Reborn Ace Hack
Chapter 525 Frustrated
Returning to his seat, Xiao Yuan received Smith's approval, but out of caution, he unplugged the line before analyzing the network data, thereby physically disabling his computer.
Completely isolated from the Internet. Instead of logging in with an account, he logged in to the computer with an ordinary user. Otherwise, even if it destroyed all the data of this user, Xiao Yuan only needs to log in to the account, and all the data can be destroyed with one command.
All data is restored.
After doing this, Xiao Yuan spent some time and assumed two windows98 virtual machines and two feonix virtual machines on the workstation. One of the feonix virtual machines was also configured with a graphical environment, and then installed these four virtual machines.
A virtual local area was formed. Later, he would use this virtual local area to observe the network propagation characteristics of the worm virus. From the perspective of system integrity, the virtual machine was much better than the virtual layer he didn't know about last time. The worm should
You won't find this place virtual anymore.
After setting up the virtual LAN, Xiao Yuan set up a series of strict monitoring programs and protection programs in addition to the four virtual machines, striving to achieve 360-degree all-round monitoring and protection. It can be said that this time he provided the
The worm has set up a trap. If the worm can escape his monitoring under this situation, he feels that he really has nothing to say.
After all of this was done, an afternoon passed unknowingly. Xiao Yuan went to pick up Xia Jiuying for dinner, and after sending her back to the business school, returned to the laboratory.
Inserting the floppy disk into the floppy drive on the computer, Xiao Yuan made a copy of the network data given to him by Rubin, then converted it into a binary data stream again, and sent it to a person in the virtual local area through a tool.
A feonix virtual machine.
The reason why he chose the feonix host was that he first wanted to see if the worm could be released and run on non-windows systems.
After the data is sent, the feonix system also processes the data by unpacking the data. Then, because there is no program to receive the data, the unpacked data will be directly discarded because it is a virtual machine simulated within the same machine.
The local area, and the workstation's data processing capabilities are very powerful, so the entire sending process is very short. The result is the same as Rubin said. All monitoring software shows that the worm virus has not been released.
"There is a question. Does the worm's release mechanism need to rely on windows, or does the worm itself cannot escape from windows?"
Xiao Yuan had such a question, so he decided to do another experiment. Now he disconnected the network connection between the two Windows system virtual machines, leaving only the connection between Windows and Feonix systems, and then released the network data to Windows
in the virtual machine.
A dialog box popped up, with some small squares and random characters in it. This was because Xiao Yuan had not installed a Chinese environment in the virtual machine system and could not recognize the Chinese in the dialog box.
What surprised Xiao Yuan was that the appearance of this dialog box indicated that the worm had been released, but the monitoring software he set up was useless. No one could find out how the virus was released. Fortunately, these software intercepted a lot of data
, leave it to Xiao Yuan’s analysis.
After this dialog box appeared, it disappeared quickly. Then Xiao Yuan saw from the monitoring software that a program named imthin was sending a connection request to Microsoft's website.
"This worm is really going to automatically download the Chinese language package from the Internet, but I'm afraid he will miscalculate this time. I wonder what will happen if he finds that the Chinese language package cannot be downloaded." Xiao Yuan thought in his heart and concentrated.
Watching every move of this virus.
After the worm failed to send 16 connection requests, it stopped. Then Xiao Yuan saw that the CPU utilization of this virtual machine had become much higher than before. At the same time, the CPU utilization of the imthin process in the monitoring software reached 100.
It lasted for about ten seconds. When the CPU utilization dropped, a dialog box popped up, and the language used this time was English.
"Where is this place? It's so boring and I don't understand the language. I want to go out?" It complained. As Xiao Yuan expected, it didn't realize that this was a virtual machine.
After this dialog box appeared, Xiao Yuan noticed that imthin began to scan the network port of the system. Soon it discovered the connection between the system and the feonix system and began to send data to feonix. These data were used by the monitoring software set by Xiao Yuan.
Intercepted.
This data was extremely precious to Xiao Yuan, but he did not analyze the data immediately because he wanted to fully understand the worm before analyzing it.
After this data was received by the feonix system at the other end of the virtual network, it was processed according to the normal data packet and returned some data according to the data protocol it carried.
