Rule system

Chapter 135 The whole network hangs eagles! Shocked overseas!

"The main purpose of the confrontation between domestic and overseas network means is not to cause sabotage, but a kind of network technology deterrence, which is to clearly tell the other party that we are capable of causing you trouble."

"So everyone shouldn't make trouble for each other. If you make trouble for me, I will make trouble for you."

"We don't need to do a lot of sabotage. No matter how we do it, it is impossible to enter the intranet of their important organization. Similarly, they will not be able to enter our intranet."

Professor Liu explained to Zhao Yi that the root of the domestic and international network intrusion wars is to tell him what kind of approach is most suitable.

Zhao Yi understood.

Deterrence!

Let the other party know that they have the ability to do damage. Is the newly designed intrusion program not suitable?

The intrusion program completed by Zhao Yi and Professor Liu can be described as a kind of "auto-replicating network sticky bug", which can hang on a specific open port of the target website.

The requirements for'specific ports' are not high. Most of the websites that can be logged in are generally open, and there are many'environments' suitable for network sticky bugs.

The network armyworm is called armyworm because it does not need to invade the website, but rather sticks to an open port. As long as the website transmits data to the user, the armyworm will copy it once and stick to the back of the data. Follow the data packet into the user's computer.

The armyworm can be blocked by firewalls and anti-virus software, but because the website data enters, the firewall and anti-virus software act on the part of the browser and will remind the user whether to run the program loaded by the target website. As long as the user chooses to load and run, the sticky The worm can enter and run.

Of course.

If the firewall and anti-virus software do not protect the browser, the program can be loaded freely, and the stickworm can run directly when the user visits the website.

The sticky bug can attach to the server of the target website is definitely restricted. Most of its code is used for camouflage, and only a small part of the code is effective. It is difficult to achieve the effect of ordinary Trojan horses.

Zhao Yi's choice is to call the underlying functions of the operating system and use the most primitive code to load the text on the screen.

There is still some time.

Professor Liu decided to join in the invasion operation, he carefully studied and perfected the invasion code.

Zhao Yi simply used the original code to design the loaded picture. He used large numbers of figures to form the shape of an eagle. For reasons of aesthetics and drawing level, he constantly corrected the simple pictures on the Internet to make the eagle. It looks more majestic.

This process is more difficult than designing the code!

After eight o'clock, Zhao Yi opened MSN and had a pre-war exchange with the members of the 19th team.

The players can't wait.

The group is full of news from the players, and they still complain about how unreliable the captain is. It's seldom that they are online. The offensive time is about to come, and they are not online soon.

Zhao Yi made an awkward expression, and the group suddenly became quiet.

He continued to send messages and said, "Are you all ready? You can start now. The proxy is open. I will send you the website separately. You use software to detect open ports. Remember, you don’t need to detect vulnerabilities or find others. For information, I only need the IP of the web server and the open port number, which must be matched one by one."

Although Zhou Ming set the time at nine o'clock, the invasion was not about launching missiles, and there was no specific time switch.

As long as the proxy IP is open, you can proceed freely.

The players still have many questions--

"Captain, do you really need other information? I need IP and port number?"

"I used other IPs before, and I have collected some information. Will I send it to you directly?"

"I found a website management portal, but I still haven't cracked the password! The cracker doesn't work well."

"..."

Zhao Yi had a headache looking at the blockbuster information, so he simply asked Xiao Zhicheng who was idle to help him'chat', and he went with Professor Liu to write code to prepare for the invasion based on the IP and port he got.

This job is very simple.

Because the intrusion program has been compiled, he only needs to fill in the target IP and port, and run and send them one by one.

If you know how to do it, it's even a bit like repetitive manual labor, but Zhao Yi and Professor Liu are very energetic.

Even Professor Liu found it interesting.

Hackers find it attractive, probably because destruction is human nature, just like some movie "heroes", they always have powerful force value, destructive ability is very strong, computer experts can achieve intrusion, too A technical and destructive achievement.

Obviously.

Finding only the IP of the target website and the corresponding open port is not difficult at all for the team members who have a certain technical level and many software assistance.

Zhao Yi assigned about 20 websites to everyone, and it took less than half an hour. Almost all the IPs and open ports of the websites were sent one-to-one.

Among these IPs and open ports, 80% meet the demand.

