Rule system

Chapter 136 The Legend of an Eagle

"Yeah~~"

"Good job!"

Zhao Yi was excited and high-five Professor Liu, and Professor Liu also showed a happy smile.

This is indeed a success.

Professor Liu is the world's top computer research expert, but the field of computer is too big. His research content is related to artificial intelligence. He has not studied in-depth hacker intrusion technology.

of course.

That is of no use to Professor Liu.

It is also a novel experience for Professor Liu to be able to invade foreign websites with Zhao Yi. In particular, the intrusion was very successful. The released program invaded thousands, tens of thousands, and even more users’ computers, forcing several 10. Hundreds of websites shut down their servers. It can be said that the impact of manufacturing is very large.

Although there is no real destruction, it is more powerful than direct destruction.

Professor Liu thinks more.

In many things in the world, there will be black when there is white. Since the development of computer technology, the confrontation between black hats and white hats has been staged in corners that the public cannot see.

This is a battlefield without gunpowder.

The national cyber security department must be pure white internally, and it does not necessarily mean “white”. “White” means that it can only be passively defended, and it cannot always be “white” externally. Long-term defense also means Extremely passive, and occasionally must take the initiative to be able to truly deter opponents.

The intrusion program developed by Zhao Yi is so powerful that there is no need to invade directly. It can almost be said that it is a "cross-dimensional attack" to directly track the user's IP on the port.

This intrusion program is used to defend security and deter opponents too much.

...

The nineteenth team exploded.

The members of the nineteenth team are very depressed, because they have an'irresponsible' captain, because there is relatively little communication with each other, and they don't understand the captain's skills.

When they heard that only the IP and open ports are needed, they are full of doubts, wondering how the vulnerability can be invaded?

They all have a certain level of technology, at least they know some common sense of intrusion, and some will write related code, but they still follow it.

The players and captains of the League of Hearts do not belong to the real subordinate relationship, but there are too many ordinary players, and the skills to be captains are certainly not bad.

What the players didn't expect was that the invasion effect was so good?

In fact, for more than an hour, they didn't feel any effect, and even felt that the captain was paddling.

Overseas users will be "hooked" when opening the website, but they use a proxy server. When opening the website of the "hooked" website, the program can only be traced back to the proxy server, and they can't see anything.

later……

Can't open all the websites?

If only one or two websites cannot be opened, it can be said to be a website problem, but many target websites cannot be opened, it is certainly not a simple problem.

"Have you noticed? Our target website can't be opened anymore?"

"Most of them won't open!"

"Some can still be opened, but I found that the latest user comments on the website are all cursing..."

"Look, screenshot!"

"This website can't be opened either!"

"What the hell did Captain Yiying do? This is too awesome-it's too hard! Yiying! Call Captain Yiying!"

"@!"

...

Cyber ​​security department.

In an office filled with a large number of screens and a sense of technology, Zhou Ming and a few colleagues were sitting together, all looking anxious.

Huang Guocheng is the department director of the security department. He was responsible for this counterattack against overseas networks. He continuously tapped the keyboard with his fingers, and a lot of garbled codes appeared on the screen. He asked questioningly, "The other party is so powerful? He chased us so quickly Server?"

"impossible!"

"What are these? A lot of packets that call the underlying functions?"

"Is it a Trojan horse program?"

"It seems to be tracking our visit IP and find out who the visiting IP is!"

quickly.

The security department found the information. They tracked the locations of several IPs and found that they were all from the 19th team...

The nineteenth team?

When Zhou Ming opened the Penguin, he had to ask Zhao Yi. After typing a line and deleting it, he found the target website information assigned by the 19th team and tried to open it one by one.

Can't open most of them?

what happened?

"Look at it! The latest report from overseas media!" An exclamation suddenly came from the office.

A few people immediately went over to look.

The media in Oakland, California, reported the latest news--

"Auckland Police Department website was hacked!

The article mentioned in the report that users who visit the Oakland Police Department website will be tracked by hackers' Trojan horse programs and remind users to'don't click on the program that prompts to load'.

"There should be other reports, look again!"

When seriously looking for the latest overseas reports, they quickly learned a lot of content--

"Super virus appeared, invaded from regular website to user's computer!

"Terror of the Internet Black Hawk Virus!

"Network Security Bureau: Our public service website has been attacked by Eastern hackers!

"Special reminder: Do not load any programs in the browser!

"Beware of the Black Hawk Virus!

After browsing the information reported by overseas media, several people in the office of the security department also knew what happened. Simply put, it was the nineteenth team of the League of Hearts. It seemed to use an intrusion method to hang up the target website Trojan horse virus, Trojan horse virus follows the target website and invades to the user level...

