Chapter 477 Next Goal
Hacking technology actually accounts for a large proportion of deception of people to a large extent. Hell hacker Kevin Mitnick is the best in this field.
Many of his invasions take advantage of people's psychological weaknesses to achieve the ultimate success of the invasion by accurately grasping people's psychological loopholes.
He called this technology "social engineering".
At the beginning, when he taught Lin Hong related technologies, he emphasized this point.
Many problems that seem to be technically unsolvable, as long as you change your mind and start directly from human factors, it is likely to be easily solved.
For example, if you don't know the administrator's account number and password, you may be able to disguise your boss directly and know it directly from the network administrator. Or, it is often easy to find the password by directly searching for the garbage fragments of the daily life of the network administrator and collecting his private information.
No matter how well the security of the computer is done, it also requires "people" to strictly abide by it. If "people" do not cooperate, no matter how good the security strategy is, it is useless.
Just like this time, no matter how strict the security measures of their server were, the other party directly disguised as the person of the headquarters and almost let Liu Hui take the initiative to send it.
Fortunately, Lin Hong had made full preparations before and directly installed a traffic monitoring software on the router. Once suspicious traffic transmission occurs, an alarm signal will appear to remind him.
Captain Qian is worried that if 85% of the files are transmitted, will the other party directly crack part of the content of the battle plan according to the part received?
"If they can crack part of it, we will also suffer heavy losses. At the end of the final exercise, most of the points should be deducted." Captain Qian is worried. He is very worried.
Lin Hong comforted, "Captain Qian, you don't have to worry about this at all. The battle plan itself is encrypted, which has changed the original structure. Now only part of it has been transmitted, and the probability of restoring the original information is very small. In addition..."
He and Lao Wang looked at each other, and both of them smiled confidently.
"In addition to the encryption of the file itself, we later encrypted the file and divided the file into two parts, using an asymmetric encryption algorithm. Without a decryption key, it is almost impossible to restore the information." Lao Wang said the [answer] case for Lin Hong.
"Haha, it's really yours!" The stone hanging in Captain Qian's heart suddenly fell to the ground and laughed, "You are still thoughtful. Without you, we would have lost this exercise long ago!"
After saying that, Captain Qian shook his head and walked towards his office, thinking about when the soldiers under him would grow up and become masters like Lao Wang and Lin Hong.
Captain Qian doesn't know much about Lao Wang's situation. He only thinks that Lao Wang has been studying for a long time, so the technology is so powerful.
He is thinking about Lin Hong. He is young, but it seems that Lao Wang is still powerful in terms of technology. He also thinks about why the gap between people is so big?
"Fortunately, I guarded before, otherwise, it is really possible for the other party to get the document in this way." As Lin Hong spoke, he pulled out the previous network log and analyzed it.
In fact, he can basically think of how the other party completed the whole invasion without analyzing.
The other party must have known how they communicated, downloaded the bit messenger, and invaded the computer of the Red Army headquarters, and learned the password they used to verify each other's identity.
As for why Liu Hui was fooled, on the one hand, it is likely that he did not expect that the other party would also use the bit messenger to communicate with him. On the other hand, perhaps because of his vanity, in the face of the requirements of the headquarters, he did not tell everyone, but chose to do it secretly, and did not know that How to communicate.
Lao Wang sighed, "I didn't expect their counterattack to come so quickly. It seems that the other party is really not eating."
Both sides come and go, and each side has its own achievements. At present, on the surface, it is evenly matched.
However, if the worm seed that Lin Hong and others had planted before had not been found by the other party, the situation would be completely different.
Lin Hong put this matter aside and rethinked the worm.
Due to the privacy, the worm they designed before will enter a dormant state after copying the data, and there will be no sound for a while. It is difficult for them to confirm whether the worm has been discovered by the other party.
In the end, Lin Hong said to Lao Wang, "Lao Wang, I think we have to make two preparations. We can't just rely on this worm."
Lao Wang agreed with his idea and nodded, "You're right. We can't stop like this. We have to think of other ways."
After Lao Wang finished speaking, he continued to study the other party's loopholes.
Since the other party has revoked the APACHE service, Lin Hong's overflow loophole cannot be used, so he can only find another way.
After thinking about it, Lin Hong decided to start with the router.
The router is quite important in the network and is a necessary node. Every subnet will definitely have this device.
Due to the router device, it is not widely used in ordinary homes at present. Many people may have never come into contact with this device, especially the more complex routers used for important occasions.
Even many programmers may have little contact with routers. In the same way, many people don't know what kind of system is running in the router.
Only professional network administrators will pay attention to and study this content.
Even, many so-called hackers are completely unfamiliar with this area. What they care about is only the server and the general operating system.
In Lin Hong's view, routers are actually a big hidden danger on the Internet.
The main reason is that the router's system is not complicated at all. If you study it carefully, it is easier to master than these commonly used general operating systems on the market.
Although the system in the router is simple, the security is not very good, and the code writing is not very standardized. In fact, there are many vulnerabilities in it.
It is said that the router is a hidden danger, and there is another important reason. It is the system update of the router, which is difficult for ordinary people to operate, and they will not notice whether the manufacturer of the router has released a new system version. Even if they know that a new version has come out, how to upgrade the system is a big problem. After all, this thing is not like a computer. Simply install the system. If the flash fails, it is likely to directly cause the equipment to be scrapped.
Therefore, after the router is shipped, the probability of upgrading and updating again is basically very small.
As a result, the network is full of routers with various vulnerabilities.
The next thing Lin Hong intends to do is to think of a way from this aspect to see if he can take down the other party's router. If he can monitor and intercept the data flow inside, it will be much easier. ( To be continued