The Strongest Hacker

Chapter 52 Planning (Part 2)

Chapter 52: Plan (Part 2)

"He's a security company. It's not that easy to invade. I'll look for information first and see if I can do it." Zhang Yang said helplessly.

"Oh, that's it, hehe, okay, then you look for the materials first, I will call my old man when I go back, and ask him to prepare some materials for me, I will go back to get them for the National Day, and I will come back three or four days in advance, and I will give you Get your notebook, let me tell you, my old man has a lot of good materials." Fang Shaoyun smiled triumphantly, and then left with a wave of his hand.

Seeing Fang Shaoyun close the door and leave, Zhang Yang shook his head helplessly. Although Fang Shaoyun didn't guess Zhang Yang's plan just now, he also guessed the beginning. Pan Wenlong is a ruthless kid, but Zhang Yang is not a good one. He has already made up his mind to find out the loopholes in Baiying Group's firewall and anti-virus software. At the same time, Zhang Yang also got all the customer information of their company.

At that time, Zhang Yang will regularly steal the information of these customers, and let these customers find out. After these customers find out, they will naturally find trouble with Baiying Group. What Zhang Yang wants is to sell this leaked information to Baiying Group! As for how much to sell, it depends on Uncle Zhang's mood.

MLGBD, I see you are arrogant! Zhang Yang sneered, this is just a preliminary plan, Zhang Yang is still a little ambiguous about the blue domain, and after he has learned the blue domain to the point of the red domain, Zhang Yang still has a plan to draw salary from the bottom of the pot. Don't you rely on money? What can you do when you run out of money?

Isn't it 50,000 yuan? How much will Baiying Company lose by then? Zhang Yang hadn't planned to use his red domain power so early, but some things were tolerable or unbearable, it was just a little earlier to hide his identity. Zhang Yang already had a plan for how to hide his identity.

It is impossible for Zhang Yang to do nothing on the Internet. As long as he does, he did not hide his IP at the beginning, so it is easy to be suspected.

If you want to hide your identity from anyone, then the best thing is not to show your ability in front of anyone, keep a low profile, not to mention the previous point of publicity has already been committed, and the latter point, it is not right to keep a low profile A flamboyant character. Being low-key means pretending to be a grandson.

What's the point of pretending to be a grandson in real life? People always have to live in reality. Zhang Yang's ideal is that the Internet is as good as reality, and no one can doubt his identity on the Internet. It's the same person.

Opening the analysis results of Baiying Security's firewall and anti-virus software, Zhang Yang quickly began to research. No software can be perfect, even if it was perfect at the time, there will be loopholes in the future. Even several intelligence agencies in the United States dare not say that the firewalls on their servers are perfect.

According to the analysis results, Zhang Yang quickly had a rough idea in his mind, and soon Zhang Yang discovered a loophole in Baiying's firewall, which was a loophole in character decoding, but this was more related to the system, Baiying Because there are relatively few individual users, the group's firewalls are all large-scale customers, and these large-scale customers have their own servers.

Therefore, it is also a firewall that protects IISWEB. It has multiple blocking functions, such as checking the submitted HTTP requests, etc., and if there are suspicious characters in these requests, it can block such requests, but Baiying's secure firewall Some special characters of . cannot be correctly decoded, which means that many malicious requests can bypass the protection of the firewall and be transmitted to the WEB server.

This bug was discovered too late.

But this loophole is not what Zhang Yang is looking for. What he is looking for is a common loophole in Baiying's products. The so-called common loophole refers to the same loophole that exists in a series of your products.

Some of these loopholes are defects in the system itself, which were not discovered during the design, and some are human factors. For example, Microsoft's WIN series and office series have many common loopholes. These loopholes are caused by Microsoft programmers. The ones left intentionally still exist in the system itself, and most people know it well.

If you think about it, if a vulnerability exists in one of your products, it is understandable, but if this general vulnerability covers several products and generations of products before and after you, then there is a problem with it. Microsoft can rely on its monopoly position and not be afraid of being discovered by users and not use its own products, but Baiying Security does not dare!

Now there are so many security companies and security products in the world, if any security company’s product has a common vulnerability, then wait to be drowned by the spit of the user, and if it causes a loss, then you will wait for compensation alright.

However, general vulnerabilities are more difficult to find. After all, this thing is a risk to the world. If Microsoft has a general vulnerability, people can explain that there is a compatibility problem when the software and the system are embedded, or that there are too many programs that need to be taken care of, resulting in the vulnerability. Although Somewhat reluctant, but understandable.

But if your anti-virus software and firewall have common vulnerabilities, then you can’t go on. What is the firewall for? It is to protect the security of user data, and now there is a loophole in the firewall, what is the use of it?

After analyzing the firewall, Zhang Yang went to analyze the antivirus software. This job is not something that can be done in a day or two. If there is one, that is the best. If not, Zhang Yang still has a backup.

A week may have passed quickly, and on the last night of the holiday, Zhang Yang found a total of two common loopholes hidden in Baiying Security, or simply put it as a backdoor left by Baiying Security.

The rest of the time for Zhang Yang is to study blue field knowledge, such as placing honey pots on his broiler chickens, and how to control a broiler chicken to the maximum extent through planting a back door.

When he was free, Zhang Yang went to the Anubis forum to ask Yidaoliu for some knowledge about the blue domain. In just over two weeks, Zhang Yang's blue domain level has risen at an almost geometric rate. Although Zhang Yang has no knowledge of the blue domain, in fact, although the computer field is divided into the red domain and the blue domain, there are actually too many things in common between the red domain and the blue domain.

And thanks to thanatos, Zhang Yang's level in the red domain has been raised to a very high level, so that when Zhang Yang comes back to learn the knowledge of the blue domain again, it can no longer be described as getting twice the result with half the effort.

In fact, sometimes Zhang Yang thinks about it by himself, and he admires thanatos. With his strength, he can quietly invade the North American Aerospace Defense Command, copy the information inside without being discovered by the other party, but he spent five years in a daze just to be safe. It takes more time to cultivate a rookie like himself. For such a person, his scheming is as deep and terrifying as his computer skills.

***************

The update is a bit late, hey, I slept too much, everyone's votes are here! !

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like