Rule system

Chapter 103 Don't be afraid of the other party changing this time!

Copying is the basic function of a computer.

The bottom layer of the computer will have a copy function. The realization of the copy function does not require code at all, just an execution instruction, but if you want to rely on your own computer to copy the data that has not been recognized by other computers, the difficulty can be completely It's different.

Zhao Yi thought about making a data packet with “IP suffix” and pasting the data packet on the information sent by the target host, then the “navigation” function of IP can be realized, and the information will be led to “navigate”.

This is not copying, it is interception.

The target information was not copied, but was directly intercepted and sent to other places.

"Unless you can get more permissions, or use the target host to replicate, it will be too difficult to replicate."

This cannot be solved in a short time.

If it is to use the target host to implement the replication function, it is relatively simple, but it is also equivalent to controlling the target host. The way to put it plainly is also very simple, which is to launch a Trojan horse program.

"To hang a Trojan horse must break the interception program and cannot be recognized as a Trojan horse. Hiding is the most important thing, but as long as it runs, it may be identified."

"It's easy to break things. Just make an unlimited copy, or run with some program..."

Zhao Yi shook his head.

Even if it is a Trojan horse program, the purpose is definitely not to cause damage. It is meaningless to harm others and disadvantage oneself, and it will involve serious legal issues.

The Trojan horse program to be made must not be destructive, it is better to have self-destruct function...

Self-destruct function?

Zhao Yi suddenly remembered that in the Dota game, there is a hero called the Goblin Engineer. His ultimate strategy is to commit suicide directly, exploding with great power on the spot.

In this way, the opponent can't get the head, and the effect is good in the case of death.

"If the execution of the Trojan is one-time, there will be no sequelae, even if it is detected, it doesn't matter, it's only a one-time operation anyway."

"At the same time, can you achieve a lot of functions?"

Zhao Yi thought about it and immediately started writing according to his ideas.

One-time execution of the program, if the code is simple enough, it will be very easy to embed into other software, programs, and documents, but it must have the advantages of being easy to put, execute, and not easy to be detected, otherwise it will have no meaning .

This is the difficulty.

Zhao Yi decided to use the low-level code to write, the low-level code can be embedded in various places, and also directly call and execute some computer low-level functions to improve the ability of his own program.

quickly.

Relying on the ability of "Causality" and "Contact Rate", he completed the "one-time Trojan horse framework".

The next step is to add features.

Zhao Yi's goal is to break into the police website. It is best to find the management portal of the website, put the Trojan horse on the computer of the police department, and copy the webpage record information, which is a good choice.

This function is too simple to implement.

Because they are all using the same operating system, most of the file paths of the browser's default history browsing records are exactly the same. You only need to use the underlying instructions to perform the copy function operation and make a function that is sent to the specified IP. Up.

But for the insurance period, he decided to start from the bottom, first find the file path, and then copy and transfer operations.

Transmission is much more difficult than copying.

To transmit, a connection must be established. The default IP host of the Trojan must also have a direct connection port.

Zhao Yi made another receiving procedure.

The program must be running all the time to be able to receive the information transmitted by the Trojan horse.

The following is the final step-launching the Trojan.

"To be a website with a Trojan horse? By the way, hide the IP so that other people can't find it easily?"

"Want to design a program again?"

"wrong!"

Zhao Yi shook his head suddenly. His goal is the police website, so it doesn't have to be so complicated.

Open the monitoring record.

There were dozens of Penguin accounts and passwords. He logged in to check and found a group related to police affairs, and then sent a group email of Trojan files.

Log in to the second one.

"Logistics Director, Zhou Hongwen?" Zhao Yi looked at it in surprise, and realized that he didn't need to log on anymore.

This one Penguin can hold up to ten!

...

Li Jiandong is on the night shift this day.

Compared with other police departments, the logistics department is relatively relaxed, and logistics is rarely used in emergencies. The night shift of logistics is relatively easy.

Li Jiandong couldn't get up at all. He was worried that the police website would be hacked again, so he watched and opened the website link over and over again, carefully paying attention to whether it had been modified.

He kept staring until more than eleven o'clock.

"It seems to be fine. After hiding the management entrance, the other party can't do anything."

Li Jiandong let out a sigh of relief, and found a group email notification in the lower right corner. There are new emails in the Penguin mailbox. He usually doesn't care. Most of them are advertisements and scammers, but this email is completely different.

That was an email from Director Zhou.

Li Jiandong hurriedly clicked and looked at it, and found that the email contained only one sentence--

Everyone, take a look at the document below!

"Documents?"

Li Jiandong discovered that the email was accompanied by a document. He clicked on it without thinking about it. The document was opened in the browser, and there was indeed a lot of garbled characters inside.

"What? Something went wrong?"

Li Jiandong didn't understand it for a long time. He even downloaded it and opened it. There was still a lot of garbled characters in the document, "Probably it was sent wrong?"

Li Jiandong didn't care.

He graduated with a bachelor's degree in computer science, entered the police service and continued to do computer-related work. He still has certain confidence in his computer skills.

For example, the firewall on his computer has always been the highest protection, and the anti-virus software on his computer is always on.

As long as the firewall and anti-virus software don't prompt, you don't have to worry about it at all.

Zhao Yi just finished washing and preparing to go to bed. After scanning the computer screen, he found that the program had received information?

Someone opened the email so soon?

He opened the document record, which showed hundreds of link records. The function of the Trojan horse program is to copy the most recent one hundred historical link records once executed.

This is a bit of a net fishing.

In fact, this is the case with Trojan horses. There is some luck in how many fish can be made up by casting the net down.

Zhao Yi used the Penguin to place it at a fixed point. His luck was also very good. He found several connections related to police affairs, opened them separately, and found the management entrance.

After seeing the suffix of the entrance, he felt a sudden realization.

No wonder you can't find it!

This guy changed the connection entry almost to a mess.

Zhao Yi tried a few recorded IDs and passwords, and then went directly to the management page, and then put the Flash animation and link of the eagle flying, and also put a super difficult Mathematical Olympiad question.

Special tips can't be less--

(The answer to the question multiplied by π is the password, come on!)

And then……

"Yes indeed!"

"This guy has hidden the management entrance. It is not easy to find it. Just embed a functional program directly in the website source code!"

Zhao Yi wrote it up in spirit.

It's easy.

He hides the program in the calling database, loading pictures, and file codes. The function is to display the connection of the management entrance, the account number and password of the management on the three-level interface of a long news.

of course.

The displayed information is disrupted, and other people must not be able to understand it.

If you are an experienced programmer who is good at website design, you will probably find that something is wrong when you see a program in the website code that calls the database.

That also requires a closer look.

The garbled code on the third-level news interface is not easy to see. One is that there are too few people who visit, and the other is that news is very official and basically does not say anything. It is a headache to look at It is difficult for anyone inside the police to click in.

"I'm not afraid that the other party will change this time!"

Zhao Yi went to bed with satisfaction, but he kept thinking about programming issues.

"Copy monitoring" could not be achieved, and I always felt very reconciled. The way to find the management entrance by launching Trojan horses was a little worse.

but……

The Bomberman Trojan horse framework is not bad, with high concealment and easy delivery. There are many areas for improvement, and it is also very useful and promising.

This is also considered a gain.