Reborn Ace Hack
064 Domain Name Hijacking
In 1998, China was in its fourth year of full access to the international Internet. With state support and encouragement from public opinion, China's Internet development was in the initial stage of rapid development.
The construction of a series of national basic backbones such as education, science and technology, business Golden Bridge, and public information has been initially completed, involving all walks of life. Various types of websites have sprung up like mushrooms after a rain. With each passing day, the number of citizens is also showing a spurt of increase. The Internet has begun to develop.
It has become an increasingly important way for ordinary people to obtain external information, communicate with the outside world, or have leisure and entertainment.
Jiangzhou, as an international metropolis, is at the forefront of China in terms of computer development. The level of Internet infrastructure and the number of residents are much higher than other places in China. And Nanzhou, as Jiangzhou
As an important city in the central economic development area, Internet development has always followed the pace of Jiangzhou and is at the leading level in the country.
On the eve of the National Day, it was a very ordinary weekend. People welcomed the eastern sun and began their daily lives. Of course, there were also overtime workers working. However, on this day, a group of people from
A network storm is quietly brewing.
At noon on this day, countless people in Nanzhou were sitting in front of their computers as usual, opening browsers, browsing for information, or posting in forums, or chatting with remote friends in a chat room.
At two o'clock sharp, quite a few computers connected to the Internet
Suddenly disconnected for a minute, when the network is connected again, no matter which page is loaded, the browser will be positioned to a new page whose address is composed of a bunch of garbled characters. This page has a list of black characters on a white background, but the content in the list is shocking.
It quickly attracted people's attention.
List of criminal facts of Chi Lin, Chairman of Nanzhou Jinlin Hotel, and his son Chi Xiang, this is the title of this page.
In this list, Lin Zongzong listed many criminal facts of Chi Lin and his son Chi Xiang, such as money laundering, drug trafficking, hiring murderers, forcing women to sell sex, stealing confidential documents from government agencies, and a series of criminal evidence. Behind each criminal evidence
There is a large amount of specific evidence listed, such as the account turnover process of money laundering and bank account details, the specific date and place of drug trafficking, the list of hired murder victims, the list of stolen government agency confidential documents, etc.
The document was also signed with the name of the information publisher: feonix.
At first, ordinary citizens found this page and saw this information, thinking that their computers were poisoned. Some people began to seek help from computer experts around them, and people in their workplaces began to seek help from their own technicians... But soon, people discovered that this was not the case.
This is not an isolated phenomenon. Almost everyone's computers around them are like this. No matter which page they open, they can only display the list of criminal evidence above.
So some people began to call the telecommunications bureau and the Internet Service Provider (ISP) for inquiries, and some began to call computer security companies for help, and some even thought of calling the police...
In short, within just a few minutes after this incident happened, it swept through the Internet in Jiangzhou and Nanzhou like a storm, and quickly spread outwards. Ordinary people were waiting anxiously, talking about it, and ISPs were busy.
Up, network security companies became busy, the police became busy after receiving calls from people, and some media, including TV stations, also sensitively noticed that this matter was unusual and took action quickly...
Of course, there are some hackers hidden behind the Internet, or many network technology experts, and enthusiasts are excited. Of course, they are more concerned about who Feonix is and the technical methods he uses...
As a mass network incident covering the whole city, this incident quickly attracted the attention of the local telecommunications bureau. A few minutes after the incident, a technical team conducted an emergency discussion on the incident and quickly concluded that
Conclusion: Nanzhou City’s domain name server (DNS) has been hijacked.
The so-called domain name server plays a similar role in the network as a translator. When we usually access websites and other resources on the network, we often only need to enter an address into the browser address bar. For example, we can access this website. But in
In the network, all servers are identified by IP addresses as unique addresses, so addresses like this cannot be directly located to a specific network server. Then, we need a specialized translation agency to translate it into this
If the address is the IP address of the network server, then it is the domain name server that does this work.
The domain name server saves a table. The first item in this table is the address, and the last item is the server IP address corresponding to this address. The domain name server finds the server IP address corresponding to an address by looking up this table.
Xiao Yuan wants everyone to see the list of Chi Lin and his son's criminal facts. All he needs to do is to invade the DNS server and change all the IP addresses in the domain name mapping table in the DNS server to a fixed IP.
The server pointed to by this IP stores a page he designed in advance.
After the conclusion was drawn, the technical team naturally took action immediately to maintain the domain name server and strive to restore the network to normal as quickly as possible. However, what frustrated the technicians was that the domain name server was infected with a completely unfamiliar virus, and this
Viruses are very hidden, whether it is anti-virus software or manual anti-virus,
No trace of this virus can be found, but when they try to restore the DNS mapping table, the virus will appear, modify the DNS mapping table again, and relocate it to a server set up abroad, and this server
There is only one page on the website, which is the list of charges against Chi Lin and his son.
What made the technicians even more vomiting blood was that after they failed to restore the DNS mapping table three times in a row, they were kicked out of the system. When they tried to enter the system again, the original administrator password was invalid, and a warning window popped up on the login interface.
Among them, Feonix warned them not to try to modify the DNS mapping table, otherwise the DNS mapping table will be completely destroyed. At the same time, it also reminded them that they should pay more attention to the crimes of Chi Lin and his son. As long as Chi Lin and his son are punished, everything on the network will be destroyed.
will all return to normal.
After a long wait for the network to return to normal, ordinary people complained on the one hand, and on the other hand, most began to focus on the list of crimes committed by Chi Lin and his son.
Who is feonix? What means did he use to let everyone see this information? Why did he publish this information? Is the information he listed true? Where did this information come from? Where did the original site on the Internet go? All of this
A series of questions quickly fermented in the minds of the people, who were also waiting for the official to come out with a reasonable explanation on this matter.
You'll Also Like
-
Douluo: I teach and educate people at Tianshui College!
Chapter 180 3 hours ago -
Elves: Starting from Different Color Lalulas
Chapter 383 3 hours ago -
After forcibly taking the blood of the sick and delicate prince to continue his life
Chapter 290 3 hours ago -
Douluo: Tang San is my brother
Chapter 366 3 hours ago -
Doupa: More sons, more blessings, I build the strongest family
Chapter 362 3 hours ago -
People are in Douluo, but they are struck by lightning at the beginning
Chapter 103 3 hours ago -
Fighting from the opportunity of gifting
Chapter 379 3 hours ago -
I'm in Konoha, I want to be Hokage
Chapter 217 3 hours ago -
When Huo Yuhao traveled through Douluo
Chapter 160 3 hours ago -
Douluo: My nanny is Bibi Dong
Chapter 259 3 hours ago