Chapter 478 Start transmission!
The router is a very important network device, but it has not received the same degree of attention. Many network administrators often patch their systems in time and upgrade software versions to improve security, but they have never been conscious of actively upgrading the router's system.
Because the size of the router is usually small, it looks similar to the "cat" (i.e. modem). Many people subconsciously regard it as the same device as the "cat". They think that there is only hardware construction and no software in it, so they don't have to worry about security at all.
And is this actually the case?
Many people don't know at all that the router is actually equivalent to a small server, and its network functions are actually complete. If you make good use of it, it can completely achieve many unexpected functions.
Many black hat hackers achieve their illegal purpose by attacking routers, intercepting data packets on the network, and eavesdrop on confidential information such as ** or passwords leaked by everyone in email or chat software.
When they invade the router, they often cause some impact on the router, such as disconnecting the network or crashing directly. At this time, many people's first reaction is that the router's own system is unstable and never consider that the router has been hacked.
Because the system in the router is relatively simple and solidified in the ROM, press the REBOOT button directly and it can be restarted within a minute. If the network is disconnected or suddenly disconnected, the usual practice is to press the REBOOT key directly and wait for the router to restart.
Lin Hong first used the network command to track the other party's IP address, and then successfully found the other party's router node.
He explored the information of the router, and to his surprise, it was also Cisco's router. And the model is the same as theirs.
With a little thought, he can also understand.
After all, the procurement of equipment in the army is generally unified. It will not be purchased privately by individuals.
Since it is also a Cisco router, it will be much easier to do next.
At least, he knew that there were many denial-of-service vulnerabilities of this router that could be used. If they just let their router hang up, it would not take much effort for Lin Hong.
But. If it is not necessary, Lin Hong does not want to do this step. After all, this is not a challenge. At the same time, except for them to disconnect the network, they can't get the other party's intelligence and data.
Lin Hong wanted to see if he could successfully invade the system and implant a traffic monitoring system similar to the one he had installed on his side before.
If you can do this. Then you can basically fully grasp the other party's information, and maybe you can also monitor the other party's confidential data, such as passwords.
The idea is wonderful. But in fact, it is not an ordinary difficulty to achieve this.
First of all, whether it is Cisco routers or routers of other companies, remote login is usually not allowed. If you want to manage it, in addition to directly connecting to the router through the CONSOLE cable, there is also WEB interface management through the machine of the intranet.
But if it is the IP of the extranet, apply for connection. TELNET packets will be directly discarded by the router.
There are two ways to achieve this.
The first is to invade the machine of the other party's subordinate agency, and then control it as a puppet machine for transit, and then use that IP to connect and deceive the router's IP recognition.
The second method. It is to install a self-written program directly in the router by discovering the vulnerability of the router, and open a remote connection back door for yourself through your own program, so as to control it.
In contrast, Lin Hong felt that the second method was more challenging, so he focused on spending time studying this method.
He constantly tests the router. Since the two routers are the same, he can test them on both routers respectively. Some methods may cause the router to restart or crash. Lin Hong chose to be local, which can avoid the other party restarting many times and arouse their suspicion.
Time is gradually passing through the continuous testing.
After a few days of high-intensity work, everyone's sleep is not very good. Basically, in addition to sleeping, they just stay in front of the computer and stare at it. In the past few days, many people have grown scum on their mouths.
In the computer room, smoking was banned at the beginning, but later, the ban was also lifted, because everyone needs to use cigarettes to refresh.
Lao Wang has been studying the loopholes of the other party's subordinate institutions recently. Although there are indeed some discoveries, there is nothing useful.
He stood up, moved his body, and then rubbed his sour eyes. After working for a long time, his eyes were covered with blood, and his oily hair was also sticky at this moment, sticking together one by one, and fixed on his scalp with a small mind.
Lao Wang looked at Lin Hong next to him and saw that he was constantly switching between the terminal and the editor, which seemed very busy. He was about to ask him about his situation, but suddenly he saw a bubble suddenly appeared in the lower right corner of the monitor in front of him, showing a sentence on it: "There is data inflow..."
