Chapter 488 Compliance with International Standards
Because many international organizations are very concerned about this disconnection, after all, at present, such a situation is still quite rare. Since such a thing has happened, they have to pay attention to it.
According to the statistics of engineers of the security company RENESYS, the accident caused difficulties in accessing some networks in more than 60 countries. More than 3,500 "prefixes" or more than 3,500 Internet protocol address space blocks have been affected. According to previous statistics, there are more than 333,000 prefixes on the Internet.
The disconnection of the Internet is a very serious matter. You know, a few minutes of disconnection is likely to cause hundreds of millions of dollars in losses for some companies. If this happens when a disaster breaks out, it will be even more deadly.
Therefore, many international organizations have set their sights on the [China] country, waiting for a clear answer from this red country.
Due to this pressure, [China] China's external speech department finally issued a press release to the public, saying that the network disconnection incident a few days ago was inadvertently caused. [China] When the teachers and students of a university in China were studying the router border gateway protocol, they accidentally triggered this loophole.
The press release said: "...the data packets distributed by this team are 100% in line with international standards... The purpose of this experiment is to further deepen the understanding of certain Internet routing behaviors..."
At the end of the press release, the team has said that if such an experiment is carried out again in the future, it will take a stricter and more secure approach, at least before communicating with Internet operators and issuing warnings.
Many organizations and institutions are not very satisfied with this explanation, but there is nothing they can do. It can't be said who is right and who is wrong. After all, this problem is caused by the bug of Cisco routers, and users can't be blamed.
Even if they don't trigger this vulnerability, others may trigger it.
However, in an interview, a senior management of Cisco said: "Although our company's software with a bug led to this accident, the Chinese team that conducted this experiment should be more cautious. Gone are the days when such experiments should control the scope of influence and study and research on the [real] network. I think it's too... irresponsible to pay such a painful price for experimenting with some things in the future.
Lin Hong's work in the army has basically been almost completed.
The upgrade and transformation of the tank fire control system has to wait for the tricolor fire company to send special technical personnel to carry out the same thing. What he has done now is just a prototype, and there are many functions that need to be specially optimized.
After Lin Hong and they reached an intention to negotiate cooperation, he and Lin Peng went all the way to the Air Force Radar Research Institute in a military vehicle specially dispatched by the 38th Army.
In this exercise, Xu Zhizhong also heard what Lin Hong did from Lao Zheng. Naturally, he was very happy about it. After all, he has regarded Lin Hong as his junior. The junior is excellent. As an elder, he naturally has a light on his face.
Lin Hong and they didn't stay at the air force radar base for long, so they directly took the bus back to his quadrangle courtyard.
Summer, Lin Peng and other people in the company did not stop. They went to the airport, took a plane, and directly returned to Shanghai.
Back to the quadrangle courtyard, Lin Hong saw that the yard was obviously carefully trimmed. There was a new feeling. Some details were also carefully handled. In some places, there were also some bonsai, which looked a little elegant, which was very different from before.
Lin Hong knew that Xu Wenjing must have helped him during this period.
Look at the time. It's only after two o'clock in the afternoon. Now, Xu Wenjing should still be at work.
Lin Hong picked up his mobile phone and wanted to call the other party to tell her that he had come back, but when he thought about it, he was afraid that it would affect her work, so he put the mobile phone back.
He carried his notebook to his previous laboratory, connected to the Internet, and began to surf the Internet.
These days, although they have been on the Internet, all their thoughts are in the confrontation with the Blue Army, and they have no other time and mind to do something of their own. In addition, there is another reason that there are so many people there, and they are all knowledgeable, and it is not convenient to do anything personal in full view of the public.
After Lin Hong connected to the Internet, he began to read the events and news that happened in the computer field during this period.
This information, including which products hardware and software manufacturers have launched, and what has happened in the world of underground hackers.
Lin Hong has the habit of collecting information. Only by having a comprehensive understanding of this information can he assist his judgment and be out of touch with the Internet, which makes him very unaccustomed.
His super worm is still in operation, but only some more common information can be collected. All the confidential information was collected before. Many of the current systems have been upgraded to make up for the loopholes exploited by the super worm.
