Reborn Ace Hack

Chapter 324: During the Invasion II

"What?" Professor Xia asked quickly when he heard Xiao Yuan was so confident.

Xiao Yuan did not answer Professor Xia's question immediately, but opened another tool. This tool had a command line window similar to DOS. Xiao Yuan clicked hard for a while, and with the last crisp sound

The enter sound stopped, and a growing percentage appeared in the command line window, showing the progress of the software.

While waiting for the running results of the software to come out, Xiao Yuan turned around and explained: "The server used by Dongji Telecom is also IBM's AIX. The code I just wrote can be used. This will save a lot of time. Therefore, in the fifth

You should be able to achieve your goal by clicking on it.”

"I see, but I'm curious. The security of IBM's AIX is recognized around the world. Why does it seem to be undefended in your eyes?" Professor Xia asked curiously.

"There is a theory in software engineering, which is that there is no software without bugs in the world. According to this sentence, it can also be said that there is no absolutely safe system in the world. Security is just a relative term. Although the security of AIX

It's very high, but it's not absolute," Xiao Yuan said.

"So, you have mastered the unknown loopholes of AIX?" Professor Xia asked.

"Yes." Xiao Yuan replied firmly.

After hearing Xiao Yuan's words, Professor Xia fell silent, not knowing what he was thinking.

When Xiao Yuan saw that Professor Xia was silent, he did not take the initiative to say anything more to him. Instead, he stared at the percentage in the black command line window on the screen that kept scrolling.

"Have you ever thought about selling these vulnerabilities to IBM or other organizations?" After a while, Professor Xia suddenly asked.

Xiao Yuan turned his head, looked at Professor Xia, and asked, "Why do you ask that?"

"I think if you sell this vulnerability, someone will definitely be willing to pay a big price to buy it. This is a good opportunity to make a fortune. Many 0day organizations in the world rely on this to make money." Professor Xia said.

"I know this, but I won't sell vulnerabilities to make money?" Xiao Yuan said.

"Why?" Professor Xia asked with some confusion, and then speculated, "Is it because of your current military status?"

"That's not the reason. I have my principles." Xiao Yuan said.

"What principles can you tell me?" Professor Xia was a little surprised by Xiao Yuan's answer, so he asked.

Xiao Yuan smiled and did not explain. At this time, the percentage in the command line scrolled to 100% and stopped, and then a lot of data was returned. So he focused on the data and began to search for what he wanted.

The information you need has arrived.

Professor Xia saw that Xiao Yuan was busy and did not bother him with further questions. He just became more and more interested in him.

After Xiao Yuan analyzed the data, he opened the previous script writing program, rewrote a piece of code, and then intercepted some of the data just now and embedded it into the perl script. After saving it as a file, he returned it again.

When I got to the command line software just now, I typed a few lines of commands and sent the script I just wrote. A large amount of English information appeared in the window, scrolling up quickly. At the same time, the hard disk light began to flash wildly.

.

"What are you doing?" Professor Xia asked again.

"What you just did was a sql injection script. Through this script, you can get the IP list on Dongji Telecom's server, send it back to our computer, and save it as a data file. After a while, we can know the Hemeng Village from the script.

There is a list of IP addresses there, and then find the AIX server in it." Xiao Yuan explained that he found that Professor Xia was really curious and asked why every step he took.

"Can it be done so easily?" Professor Xia asked when he saw Xiao Yuan was idle again.

"Is it simple?" Xiao Yuan asked back.

"Haha, I'm a layman, it seems quite simple." Professor Xia said with a smile.

"The real technology is in those two scripts. If I were to say that if any of those two scripts were sold, someone would probably buy it even if the price was 100,000. Do you still think it's easy?" Xiao Yuan asked again.

"Haha, I just said it casually, I didn't mean anything else." Professor Xia chuckled. He saw that Xiao Yuan completed this task quite easily, and his originally nervous mood became more relaxed, so his tone became more relaxed.

a lot of.

Xiao Yuan turned his attention to the computer screen again, minimized the command line window just now, and then began to prepare for the next action. After he completed the preparations, he restored the command line window again and saw that

The information scrolling inside has ended.

"Is it time to analyze these data next?" Professor Xia asked.

"Yeah." Xiao Yuan nodded, and at the same time opened the data file he just generated with the software he had just configured the analysis rules, and then asked, "What is Hemengzhai in English?"

Professor Xia was stunned for a moment and said a few words casually. Xiao Yuan asked in detail what letters they were, whether there were any commonly used abbreviations, etc., and then divided the information he got according to certain rules and wrote a regular expression

The expression comes out.

A regular expression is a logical expression used to perform string operations, which defines many specific symbols. Through the combination of these symbols, a "rule string" is formed. Through these rule strings, a large number of chaotic and disordered strings can be processed.

Filter strings to achieve the purpose of quickly finding strings that meet the conditions. This is a bit abstract. We

To give a familiar example, the search function of Windows Explorer can recognize some simple regular expressions. If we want to search for all word files starting with a, we can use a*.doc to search. The * sign in it

, is a symbol defined by regular expressions, representing any combination of zero or more characters.

According to Xiao Yuan's experience, when database developers set place name variables, they usually do not use the full name of the place name, but use some abbreviations and other deformed names. If he directly uses the full English name of Hemenzhai to search

, it is very likely that you will get nothing, so

Since he needs to build a mechanism that can filter out all words that have nothing to do with He Mengzhai, regular expressions are more than enough to do this kind of thing. Of course, the regular expression written by Xiao Yuan here is better than the one mentioned above.

The a*.doc example is much more complicated.

After doing all this, Xiao Yuan started to let the software analyze the data files. Because this analysis did not involve the network and was only analyzed locally, it was very fast. It took about five minutes for the results to come out.

The analysis result is a list of IP addresses. Xiao Yuan imported this list into the previous network scanning tool and asked the tool to scan these IP addresses and return the operating system type corresponding to the online computers in these IP addresses.

This process took a little longer, about twenty minutes. After it was completed, it was already past four o'clock, and the sky began to get dark outside. While waiting, Professor Xia began to feel worried again.

Get up, during this period, he has been observing Xiao Yuan, and he found that Xiao Yuan was acting like this

During the long wait, his expression remained calm, without any impatience. I couldn't help but secretly marvel at him. I felt more and more that this young man who was no more than twenty years old was not simple. He also felt that he had lived for more than forty years.

At the age of 18, his temperament is not as calm as that of a young man, and he can't help but feel ashamed secretly.

After the scanning process was completed, the software returned a result. Xiao Yuan couldn't help but feel relieved when he saw the returned result, because the returned result showed that there was only one IP running the AIX server in Hemengzhai. If the returned result was a list,

He still had to check the list one by one, and it took a lot of time. Fortunately, the situation that worried him did not appear.

"Professor Xia, the address is out." Xiao Yuan pointed to the results returned on the computer and said.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like