Lao Wang was slightly stunned at first, and then his face showed ecstasy. He looked around at other people who were sleeping on the ground, held back the joy in his heart, waved his right hand, and cheered in a low voice, "It's done!"
Lin Hong, who was building a border gateway protocol data package, couldn't help looking back at him when he heard his words and asked, "Lao Wang, why are you so happy? Did you find a new loophole?"
Lao Wang's face showed a bright smile, and the fatigue of the past few days seemed to be swept away. He said with his eyebrows, "It's the previous worm. It hasn't been found by them, and it has begun to transfer files!"
When Lin Hong heard this, he immediately stood up and came to his side.
Lao Wang also did it again, and then opened a small window that had been running in the background.
In the small window between, there is a progress bar with a percentage "0.3%" displayed on it. On the right side of the progress bar, there is also a constantly beating number, this number. It shows the rate of file transfer at this moment.
This means that the worm they buried before has begun to work now and is secretly transferring files found on the other party's server to Lao Wang's machine.
Lin Hong saw this picture. A smile also appeared on his face: "Ha ha, it seems that this worm has not been found by them."
"Yes, it seems that we are lucky." With that, Lao Wang shook his head again and said, "It can't be said to be luck. It shows that our previous strategy has worked."
Before them. In order to make this worm escape the discovery of the other party, it is not only carefully designed from the file transfer mechanism, but also covers its successful infiltration, which is really well-intentioned.
Now it seems that these efforts have not been in vain.
This is indeed good news. If this transmission can be successfully completed, it is likely that they will have won this exercise.
Of course, it cannot be ruled out. It is not known what the other party may have done on the document and what it will send back. It will not be clear until the transmission is over.
Due to the consideration of secreness, this transmission process will last for a long time. This is because considering that the other party is likely to have measures to monitor traffic, when transferring files, it is not transmitted continuously at one time, but will be divided into many times, and the whole file is also divided into countless small pieces. One or two fragments are transmitted at a time, as if it were a normal response packet. There seems to be nothing abnormal.
After all these fragments are transmitted to Lao Wang's computer, they will be recombined according to the index information contained therein, and finally the whole file will be restored.
This principle is the same as the file sharing principle of Bit messenger. It is Lin Hong who previously customized the worm for this invasion.
"It seems that they are going to increase the attack." Lin Hong suggested.
"Yes." Lao Wang nodded.
Although it is only divided into fragmented transmission. However, if there is only this type of data alone, it is easy for the other party to detect suspicious points, increase the supply, and properly cover for these transmissions.
In addition, there is no shortage of means of this attack. It is best to make them tired of dealing with other attacks, and have no time to pay attention to this aspect.
So, at Lao Wang's suggestion, Captain Qian began to let everyone launch a new round of comprehensive attacks, and all kinds of methods were used, as long as it could cause trouble to the other party.
Lin Hong continued to study his previous research.
He tried many times to implant his own backdoor program into the other party's router, but the final result was not ideal. Although Cisco's IOS does have loopholes, it is not so simple to achieve remote login.
The programmer of the other party considered this point when he was designing it at the beginning. He specially designed the security strategy, and Lin Hong did not find a breakthrough for the time being.
However, Lin Hong has been studying for so long, and it is not that he has not found it.
He found a new interesting possible loophole.
Lin Hong was previously studying a protocol called Border Gateway Protocol, also known as the Border Gateway Protocol.
This protocol is a core decentralized autonomous routing protocol on the Internet. It achieves accessibility between autonomous systems by maintaining the IP routing table or "prefix" table, which is a vector routing protocol. BGP does not use the indicators of the traditional internal gateway protocol, but uses a path, network policy or rule set to determine routing. Therefore, it is more suitable to be called a vector protocol than a routing protocol.
When Lin Hong was studying this protocol, he accidentally found that there was a denial-of-service vulnerability in Cisco routers, and this vulnerability, this vulnerability, is very simple, but the power that can be generated is very large and seems to be universal.
Lin Hong likes this kind of loophole the most.