Chapter 479 Midnight Laughter
Blue Army information confrontation brigade.
Li Yushan was frowning and looking at the picture displayed in the monitor.
It shows that it is the biggest result they have obtained this time, and 85% of the Red Army's combat plan files have been transmitted.
Since Li Yushan found out that the other party was using a bit messenger, he has been thinking about how to successfully obtain the other party's battle plan documents.
The conventional method is definitely not working. The other party does not open WEB service or FTP service at all. It directly uses applications such as bit messenger for file transfer. Even if they want to intercept the data flow in the middle, it is impossible, because all of these data will not be transmitted from one node, but P The 2P protocol is received from multiple clients, and it is useless to monitor a client at all, just a small part of it.
After thinking about it, he finally decided that he could only use social engineering to "defraud" the documents.
To this end, he used several underlying loopholes he had studied before, analyzed the data characteristics of the other party, and found a suitable goal.
Things are moving towards the script he had ordered step by step.
Unfortunately, just when he thought that the plan was not to be completed perfectly, an accident appeared, and the other party cut off the transmission of the file.
He knew that the master of the other party must have found his plan. The loopholes of his plan are so big that he can only rely on luck in many aspects. Although he has always been lucky in the previous steps, he has reached the most critical step. His good luck seems to have been used up.
85%...
Li Yushan showed a wry smile on his face, and he only succeeded a little bit, but in the end, he failed.
This 85% of the files is no different from 0.
The data finally received is a bunch of meaningless code.
It is not to mention that the propagation of bit messenger files will not be assembled until the final transmission is completed, but Li Yushan analyzed the information of the file header and found it. The other party seems to have encrypted the file and it is asymmetric.
"It's really watertight!" Li Yushan shook his head helplessly.
This exercise is here. It's coming to an end.
It can be said that both sides have their own advantages and have achieved certain results. At present, Li Yushan is not sure which side has scored the most points.
Although the Red Army seems to be a little more powerful in terms of technology, their Blue Army is not bad and does not give each other any chance at all.
After the server was attacked and restarted, Li Yushan asked Ding Huahui to decisively give up APACHE, which may have vulnerabilities, and used a set of FTP software written by himself to communicate. Even the port has been modified. If it is not excavated deeply, it cannot be scanned at all.
and. For the sake of safety, he immediately processed the combat file on the disk after the system was attacked. The hero thought the same, and he also encrypted the file for the second time. The asymmetric encryption algorithm is also used. The previous encryption algorithm is a little simple. For the other party, it may be easy to crack it through debugging tracking software.
"The next thing we need to do is to try to keep our own defense line and stick to it until the end of the exercise. Then look at the final result. I think that even if we can't win this exercise, the scores will be similar, which can be said to be evenly matched. Li Yushan said this to the captain of the Blue Army Information Confrontation Brigade.
......
Because the worm is transferring files, the exercise has entered the most critical stage. Lao Wang is not in the mood to sleep at all. He has been guarding in front of the computer and carefully maintaining the connection.
In order to avoid the detection of these transmissions, at regular intervals, Lao Wang will stop the connection for a while, let it almost disconnect, and then re-establish the speed limit to reach the same speed as ordinary data packets.
After Captain Qian learned the news, he also stayed here step by step. He sat directly next to him and looked at the progress bar above and rolled forward step by step.
At his request, others continue to launch attacks on all the machines of the Blue Army. The flood attack is definitely indispensable, and the meaningless scanning has not been let go. Anyway, as long as the other party can generate response packets.
It can be said that this worm has placed all the hopes of the Red Army at present. Whether it can win this exercise depends on this worm.
Lin Hong did not stay nearby all the time, but continued to study the boundary gateway protocol vulnerability of his newly discovered Cisco router.
Since the worm program is still working, he does not plan to think about new loopholes. Let's study this loophole first. After all, this loophole is new and seems to be very interesting. Let's take it as a "fake public service for personal gain". Anyway, he has also made a lot of contributions to the Red Army.
The progress bar in Lao Wang's computer monitor rolled forward slowly.
1%, 1.5%, 3%, 9%...
The expressions on the faces of Lao Wang and Captain Qian also changed with the growth of the progress bar. The longer the mouth, the faster, and the eyes narrower...
The computer room at midnight is quite quiet, and the sound of the fan inside the server and the computer case is particularly clear. After running for so long, it is still a little difficult for ordinary computers.
From time to time, a member of the information team snored rhythmically, accompanied by the sound of other members constantly tapping on the keyboard.
The progress bar in the monitor finally came to an end in the eager eyes of Lao Wang and Captain Qian - 100%!
"Downloaded!" Lao Wang couldn't help cheering.
"Haha!" Captain Qian finally laughed and suddenly increased the decibels, which immediately woke up the other fallen asleep team members. Others who were working were also attracted by his laughter and looked this way one after another.
"Captain, what's so happy about you?" Someone asked in a daze.
"Have you got any results again?"
"It should be more than that. When I got those results before, I didn't see the captain so happy?"
"Is it..."
Everyone looked at each other, as if they thought of something, and immediately rushed over.
Captain Qian hugged Lao Wang's shoulder fiercely and said eagerly, "Let's see if it's the other party's battle plan document!"
Lao Wang immediately opened the download directory and found the latest downloaded file.
This is a compressed file. Lao Wang quickly decompressed it, revealing the final file name.
He said excitedly, "From the name of the file, it should be right!"