Zhao Yi also kept running intrusive programs, hanging up the sticky bugs one by one on specific ports of the website.

...

Oakland, California.

Old Jem's son signed up for the Auckland City Police-Inspector training, and after passing, he can officially become an intern police-inspector.

Old Jim is very concerned about his son. When he woke up in the morning, he opened the website of the Oakland Police Department to see if there was a new list of announcements in the latest announcement on the website. He opened the website several times and could easily find news on the website. column.

This time is different.

When the website was loaded, a prompt popped up at the bottom of the browser, "Whether to load the XXX program, from the website..."

"load!"

Old Jim chose to load it without hesitation, because the program came from the website of the police station. The website of the police station can't carry viruses, right?

He didn't think so immediately.

After clicking Load, the computer seemed to be stuck for two or three seconds, and then a large blood red word popped up in the middle of the screen--

"Please note!"

"Your computer has been hacked by a Trojan horse!"

The text gradually disappeared.

Near the center, a black eagle pattern appeared. The pattern was purely composed of numbers, and the painting was a bit crude.

But... that's not the point!

Old Jim stared at the computer screen in a daze, and suddenly stood up and said angrily, "What kind of police station is this! It sent a Trojan horse to my computer!"

Simultaneously.

Many users who visited the police station’s website found that they had “had a Trojan horse”. They directly blamed the police station and called each complaint.

The Oakland Police Department received a large number of complaints, and hurried to find professionals to see what was going on on the website, and found that the problem could not be found in a short time, so it simply shut down the server.

The same thing is happening on many websites.

The last time an overseas hacker targeted a domestic public service website, the target of the Heart Alliance was also a public service website, which is an extranet that is close to the government and government departments.

At present, most public service websites only have the function of "publication", and those with services are rare.

Rare does not mean there is no.

The tax agency in Texas has opened a portal for inquiring tax refunds on its public service website, allowing taxpayers to inquire about the specific tax refunds and repayment amounts in the previous year.

This service is nothing more than ten years later, but now it is a bit ahead.

The tax agency in Texas is highly acclaimed and has also increased a large number of users, especially when the service is open during working hours, the number of visits has increased dramatically.

The users who visited this day did not give any good comments to the tax agency in Texas. They found that their computers had been'installed' with Trojan horse viruses on the tax agency's website?

It must be installed!

"Your computer has been hacked by a Trojan horse" is written in the middle of the computer screen.

Suddenly.

A large number of complaints followed.

This matter immediately appeared on the media page, and because of the media reports, more interested people visited the tax website of Texas, and complaints became more numerous.

This is an infinite loop...

The tax agency in Texas received bad news. Their tax website was crowded with traffic and the server was directly paralyzed, but it was also good news because there would be no new complaints.

If there is a problem with one website, it may be just a single case. When dozens of websites have problems at the same time, coupled with the actions of other teams, and many more websites have been blasted and hacked, the problem becomes obvious. Up.

Soon the report appeared--

"Our public service website has been hacked!"

"A hacker from the East!"

"Dozens or hundreds of websites will be installed with Trojan horse viruses, terrible Trojan horse viruses can penetrate into users' computers!"

"This method is terrible!"

"..."

The whole network is shocked!

Although there are many websites that have been hacked and attacked, Zhao Yi’s “Hangying” is undoubtedly the most obvious, because “Hangying” follows the website and invades the user level, and also makes the attacked website department angry. The people are in a mess.

No matter how serious the damage to other teams is, it is only at the website level.

As a result, the “website hanging eagle” became a sign of being invaded. Almost all media reported on the “hanging eagle” picture on the computer to report. In contrast, the destruction of other units seemed a little trivial. It's up.

Although "Hangying" does not have Trojan horse or virus functions, it can make users feel that they are viruses in their computers.

This power is greater than Trojan horses and viruses.

Those website departments that have been "linked to the eagle" cannot find the reason in a short time. In order to reduce the pressure from the public, they can only choose to temporarily shut down the server.

The overseas media reporting the incident also named the intrusion program ---'Internet Black Hawk Virus'. The report described the virus as'terrible' and'temporarily unsolvable', and'the attacked website can only be closed. Server to respond'.

'Internet Black Hawk Virus' has quickly become synonymous with'terrible'.