At the end of the day's work, Qin Jian returned home. After eating, he went to the study.

There is a high-performance computer in the study, and there is only one keyboard on the round desk.

Qin Jian turned on the computer, and then an arc-shaped display about 2 meters in length was projected on the desk.

This is a projection screen specially made by Qin Jian for himself. The function is not much different from the traditional screen, but it looks very cool.

The computer starts successfully, and there is no graphical interface displayed on the screen, but black command boxes one by one.

Qin Jian began to type on the keyboard.

Qin Jian was very annoyed by Bezo's behavior this time, and he decided to make Bezo suffer a little bit.

As Qin Jian hits the keyboard, the data on the screen flows across the screen like a waterfall. Not good enough. Since the projected screen is wide enough, Qin Jian can open a lot of command lines and perform different tasks at the same time.

For a very large Internet company such as Flax Line, Qin Jian did not use the previous DDOS attack when dealing with Liu Baoshui, because this method is not very effective for Flax Line. With the scale of data centers set up by Flax Line around the world, Qin Jian Even if Jane launches a hundred million-level attack, it will not have much effect. The DDOS attack is still too rude. As long as there is bandwidth and server resources, it is easy to defend. There is no doubt that Linen is the world's largest cloud computing. The most important thing in the center is server resources and bandwidth.

Therefore, what Qin Jian has to do now is to enter the linen yarn business system through the loopholes in the system, and find the places that can be used.

Invading a server is completely different from invading a personal computer. Personal computers generally use a micro-window system, and there are many vulnerabilities. If Qin Jian thinks, he can come up with many vulnerabilities.

However, the system used by the server is an open source Linux system, or a customized system based on the Linux system kernel. Many people may think that an open source system is definitely not a closed system security, but the fact is the opposite. The open source system is due to the source code. Fully public, which allows everyone in the world to conduct research. Almost every line of code will be continuously optimized, making this system more and more secure, and there are few vulnerabilities at the kernel level.

And as more and more companies use it, the Linux system becomes more secure. It is almost impossible to find a system-level general vulnerability like a micro-window system.

However, any system has vulnerabilities, including linux systems. Although the kernel of the linux system has been optimized by countless engineers around the world to be extremely safe, the software running on the linux system does not guarantee that there are no vulnerabilities, especially those A system with deep customization of Linux is likely to have loopholes.

This is like many upright officials in a TV series. They are all upright, not corrupt, and free of bribes, but he cannot guarantee that the people around him will be the same as him. For example, his parents and brothers are not greedy. Many upright officials are like this. Encountered by the people around you.

The same is true for hacking a system. It is difficult to find a place to start in the kernel of the system, but the software and services running on it are not complete and there are vulnerabilities that can be fatal.

Qin Jian's technology can be said to be the world's top, and it is not an exaggeration to say that the strongest hacker, but it is also difficult for him to find obvious exploitable vulnerabilities in the kernel of the Linux system. After all, this is a kernel optimized by countless talents around the world. So what Qin Jian has to do now is to analyze the various services provided by the linen server one by one, hoping to find loopholes in these business software.

The most important thing for digging loopholes is to be patient and careful. Qin Jian undoubtedly possesses these two qualities.

For the next ten days or so, Qin Jian also went to the company. In addition to eating and sleeping, he was studying various services provided by the linen thread.

The projection screen in front of him has now changed from one to four. Sometimes Qin Jian needs to look up to see the information displayed on the top screen.

Suddenly, Qin Jian smiled at the corner of his mouth. After analyzing and searching for more than ten days, he finally found an exploitable loophole in the trading system.

I have to say that the technology of flax thread is really strong. It took more than ten days to find such a valuable loophole with Qinjian's current technology.

Qin Jian leaned his body on the chair and stood up immediately.

After more than ten days of fighting, he did not have time to manage his personal hygiene. Now that he has found the loopholes, Qin Jian is not in a hurry.

He went to the bathroom, took a hot shower, fixed his beard, changed into a clean pajama, and ate another meal before returning to the study room. At this time, he had already figured out how to use the deal. The loophole came to launch a fatal blow to the linen thread.

The discovery of a vulnerability does not mean that the attack can be carried out immediately, but that the steps of the attack need to be designed, the programs used in the attack process, and various auxiliary gadgets need to be written.

Qin Jian's hands were constantly beating on the keyboard, and various programs were continuously written. These programs can be said to be special-purpose. They can only target current loopholes. If you change a loophole or change an environment, it will fail.

