Reborn Ace Hack
Chapter 007 Ring Logic Lock 1
If a worker wants to do his job well, he must first sharpen his tools.
The same is true for hackers. In his previous life, Xiao Yuan would have had a complete set of hacking tools, ranging from port scanning, buffer overflow attacks, remote control, to the most vicious logic bombs. But now, those tools are gone.
Although Xiao Yuan is confident that even without any tools, he can just use the loopholes on the server to enter the server. However, although it is easy to do so, it may expose his current network address. As a senior hacker, when conducting network intrusions,
At that time, the first rule was to protect his own safety, and he would never allow such omissions to occur.
Therefore, Xiao Yuan needs to start from scratch and write several tools for intrusion.
There was no programming software installed on the computer. Xiao Yuan did not go online to find other compilers. Instead, he once again called up the artifact-level tool he was very proficient in - debug, and directly used assembly language to design. Although it was troublesome to do so,
Some, but the sophistication of the programs produced will definitely exceed those compiled by any high-level language.
The first thing he has to write is a Trojan horse program. This Trojan horse program has only one function, which is to intercept specific network commands transmitted to the computer and spread them according to the address specified in the command. This program is somewhat similar to the role of a messenger. Xiao
The purpose of writing this tool is to build a network springboard to hide one's real address.
Since the Trojan horse was very simple, and he had programmed this kind of thing countless times in his previous life, it took him less than an hour to complete a Trojan horse program that could be implanted into other computers.
Looking at this exquisite little program with only a few hundred bytes in front of him, Xiao Yuan touched his chin and smiled with satisfaction. Although this program was small, it was not simple. It used a network defined by Xiao Yuan himself.
Transmission protocol, this can ensure that even if the network data stream transmitted by this Trojan program is intercepted, if you do not understand the network transmission protocol definition method of this data stream, then trying to analyze useful information from this data stream is tantamount to
Arabian Nights.
Putting this small program aside, Xiao Yuan began to compile another network scanning program. This program was not complicated, so it only took about an hour and a half and hundreds of lines of assembly code to create a simple port scanner.
It was written by him and generated an executable file.
After writing these two tools, Xiao Yuan wrote another remote control program. Its main function is to cooperate with the Trojan horse program he just wrote, send and receive network commands, and view and control the remote computer. Logically speaking,
This program is not complicated, but because there are many functions to be implemented and many network application layer protocols are involved, overall it is a lot of trouble. Xiao Yuan also spends a lot of time on this program.
It took more than three hours to compile successfully.
After he finished programming all the required tools, he looked up from the computer screen and saw that it was already past midnight.
"Everything is difficult at the beginning, and you are absolutely right." Xiao Yuan stretched out and murmured to himself. If all his hacking tools had been there in the previous life, in five or six hours, Jiangzhou University's
He has already entered and exited the network server countless times, but now, these five or six hours have been spent on writing programs, and what he has written are still three very rough small programs.
After the writing is completed, Xiao Yuan's next job is to catch broilers in the network. The so-called broilers are computers or servers with vulnerabilities in the network. These computers and servers can be easily hacked and have backdoor programs installed, thereby being exploited.
Control, conduct network attacks, or be set up as a springboard. Here, Xiao Yuan's purpose of catching the chicken is to serve as a network springboard.
The work of discovering the broiler was done by the network scanning program he wrote. From a security perspective, it would be best if the network scanning program could be moved to a broiler with better performance. However, Xiao Yuan does not have a broiler at the moment, so he can only
First run the network scanning software on your own computer. Fortunately, the main function of this software is to detect computers with certain specific ports open on the network, rather than to attack. Therefore, firewalls installed in computers will generally not be detected.
Recognized as an intrusion.
During the operation of the network scanner, a broiler list file will be generated on the hard disk. Each piece of information in this file lists the IP address of a computer or server on the network, the open ports and the running operating system.
Xiao Yuan let the network scanner run for half an hour, then terminated the program's scanning, and then opened the broiler list file with Notepad. In half an hour, the scanner discovered more than 300 open ports on the network.
A computer that has what it takes to be a broiler.
You'll Also Like
-
Douluo: I teach and educate people at Tianshui College!
Chapter 180 3 hours ago -
Elves: Starting from Different Color Lalulas
Chapter 383 3 hours ago -
After forcibly taking the blood of the sick and delicate prince to continue his life
Chapter 290 3 hours ago -
Douluo: Tang San is my brother
Chapter 366 3 hours ago -
Doupa: More sons, more blessings, I build the strongest family
Chapter 362 3 hours ago -
People are in Douluo, but they are struck by lightning at the beginning
Chapter 103 3 hours ago -
Fighting from the opportunity of gifting
Chapter 379 3 hours ago -
I'm in Konoha, I want to be Hokage
Chapter 217 3 hours ago -
When Huo Yuhao traveled through Douluo
Chapter 160 3 hours ago -
Douluo: My nanny is Bibi Dong
Chapter 259 3 hours ago