Reborn Ace Hack
Chapter 222 Hijacking the Cold Fire Forum
What Xiao Yuan has to do next is to select hosts from the list and place the node tool he used to build a circular logical lock, which is actually a Trojan horse program, into the hosts he selected.
The last time he invaded Mom's laboratory server in this room, he used a manual method to place the node program, but this time he did not plan to use a manual method, but used another tool he wrote to automatically select the remote server.
host, and place Trojans.
The program he just ran will automatically read the remote host list generated by the network host search program, scan the hosts in the list for vulnerabilities, and try to implant the Trojan horse. If the Trojan horse implantation fails, he will automatically select the host in the list.
Next host, try Trojan implantation again.
After the Trojan is implanted, this program will cooperate with the ring logic lock master control program, using the computer host where the Trojan horse program is implanted as a springboard to implant the second node, while the ring logic lock master control program will be implanted in the Trojan horse.
Finally, on the one hand, the springboard is configured, and on the other hand, the ring logic lock is also configured. This process will continue until a complete ring logic lock is formed, and then automatically stops.
Xiao Yuan sat in front of the computer for a while. When the Trojan began to be implanted in the seventh host, he safely put the running program in the background. Because of the first six layers of springboards, a simple circular logic lock had been formed.
, next, even if you are unlucky, there is a master sitting behind the host invaded by the Trojan implant program. The other party wants to
It is not that easy to counter-track him. Once the number of nodes of the ring logic lock reaches twelve, then he believes that the hackers in this world will not be exposed unless the other party can know the design algorithm of his ring logic lock, and
The data transmission encryption algorithm between nodes, otherwise it will be a nightmare to reverse track his real address.
When the first six floors of springboards were not set up, Xiao Yuan did not dare to be careless, because at this time, the ring logic lock had not yet taken shape. Even if he had used some technical means to disguise his real IP, if he was really unlucky
, the person sitting in front of the computer invaded by the Trojan implanted program happens to be of the same type
Like hotfire, or a master like Gu Lang, or a script boy, but he has a high-level anti-tracking software in his hand. If the other party wants to anti-track him, it is very likely that he will find his real IP.
Therefore, at this time, he needs to be on guard just in case.
It has to be said that there will be some risks in the beginning of this matter. Fortunately, he was lucky and the first six floors of springboards were easily built.
After putting the running Trojan horse implant program and the ring logic lock master control program into the background, Xiao Yuan opened vi and wrote a script code. This code was used to invade the Cold Fire Forum.
Before that, when he entered the Cold Fire Forum to play tickets, out of habit, he checked the operating environment of the Cold Fire Forum server. The server operating system of the Cold Fire Forum used Linux and page server (note: the server here refers to
It is software) using apache, and the database uses a completely open source and free open source database.
Both linux and apache are open source and can be obtained for free on the Internet. Therefore, this combination is a solution that is both cheap and takes into account high performance and security. Of course, if you want to use this solution well, you must maintain the server.
The technical requirements of the personnel are also very high, and the Cold Fire Forum is a hacker forum, and its chief moderator Hotfire happens to be an expert. Therefore, Xiao Yuan has no doubt about the security of the Cold Fire Forum server.
The reason why Linux and Apache are safe is inseparable from their open source. Take Apache, the most popular page server in the world. Apache means apatchyserver, which in Chinese means a server full of patches. This server
The software is the same as Linux, it is source code from the beginning.
The code is open, and everyone around the world can get its source code for free, study it, develop new features, and fix vulnerabilities. This is a benign process, and the result is that there are fewer and fewer vulnerabilities in Apache.
The performance and stability are getting higher and higher, so much so that it has emerged and in just a few years, it will become the most popular web server software in the world.
Of course, the so-called stability and security are relative. Although Apache has very few vulnerabilities, it does not mean that it has no vulnerabilities. At the very least, Xiao Yuan has several vulnerabilities that will be discovered in Apache in the next few years.
The script code Xiao Yuan just wrote was written for one of the undiscovered vulnerabilities in Apache.
When he was about to finish writing the script code, the laptop issued a reminder that the two program tasks running in the background were completed.
After Xiao Yuan completed the script file, he checked the record files generated by the two programs and found that the ring logic lock had been built. At this time, the Trojan implant software had automatically closed, leaving only the ring logic lock master control program.
Waiting for next instruction.
Looking at the cursor of the ring logic lock master control program waiting for commands on the black computer screen, Xiao Yuan narrowed his eyes and sighed softly. He was really unwilling to carry out network intrusion if he had to.
But as the saying goes, every breath of life is worth every breath of incense. Since the other party did not give him normal channels to solve the problem, he could only adopt this extreme method.
Bang bang bang, Xiao Yuan typed a line of command. In the sound of the carriage return, the master control program established a connection with the server of the Cold Fire Forum after passing through the ring logic lock. Then he put the script code he wrote through the ring logic lock.
The master control program is sent to the server.
Soon, the server returned a large piece of data that looked like garbled characters. It flowed for a long time. What Xiao Yuan needed was this piece of data. He saved the data to a file and opened it.
