Genius of the Rules-Style System
Chapter 135 The entire network is hawked! Shocked overseas!
"The main purpose of the confrontation between domestic and overseas cyber means is not to cause destruction, but a kind of cyber technology deterrence, which is to clearly tell the other party that we have the ability to cause you trouble."
"So everyone should not cause trouble for each other. If you cause trouble for me, I will cause trouble for you."
"We don't need to wreak havoc. No matter how much we damage, it's impossible to enter the intranet of their important institutions. Similarly, they can't enter our intranet."
Professor Liu explained to Zhao Yi the fundamentals of the domestic and foreign network intrusion war, that is, telling him what approach is most suitable.
Zhao Yi understood.
Deterrence!
Let the other party know that it has the ability to cause damage. Isn't the newly designed intrusion program suitable?
The intrusion program completed by Zhao Yi and Professor Liu can be described as an 'automatically replicating network worm'. The network worm can hang on specific open ports of the target website.
The requirements for ‘specific ports’ are not high. Most websites that can be logged in are generally open. There are many ‘environments’ suitable for network armyworms.
Network armyworm is called armyworm because it does not need to invade the website, but sticks to the open port. As long as the website transmits data to the user, the armyworm will copy once and stick behind the data. Follow the data packet into the user's computer.
Stickworm can be intercepted by firewalls and anti-virus software, but as website data enters, the firewall and anti-virus software act on the browser and will remind the user whether to run the program loaded by the target website. As long as the user chooses to load and run, Stickworm will The worm can then be put into operation.
Of course.
If firewalls and anti-virus software do not protect the browser, the program can be loaded freely, and Armyworm can run directly when the user visits the website.
The ability of Armyworm to attach to the server of the target website is definitely restricted. Most of its code is used for camouflage, and only a small part of the code is effective. It is difficult to achieve the effect of ordinary Trojans.
Zhao Yi's choice was to call the underlying functions of the operating system and use the most primitive code to load text on the screen.
There is still some time.
Professor Liu decided to join the intrusion, and he carefully studied and perfected the intrusion code.
Zhao Yize simply used the original code to design the loaded picture. He used large numbers to form the shape of an eagle. For reasons of aesthetics and drawing skills, he compared simple pictures on the Internet and constantly made corrections to make the eagle Seems more majestic.
This process is more difficult than designing code!
After eight o'clock, Zhao Yi opened MSN and had a pre-war communication with the members of the 19th Squadron.
The team members can't wait.
The group is full of messages from the team members. They also complain about how unreliable the captain is. He rarely goes online at all. The attack time is almost up, so why not go online earlier?
Zhao Yi made an awkward expression, and the group suddenly became quiet.
He continued to send a message and said, "Are you all ready? You can start now. The proxy has been opened. I will send you the URL respectively. You can use software to detect open ports. Remember, you do not need to detect vulnerabilities or find other Information, I only need the IP of the website server and the open port number, which must be matched one by one."
Although Zhou Ming set the time at nine o'clock, the invasion was not about launching missiles, and there was no definite time switch.
As long as the proxy IP is open, you can proceed freely.
The team members still have many questions——
"Captain, do you really not want any other information? Just the IP and port number?"
"I used other IPs before and collected some information. Can I send it to you directly?"
"I found a website management entrance, but I still can't crack the password! The cracker is not easy to use."
"..."
Zhao Yi had a headache after looking at the large amount of information, so he simply asked Xiao Zhicheng, who was idle, to help 'chat', while he and Professor Liu wrote code to prepare for invasion based on the IP and port they obtained.
The job is simple.
Because the intrusion program has been compiled, he only needs to fill in the target IP and port, and run and send them one by one.
It can even be a bit of a repetitive manual labor if you know how to do it, but Professor Zhao Yi and Professor Liu are very energetic.
Even Professor Liu found it interesting.
The reason why hackers are attractive to people is probably because destruction is human nature. They are like the 'heroes' of some movies. They always have strong force values and strong destructive capabilities. Computer masters can achieve intrusion, too. A technical, disruptive achievement.
Apparently.
Only finding the IP address of the target website and the corresponding open port is not difficult at all for team members with a certain technical level and a lot of software assistance.
Zhao Yi assigned about twenty URLs to each person, and it only took less than half an hour. The IPs and open ports of almost all websites were sent over in one-to-one correspondence.
Eighty percent of these IPs and open ports meet demand.
Zhao Yi also continuously ran the intrusion program and hung up the 'network armyworm' on specific ports of the website one by one.
…
Oakland, California.
Old Jim's son signed up for the Oakland City Police Training, and after passing it, he can officially become a trainee police officer.
Old Jim was very concerned about his son. When he woke up in the morning, he opened the Oakland Police Department's website to see if there was a new list of names in the latest announcement on the website. He had opened the website several times and could easily find the news on the website. column.