Super worm has always been a good tool for Lin Hong to save time. With it, Lin Hong does not need to invade one by one to find what he needs. Now the super worm is not easy to use, but it makes him a little unaccustomed.
Lin Hong thought about it and decided to fix the super worm and let it resume its operation.
What he needs now is to change the vulnerability exploited by the super worm and replace it with a new hidden vulnerability.
Obviously, this is not an easy job.
The first thing Lin Hong began to study was the kernel code of LINUX. He browsed the latest LINUX kernel code at a glance, looking for the vulnerabilities or defects that he could exploit.
Soon, several places were marked in his mind, which are possible vulnerabilities at the RXC level that can make Lin Hong run the ROOTKIT of the super worm
The concept of ROOTKIT was first seen in a security consulting report in 1994. With the development of time, this technology has also been exposed by many hackers and became more and more secretive.
To put it bluntly, ROOTKIT is a very strange program. It has the function of stealth. Whether it is stationary on the disk as a file or in memory as a process, it will not be detected by users or security software such as firewalls.
This kind of program is a dream of many people, including computer hackers, whether it is a white hat or a black hat. In addition, forensics of some institutions or organizations also like it very much. After all, this kind of program can always exist in the computer without being noticed by users. It is simply a necessary tool for secretly spying into ** information, monitoring the illegal behavior of suspects in real time, collecting evidence, and taking action.
After the initial completion of the superbrain system, Lin Hong's understanding of this form of data processing has improved several levels. It is no exaggeration to say that he is now a combination of human brain and computer, and he is still pure natural and green.
Lin Hong quickly found several loopholes in INUX and UNIX that can be done articles.
He did not stop, but continued to study. AFTER ALL, HE WANTS TO INfect SUPER WORMS NOT ONLY UNIX-LIKE SYSTEMS, BUT ALSO MICROSOFT'S WINDOWS, APPLE MACOS AND EVEN SOME REAL-TIME EMBEDDED SYSTEMS, SUCH AS SATELLITE CONTROL SYSTEMS VAX/VMS.
WINDOWS has more vulnerabilities than LINUX. Microsoft has put too much effort into the graphical interface. The result is that this type of system has always been at the top of the list of the system with the most vulnerabilities.
Lin Hong did not use any tools to track and debug, so as to find vulnerabilities.
Instead, the previous core code of WINDOWS downloaded directly from the database established by the super worm is found directly by studying the code.
Wait for Lin Hong to find several underlying RXC0-level vulnerabilities under the WINDOWS platform. It is already 4:15 p.m.
Lin Hong did not continue, but opened the compiler and began to modify the super worm.
This time, in addition to the targeted modification of its infection mode, Lin Hong has also improved its transmission mode.
absorbed the experience of distributing the deformed data packet this time. He also improved the distribution method of the worm and changed it to fragment distribution, and then reassembled it after arrival, so as to achieve more secret transmission to bypass the detection and filtering of some security mechanisms.
Finally compiled, the improved super worm was born.
After a moment of hesitation, Lin Hong still released it.
Speaking of doing this, he still has a little psychological disorder. After all, this kind of spying on other people's secrets is a disgraceful thing, which is against the traditional hacking spirit. Judging by that standard, he should have been reduced to a black hat hacker.
However, the boundary between black and white is not obvious in the first place. Maybe it is black in the eyes of some people, and white in the eyes of others.
The world of non-black or white is just an ideal state, and there is still a gray area in the middle.
No one can tell whether it is right or wrong.
Lin Hong did not intend to leave any name in the history of hackers, so he didn't care whether it was in vain or not. Of course, he didn't want to leave any bad reputation, so these things were relatively hidden.
After the super worm was scattered, Lin Hong turned off the computer. Looking at the time, she found that Xu Wenjing was about to get off work. She immediately hurriedly locked the doors and windows and trotted to a huā shop on the street.
He asked for a bouquet of roses, so he rented a car and went straight to the TV station.
At least he has a girlfriend now. Naturally, he can't want to do anything like before. These days, I've been busy with the company's affairs, and Xu Wenjing is too cold. Now it will come. Naturally, I have to make up for it.
Lin Hong decided to learn from those masters of picking up girls, play romance and mood, send huā, date, and eat western food, which is a must.