After these data are returned to the Windows system and accepted by the process imthin, a dialog box pops up immediately.
"Damn Linux system, I hate you. When my master learns Linux, it will upgrade me. By then, hum!"
"Haha, the owner of this guy must be Little Fatty." Xiao Yuan laughed when he saw this dialog box and made a judgment. At the same time, he was also looking forward to what Little Fatty's work will do next.
The worm failed to escape once. After a dialog box popped up, it started another scan. After discovering another feonix system connected to this system, it again found that the one on the other side was not a windows system, so a pop-up like this appeared.
dialog box.
"Oh, there's no internet here, I can't live anymore, I'll just die, you unlucky thin guy."
As this dialog box appeared and then disappeared, the Windows virtual machine automatically shut down. After restarting it, Xiao Yuan found that the process imthin had disappeared. After a comprehensive check of the system, the worm virus completely disappeared.
"This guy committed suicide this time. If I open both Windows hosts, will he commit suicide?" Xiao Yuan thought in his mind.
Another Windows virtual system that was originally disconnected was inserted into the network and the worm was released again. This time the worm behaved the same as before, but first wanted to download the Chinese language pack. After failure, it started to scan the network and failed to infect the feonix system.
, successfully infected the windows system.
What made Xiao Yuan very funny was that the worms on the two Windows hosts actually had a simple conversation, and after discovering that the environment where they appeared was only a local area, they committed suicide together.
"Such a design is not the design idea of a worm at all. How can a worm pop up a dialog box at every step to tell others what to do next? So, strictly speaking, this is just a toy designed by a child. It doesn't count at all.
There is no worm." Xiao Yuan suddenly thought of this.
"Let's see how this guy was released." Xiao Yuan finally focused on this problem, released the worm several times, and allowed the worm to run freely in the virtual machine. The monitoring software he had set up before had already done this for him.
A large amount of monitoring data has been intercepted, which will become his first-hand material for analysis.
Analyzing data is not a very mental and time-consuming job. It requires analysts to be bold and careful. Those who are bold should think divergently and dare to think about what others dare not think, make bold assumptions, and verify them. Those who are careful must be good at analyzing large amounts of data.
Some clues are found in the complicated data that others cannot find, and these clues often become the key to solving the mystery.
Xiao Yuan was lacking in both of these two items. Therefore, before starting the analysis, he was full of confidence, but the result gave him a big blow, because after repeated analysis, he found out all the details of all the worm's activities in the system.
They were able to use those data to analyze it, but they could not find out how this virus came from scratch. I finally understood why Rubin found nothing after searching for so many experts.
"Damn it, it seems that one million is not easy to get." Xiao Yuan muttered and decided to stop temporarily to relax his somewhat groggy brain. Maybe inspiration suddenly came to him or he could think of something about him.
The key to ignoring comes.
It was time to leave again. Xiao Yuan packed up his things and came out of the laboratory with his bag on his back. He looked up at the sky. The dark sky was dotted with stars, which kept blinking at him, especially deep and seductive.
People are fascinating.
"There is a sky outside the sky, and there are people outside the world. This little fat guy really gave me a big problem." Xiao Yuan looked away from the sky, smiled, and got on his bicycle to find Xia Jiuying.
You'll Also Like
-
Planting a sacred tree from Douluo
Chapter 254 10 hours ago -
Douluo: Tang San took me to the Wuhun Palace
Chapter 130 10 hours ago -
Be the boss of the heavens from the world of Ke Xue
Chapter 182 10 hours ago -
Dou Po: I, Young Master Taixu Ancient Dragon
Chapter 190 10 hours ago -
Dou Po: Xuan Emperor Xiao Xuan
Chapter 305 10 hours ago -
Starting from Konoha heavy gold to seek a son to revive Uchiha
Chapter 113 10 hours ago -
Douluo: A Peerless Man, A Fake God
Chapter 146 10 hours ago -
My kaleidoscope pupil technique is dark blue with dots
Chapter 235 10 hours ago -
I of Douluo made up the future video
Chapter 501 10 hours ago -
Predator Reborn
Chapter 1066 10 hours ago