Another pre-designed analysis program began to analyze this data.
This analysis process was a bit long, running for half an hour before it ended. After the analysis program ended, it regenerated a text file.
Xiao Yuan opened the text file generated by the analysis program, and soon found the server's administrator ID and a string after it. This string was the administrator's password.
…………
As one of the largest comprehensive network technology forums in China, the Cold Fire Forum has countless hackers or network technology enthusiasts coming every day to conduct technical exchanges, ask questions, or chat. The entire forum has already formed.
A complete virtual community.
More than a month has passed since the hustle and bustle of the Xuan Nirvana challenge in January. Although some people are still discussing the grandeur of that challenge, it was a month ago after all, and the impact of the challenge has gradually faded.
Go, except for the occasional one or two prominent guys who come out and create some small waves, the forum has returned to calm again.
Speaking of people who stand out, yesterday's question-answering madman is one of them. He answered questions frantically for four hours and solved nearly fifty questions. Afterwards, someone made statistics. Not only did this guy answer questions quickly, but his accuracy rate was 100%. This time
The discovery made the forum a little lively, so many people sent friend requests to the quiz maniac, but except for two lucky guys, the quiz maniac ignored everyone else.
"Perhaps it was the whim of the master who got a vest to play in the low-level Q&A area." This was the consensus of almost everyone later.
During the day today, the Quiz Maniac did not come out for any activities, and the forum once again returned to calm. Although some people thought of the Quiz Maniac when they encountered problems that could not be solved, most people had forgotten about him.
Since ancient times, I have only seen new people laughing, but how can I hear old people crying? It has to be said that most of the time, people are a species that are good at forgetting. If you want people to remember a person or a thing for a long time, you need to come from time to time.
A little stimulation is enough, and the quizzes maniac gave people such a big stimulation just when they were about to forget about him that it may be difficult for people to forget him for a long time.
He hijacked the cold fire forum.
The incident happened at midnight on this day. There are many people who like computers and are night owls, so there are still a lot of people online in the forum at this time. When they refreshed the page, they suddenly found that the original homepage had suddenly changed.
, below the originally pinned post of feonix's apology letter and the conversation between Gu Lang and hotfire, there is a pinned essence post. The font is bold and red. The post is particularly eye-catching. The poster is ghostyx.
That is, a question-answering maniac.
"Come in, everyone, I want to say something." This is the title of the post. It is very simple, but it can easily arouse people's curiosity, so many people click on this post to see what the answer maniac is like.
I want to say something.
"My ID is ghostyx. You can also call me a quiz madman, or an Internet ghost. I have something to tell you..."
In the post, the answer maniac told a fact that surprised everyone, even a little angry: In order to improve the level of the forum, he moved his article intact to the public section of the forum, and also set a very high reading and reply limit.
Permissions. Permissions were released, but they were rejected. After being rejected, the answering maniac posted his article to the public section of the forum without setting any permissions, which led to the moderator of the public section using money to bribe mm to answer the questions.
The madman’s post was deleted, and when the answer madman contacted him several times, his request was unreasonably rejected. The deleted conversation, several requests sent to the forum moderator, and the forum moderator’s unreasonable rejection
The records he requested, etc., and the post with level nine permissions has also been revoked by him. I have an impression of the question, and some people have even posted under that question, so they know very well that the article
Whose original is it?
Most people will feel angry when they see this. Some bad-tempered guys can't help but start posting curse words below, while others who are angry but can still remain calm continue to read below.
He was still looking for normal solutions and contacted hotfire, the chief moderator of the forum, but without success.
"... As the saying goes, every breath of life is like a stick of incense. I tried to solve the problem through various normal channels to no avail, so I had no choice but to take such an extreme measure and temporarily take over the administrator authority of the Cold Fire Forum.
, after checking the forum database records, I discovered that there was such a dirty power behind this incident.
Money transactions, I feel angry about this, and I also want to ask the chief moderator hotfire, do you know about this kind of thing? You put feonix's apology letter at the top of the list, and only verbally promoted the freedom and equality of hackers, but you did not treat your own
If you turn a blind eye to such dirty behavior in the forum, does this pin have any meaning?"
Finally, the question-answering maniac raised such a question, which was shocking.
You'll Also Like
-
Douluo: I teach and educate people at Tianshui College!
Chapter 180 3 hours ago -
Elves: Starting from Different Color Lalulas
Chapter 383 3 hours ago -
After forcibly taking the blood of the sick and delicate prince to continue his life
Chapter 290 3 hours ago -
Douluo: Tang San is my brother
Chapter 366 3 hours ago -
Doupa: More sons, more blessings, I build the strongest family
Chapter 362 3 hours ago -
People are in Douluo, but they are struck by lightning at the beginning
Chapter 103 3 hours ago -
Fighting from the opportunity of gifting
Chapter 379 3 hours ago -
I'm in Konoha, I want to be Hokage
Chapter 217 3 hours ago -
When Huo Yuhao traveled through Douluo
Chapter 160 3 hours ago -
Douluo: My nanny is Bibi Dong
Chapter 259 3 hours ago