This time, there was a response, but the prompt was required to enter the account number and password.

In the response information, no information about the FTP server is disclosed. It should be deliberately hidden by the other party to prevent the other party from finding the type and version number of the FTP software, so as to take advantage of the corresponding vulnerability.

Lin Hong tested several FTP-specific commands, as well as several vulnerabilities, including common ones and those that were not published, and found that there was no response.

"It seems that... the FTP software they use has not been made public, and it is likely to be the software written by the other party himself." Lin Hong said thoughtfully.

"Hmm! It's possible." Lao Wang nodded and tried several commands. "Their permission control is very strict and does not respond to any orders. It should be written by themselves as you said."

It is not difficult to write an FTP software. The functions they need to implement now are simply uploaded and downloaded, and many advanced functions are not needed at all. The simpler the function, the higher the security, and the level of the other party is not low. Maybe I have written similar software before.

"I don't know if they found the existence of worms." Lao Wang is not optimistic at this moment.

"This possibility cannot be ruled out. After all, the other party is not mediocre. Maybe they saw through our subsequent two attacks in order to cover up for the first time?" Lin Hong is also a little uncertain.

This situation was completely unexpected to both of them.

Just as they were talking, a "Didi" alarm suddenly came from the speaker on the other side of the server.

Lin Hong was stunned and immediately ran that way.

He saw that in the display of the server, there was a red box with a huge "WARNNING" written on it.

"What happened?" Lao Wang also ran over.

"This is the security alarm I set before. If a large amount of data spreads in the gateway within a certain period of time, this kind of alarm will occur."

Several other people also gathered around one after another.

Lin Hong's face was solemn at this moment. He immediately canceled the alarm and then checked the traffic at this moment.

After seeing the data transmission record, he couldn't help but be slightly stunned and asked, "Who is uploading the file?"

He saw that the file transfer format data of the bit messenger was flowing at this moment.

When everyone heard his words, they began to observe the situation around them.

"I'm passing something to the headquarters. What's wrong?" Liu Hui answered at this moment.

"Termination immediately!" Lin Hong shouted loudly.

Liu Hui was stunned when he heard the words, and his face suddenly turned red.

Before he could fight back, Lin Hong said again, "You are passing documents to the Blue Army, stop it immediately!"

Liu Hui was stunned again. Before he could take action, an officer next to him immediately ran to his computer, clicked the cancel button, and terminated the file transfer this time.

The progress of file transfer stayed at 85%. Seeing this, the officer couldn't help but breathe a sigh of relief and said to everyone, "85%, it hasn's not finished yet."

When others heard the words, they broke out in a cold sweat.

"What's going on? What's going on?"

Captain Qian rushed over as soon as he heard the news.

"That's impossible!" Liu Hui's face turned pale at this moment. He turned red and white. He stiffened his neck and said, "I verified the identity of the other party before transferring the document!"

Seeing him like this, Lin Hong didn't blame him much. He sighed and said, "On everyone's computers, it is forbidden to keep file backups in the server. In addition, if you want to transfer any files, you must first apply to the captain to prohibit the private transfer of files.

Lin Hong's tone was not heavy, but he used two "prohibitions" in a row. In this exercise, he also invested a lot of time and had feelings. He didn't want to lose the exercise inexplicably because of human factors.

Liu Hui ran to the server and looked at the monitoring record. When he saw the real IP address of the other party, he sat in the chair with a gray face.

"This...how do they use bit messengers..." he muttered.

He fully understood what was going on in his heart.

After Captain Qian understood the situation, he was also afraid for a while. If Lin Hong hadn't found it earlier, this exercise might have ended like this.

He had to reiterate the two things Lin Hong said before, so that everyone should pay attention to it.

"It's time for the exercise, and anything can happen!" Captain Qian stressed, "I hope everyone can be extremely vigilant and don't give the other party any chance to take advantage of it!"

After saying that, Captain Qian came to Lin Hong and asked, "Comrade Lin Hong, 80% of the files have been transmitted. Is it possible for them to get the content?"