This is terrible too!

"So, these data packets we received are the Black Hawk virus?"

Huang Guocheng looked at Zhou Ming, "You are in charge of the 19th team, right?"

"Correct."

Huang Guocheng thought about it, "Find a computer and run it for a try?" He wanted to evaluate the power of the virus.

quickly.

The result of the evaluation is out.

This so-called "Black Hawk" virus did not even attract the attention of the security software on the computer. It just called the low-level functions to make a picture composed of a few words and a number appear on the screen.

"It's just a small program." Huang Guocheng sighed softly, but everyone knew the key.

The'Black Hawk' virus can actually stick to the target website server, and with the information transmitted by the server, directly invade the level of the visiting user?

This is the terrible place!

Huang Guocheng took a deep breath and said to Zhou Ming, "Hurry up and contact the nineteenth team, so that they must never leak the intrusion program!"

Zhou Ming quickly contacted Zhao Yi, he was a little scared thinking about it.

In fact.

Zhou Ming doesn't value Zhao Yi very much. Zhao Yi is indeed an algorithm genius. He seems to be an expert in'finding loopholes', but the computer field is too big. He is good at writing algorithms and finding loopholes, and he does not necessarily know how to hack.

Zhou Ming only arranged Zhao Yi in the 19th team, and the target website assigned was not important.

In this counterattack against overseas networks, the top ten squads are the core main force, and the important goals are the ones assigned.

Now Zhou Ming suddenly found out that he was doing the right thing. He really assigned Zhao Yi to an important target website. Maybe the matter was really troublesome. Invading tens of thousands of overseas users would only arouse a burst of public opinion, invading hundreds of thousands or hundreds. Million users...

The consequences are unimaginable!

It was not an ordinary network counterattack, but a direct war with the opponent!

Zhou Ming settled down and quickly sent a message to Zhao Yi, "Your intrusion program, Black Hawk virus, don't leak it out!"

"Your invasion..."

Before he finished typing, he saw a message from the other side, "I am Professor Liu and I am with Zhao Yi. That is a small program we developed together."

"Your department quickly sends someone to the Academy of Sciences, and I will give you the source code."

"Remember to do some work!"

"do you understand?"

Professor Liu spoke very directly and very effectively. Zhou Ming paused and quickly replied, "Hello Professor Liu, I see."

Zhao Yi looked very interesting and asked, "Can I still ask for credit? Is there a bonus?"

Professor Liu smiled and said, "I won't publicly praise the merits, and don't expect the bonus, but there should be a recognition?"

"Recognition?"

Zhao Yi didn't understand.

Professor Liu shook his head and said, "I should give you a commendation for other reasons. Just wait."

...

The problem was quickly discovered overseas. The intrusion was only a small piece of execution code, which disappeared quickly after execution, and there was no problem of stealing data and destroying programs.

quickly.

They released information to tell the public not to worry about the'Black Hawk virus', and vowed to say that they had found a way to fight.

In fact, those who know are more worried than the public.

Those websites that have been "linked to the eagle" can't find the problem at all, so they can only check the source code of the website carefully and confirm that there is no problem before restarting the server.

When you can't find the problem, it's scary to think deeply.

Their understanding of the "Black Hawk" virus is limited to the infiltrated ports and functions, but the functions can be modified at will. As for the infiltrated ports, they are open ports for most websites. They cannot require all websites to close these. Commonly used ports.

How to defend against such an invasion?

Overseas security agencies have developed a strong sense of crisis. Some media have professionals, and they can also know the threat of the'Black Hawk' virus. They have also begun to report continuously.

"The security department cannot deal with the Black Hawk virus!

"This is the most difficult virus to defend!

"The creator of the Black Hawk virus is an absolute genius!

"This is a mysterious virus from the East!

For a time.

The focus of overseas public opinion is on the Black Hawk virus, and constant reports have quickly spread to China.

There is also constant discussion within the League of Hearts.

The members of the group have seen and learned about overseas reports, and they are quite sure that the'Black Hawk Virus' was produced by a certain attacker in the league.

Who is it?

Members of the 19th squad broke the news that the'Black Hawk' virus was released by their captain Yiying, and the news quickly spread.

'One Eagle' has become very famous.

Simultaneously.

The domestic security department has also begun to clear people in various groups, and all guests with the word "specially invited" have been eliminated one by one.

This is the protection of personnel information.

Zhou Ming also reminded Zhao Yi to forget the name of Yiying, and even suggested changing the code name of Yiying.

The source code of the Black Hawk virus may become a deterrent weapon in the hands of the cyber security department.

An eagle will only become a legend in the hearts of many people.