The development process of the program does not require much time. The more time-consuming part lies in the design ideas of the program, the logical relationship, and the problems that may arise during the entire attack process. Therefore, Qin Jian stops from time to time. After thinking it over, then start.

Three days passed quickly. Qin Jian typed the last character and compiled the program. Looking at dozens of exploit tools in the folder, Qin Jian laughed and finally completed the tool chain. The next step is to proceed. The vulnerability is exploited.

Qin Jian stood up, moved his body, and checked the time. At around 7 o'clock in the evening, this time in the U.S. area was exactly 7 o'clock in the morning, which was very good. This time was very suitable for launching an attack.

Qin Jian sat down again, typing the first command in the black command box.

Sb-pr

Press Enter, then the cursor flashed a few times, and then a new command box popped out.

At this time, Qin Jian has successfully entered the global online trading system of linen thread.

It seems that there is no display, but the invasion is just like this. All the work is completed in the early stage. The actual invasion process is to order one by one, start each tool, especially this kind of targeted invasion.

Qin Jian laughed, and then launched the second program, a small program specially used to generate Bitcoin accounts, very simple.

With the launch of this program, the screen began to swipe, and rows of Bitcoin wallet addresses were generated.

Qin Jian continued to launch the next tool to activate the botnet that Qin Jian had built before.

Botnets have many functions, not only can they be used to launch DDOS attacks, but they can also execute various commands, or help Qin Jian hide his identity and hide his real IP address in hundreds of millions of individuals. In the computer, in this huge botnet, Qin Jian's instructions can be issued from any computer, leaving no way for anyone who wants to track him down.

[The undead is activating...]

[1 million, 10 million, 100 million.

[The predetermined number has been activated and the performance test is in progress!

[Performance testing is in progress...]

Qin Jian closed his eyes and rested, and waited for a while.

The actions he took next need to be used for some relatively high-performance machines to help him complete the attack.

After waiting for about an hour, all the undead performance tests were completed.

[The number of undead that meet the requirements is: 30 million+]

Qin Jian laughed, this amount is enough.

Implantation-g-ugo

A line of command is executed, and the waterfall-like information starts to refresh the screen.

23.228.127.**ok

185.191.171.**ok

118.172.201.**ok

177.244.36.**ok

185.52.8.**ok

……

After waiting for about an hour, 30 million+ zombie computers were implanted with exploit programs.

Qin Jian laughed, and then there was a real attack.

The pattering of the keyboard sounded, Qin Jian continued to turn on one tool after another, and the black command box on the projection screen in front of him kept jumping up.

Qin Jian finally stopped moving.

On the middle projection screen, a black command box was enlarged, and rows of messages began to refresh.

[The transaction from paul has been executed, the amount is 155$]

[The transaction from eugene has been executed, the amount is 1.8$]

[The transaction from Vicberger has been executed, the amount is 68$]

[The transaction from witchybea has been executed, the amount is 827$]

……

Qin Jian laughed, this trading loophole is really great.

At the same time, another command box also began to scroll, showing the Bitcoin transaction addresses one by one.

1CQudwaAe2a6X83Zvz7EdRbz3PRfS3Q7Ak+0.002

[1HnYuKz6CTgRJUgZ3YVsV4bJvMM9MQid5r+0.149]

[9G5FkNQSQASJHifGtxqT93QsFhzadtejdv+0.256]

[2PQ5M1gpKcnifNRxa12Yh33c4ZBpMjUhtp+0.500]

[TFU2srBM9DDW53a3HYiMJSmDuZF6jy5Bjs+0.210]

……

The transaction loophole discovered by Qin Jian is very deadly. Through this loophole, Qin Jian can use the money purchased by linen users to buy bitcoins on major bitcoin trading platforms, although every transaction is very It’s small, but it’s an astronomical figure in total. After all, the daily turnover of flax yarn is amazing.

Looking at the information displayed on the projected screen, Qin Jian stood up, and now he does not need to do anything. The program he implanted in the linen line transaction system will monitor every transaction, and then transfer the bank credit card The deduction is used to purchase bitcoin. The user of the linen thread may be buying a water cup, a computer, or a pack of cat food at this time. The money will be displayed in the linen thread system as received, but the actual All payments made by them will be intercepted and used to buy Bitcoin.

This is a typical man-in-the-middle hijacking attack in Qin Jian, but what Qin Jian hijacks is the flow of funds. This kind of attack is difficult to detect in a short period of time. When the linen thread is discovered, it is very difficult to recover it.

After the attack was completed, there was nothing to do with Qin Jian. He saw that the time was almost 10 o'clock, and immediately went to sleep, and finally got a good night's sleep.