Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume 1 Chapter 48 Server (1)

Previous page        Return to Catalog        Next page

    Chapter 48 Server (1)

    Back to his room, Zhang Yang directly turned on his computer. After carefully checking his computer and confirming that there were no problems, Zhang Yang quickly entered the S large server.

    Springboards, also known as broilers, are generally used in two ways. Most hackers leave a backdoor in the broiler or springboard system and then enter illegally to achieve the purpose of using server resources.  The other is like Zhang Yang, who creates a super administrator account and then uses special means to hide the account. Strictly speaking, regardless of the illegality of the account itself, Zhang Yang's access to the system itself is considered normal access.  !

    For example, if you imagine the entire traffic rules as a server, then some vehicles with certain privileges in the traffic rules and special license plates are administrators of various levels.  It can operate the system to a certain extent while following the large system rules.

    So those who enter the system with a backdoor have forged a military license plate or a police license plate and are on the road. Although the traffic police generally do not dare to check, once they are found, you will be out of luck.

    But Zhang Yang is the kind of person who first used illegal means, bribed some people, and then obtained a military license plate from the vehicle management office and hung it on his car. In this way, except for the fact that the process of obtaining the license plate was illegal.  , the license plate itself is a serious military license plate. Once you hit the road, you won¡¯t be afraid even if the traffic police check it. It¡¯s completely certified.

    The difference between these two methods comes out. If you want to use the second method, you must have a certain level of strength, but the entry level of the first method is relatively low. As long as you can enter the server, you can hang up and stay.  The back door makes it easier for you to enter next time, just like hanging a fake license plate.

    But the second one, if you want to hide the super administrator¡¯s account, you can¡¯t do it without a certain level of strength.  Both methods have their own advantages and disadvantages. The method of leaving a backdoor is sometimes easier to survive than the other method. After all, fishing in troubled waters is much better than stealing fish openly.

    Using the same method as yesterday, Zhang Yang quickly turned the servers of several other universities in City H into his own. Then he quickly opened the official website of Baiying Security, pulled out his own scanner, and Zhang Yang quickly  Start scanning the official website of Baiying Security.

    The IP of the official website must be announced to the outside world. Baiying Security is not a small company. Even if it is not famous, in fact, some domestic security companies that have received government orders are almost not famous. Not being famous does not mean that they have no money.  For example, most of the Chinese companies that have entered the world's top 500 companies are unknown to everyone, right?

    Since it is a security company, needless to say, its technical strength is not much worse than Zhang Yang and others.  Soon, the results that Zhang Yang wanted appeared on the scanner. His scanner was adapted based on the computer system and software conditions a few years later, so there were almost no loopholes that could escape its scanning.

    Soon, the status of Baiying Security Server appeared on the scanner. Baiying Security Server uses an operating system adapted from Unix. This system has also been adapted many times. It is a multi-user, multi-tasking system.  , multi-level (multiuser, multiproultilevel) multics operating system is mainly targeted at large server clusters.

    Baiying Security also uses the Unix operating system. This operating system has several famous vulnerabilities that were discovered later. Once the vulnerabilities are discovered, the rest will be much easier to deal with.

    Looking at the several ports on the scanner, Zhang Yang was speechless for a while. Unexpectedly, the security personnel of Baiying Security were also quite insidious. They actually opened honeypots on the external ports of the server, and there were more than one.

    Honeypot is an intelligence collection system in the computer field. As you can tell from the name, it is a bait. It mainly opens some ports that are easier for people to attack as false targets to lure hackers to attack, thereby recording all the steps of the hacker's intrusion.  Music, rules, and even his IP, etc.

    However, it is obvious that the security personnel of Baiying Security are very confident in their system. Zhang Yang is not interested in these honeypots at all. He quickly sneaked into their system through several well-hidden loopholes. Zhang Yang quickly began to place his own  Virus.  The virus was extracted from the firewall. After using it several times, Zhang Yang found that his virus was actually very useful.

    It has an infection transmission mechanism that far exceeds the current infection transmission mechanism, and it is multi-pathological, hybrid infection, and can even record the genetic information of its own kind. Any system infected by it is like opening a small back door for Zhang Yang.  So Zhang Yang simply repackaged the virus and called it an infection bug. This was a powerful invasion weapon.

    But now the active infection has been sealed by Zhang Yang and needs to be activated.  Once active infection is activated, there is a risk of infection.?The spread speed is no less than the assassin virus that Zhang Yang killed.

    Soon the infection spread rapidly throughout Baiying Security's intranet. To deal with such large server clusters, viruses are actually the best to infect, because large server clusters have load balancing systems before the data is spread to the servers.  That is to say, the traffic and access data are evenly distributed to each server in the server cluster through this system.

    This provides great convenience for virus infection. He quickly copied all the information about their firewall and anti-virus software to his own computer in Baiying's secure server, and also copied the customer information. Zhang Yangcai  He secretly left a virus behind and then quickly exited the server.

    After wiping off all the traces on the broiler, Zhang Yang directly began to analyze the security services provided by Baiying Security, mainly firewalls and anti-virus software.

    The role of a firewall is to be the only source of information communication between users and the public domain. As for the firewalls currently on the market, except for some powerful companies or some government departments, ordinary firewalls are just  Rubbish.

    However, Baiying Security targets high-end customers and has very few ordinary users. Their main customer base is large enterprises and government departments, so Baiying Security¡¯s firewall technology is quite good.  But nothing is absolute. If a firewall itself has a vulnerability, once the vulnerability is known to hackers, the consequences can be imagined.

    Even the international security giant Symantec dare not say that there are no loopholes in their firewalls and anti-virus software, let alone Baiying Security.  Because all the information of Baiying Security Firewall and anti-virus software has been stolen from their server, including the source code.

    So it is very easy to analyze and decompile firewalls and anti-virus software, but it takes a long time to analyze such large software.  Zhang Yang had to borrow part of the school's server resources. It was not until the evening that Zhang Yang finished analyzing the entire firewall and anti-virus software.

    But it is estimated that Fang Shaoyun should be back soon, and Zhang Yang will not be able to continue.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report