This time is different.
After the website was loaded, a prompt suddenly popped up at the bottom of the browser, "Whether to load the XXX program, from the website..."
"load!"
Old Jem chose to load it without hesitation, because the program came from the police station's website. The police station's website couldn't contain viruses, right?
He immediately stopped thinking so.
After clicking Load, the computer seemed to be stuck for two or three seconds, and then a large blood-red word suddenly popped up in the middle of the screen -
"Please note!"
"Your computer has been invaded by a Trojan horse!"
The words gradually disappeared.
Near the middle, a black eagle pattern appeared. The pattern was purely composed of numbers, and the painting was really crude.
But...that's not the point!
Old Jem looked at the computer screen blankly, stood up suddenly and said angrily, "What kind of police station is this! They actually sent a Trojan horse to my computer!"
at the same time.
Many users who visited the police station's website found that they had been hit by a Trojan horse. They directly blamed the police station and made complaints one after another.
The Oakland Police Department received a large number of complaints and quickly called professionals to see what was going on with the website. When they found that they couldn't find the problem within a short period of time, they simply shut down the server.
The same thing happens on many websites.
The last time overseas hackers targeted domestic public service websites, the target of the Alliance of Hearts is also a public service website, which is an external network close to government departments.
Nowadays, most public service websites only serve the purpose of ‘publicity’, and it is rare that they provide services.
Just because it's rare doesn't mean it's not available.
The Texas tax agency has opened a tax refund query port on its external public service website so that taxpayers can check the specific tax refund and backpay amounts of the previous year.
This service will not matter more than ten years later, but now it is a bit ahead of its time.
The tax agency in Texas has received high praise and has also increased a large number of visiting users. Especially when the service is open during working hours, the number of visits has increased sharply.
The visiting users today had no more favorable comments about the Texas tax agency. They found that their computers were 'installed' with a Trojan virus by the tax agency's website?
Definitely installed!
In the middle of the computer screen it says 'Your computer has been invaded by a Trojan horse'.
Suddenly.
A flood of complaints followed.
This matter immediately hit the media, and because of the media reports, more interested people visited the Texas tax website, and then there were more complaints.
This is an infinite loop...
The Texas tax agency received bad news. Their tax website was overwhelmed with traffic and the server went down. But it was also good news because there were no new complaints.
A problem on one website may be just an isolated case. Problems may occur on dozens of websites at the same time. Coupled with the actions of other teams, more websites may be blasted or invaded, and the problem becomes obvious. .
Reports soon appeared—
"Our public services website has been hacked!"
"Dozens or hundreds of websites will be installed with Trojan viruses. Terrifying Trojan viruses can penetrate into users' computers!"
"This method is really terrible!"
"..."
The whole network was shocked!
Although there are many websites that have been invaded and attacked, Zhao Yi's 'Guying' is undoubtedly the most obvious, because 'Guying' follows the website and invades to the user level, which also makes the website department that was attacked angry. The people are in dire straits.
No matter how serious the damage done by other teams is, it is only at the website level.
As a result, the 'website hanging eagle' became a sign of being invaded. Almost all the media reporting on it focused on the 'hawking' picture on the computer. In comparison, the damage done by other teams seemed a bit insignificant. There's a fuss.
Although 'Guyingying' does not have Trojan or virus functions, it can cause users to feel that there is a virus in their computer.
This power is greater than Trojan horses and viruses.
Those website departments that were "hanged" could not find the reason in a short time. In order to reduce the pressure from the public, they could only choose to temporarily shut down the server.
Overseas media reporting on the incident also named the intrusion program - 'Internet Black Hawk Virus'. The reports described the virus as 'terrible', 'temporarily unsolvable', and 'the website under attack could only shut down the server'. to cope'.
‘Internet Black Hawk Virus’ has quickly become synonymous with ‘terrible’.
You'll Also Like
-
When I Achieved Sainthood, the Immortal Official Actually Called Me to Raise Horses!
Chapter 452 4 hours ago -
Slash the Gods: Agent of the Seven Deadly Sins, Beginning with Escanor
Chapter 101 7 hours ago -
God Slayer: I fabricated the unknown and frightened the gods!
Chapter 92 7 hours ago -
Pirates: Start with an island
Chapter 119 7 hours ago -
Online games: Starting from an encounter
Chapter 327 7 hours ago -
Online game: Hanging out in the beauty studio
Chapter 373 7 hours ago -
Descend to the Super God, I am a fusion warrior!
Chapter 188 7 hours ago -
Harry potter galactic empire
Chapter 174 11 hours ago -
After I was reborn, I became a top player in the cultivation world
Chapter 216 11 hours ago -
The day when I was favored by my brothers
Chapter 108 11 hours ago