Defect another world
Chapter 32 Finding a Needle in a Haystack
Chapter 32 Finding a Needle in a Haystack
**031 Looking for a needle in a haystack**
After finally getting rid of Li Yu and returning to his seat, Meng Fei is already a great hero in Xiao Han's eyes who can easily repel Li Yu.
"How was your first day at work?"
What Meng Fei didn't expect was that Roan's WeChat avatar would actually light up and send greetings.
I handed in my mobile phone during working hours at the bank's workstation, and it was impossible to open my own mobile phone.
They can only contact VIP customers through the work WeChat account and operate on the computer.
But Meng Fei is not subject to this restriction.He has networking skills.The strongest BUG system in the brain directly controls the mobile phone in the pocket.
"It feels okay."
Meng Fei was actually talking about the girls around him.As for Li Yu, he didn't even want to mention it.
"Is the case difficult?"
Roan only cares about business.
If the experts he selected can successfully solve the case, the relationship between Mantis Software and relevant departments will be further deepened, and they will be more qualified to compete for more projects.
But on the other hand, if it is a mess, Meng Fei's loss will be small, and Mantis Software's reputation will be a big problem.
"Don't worry, big boss, I'll get it done."
Roan was taken aback.I've heard that this kid is restrained and cautious before, why is he so careless now?
In fact, for Meng Fei, this case is indeed difficult. Even if he has the system in hand, he will still have some troubles.
But always be confident in front of your boss, unless you have trouble with the future.
The case seems very simple, that is, the money of several VIP customers was somehow transferred away.
But it is complicated and complicated, and finding the real reason is like looking for a needle in a haystack.
In the past two weeks, hundreds of thousands of small funds have been transferred from the accounts of VIP customers of Golden Turtle Bank to an illegal account that has been monitored.
The bank did not immediately close the illegal account.The shutdown isn't really that big.This account is just used by the gangsters behind the scenes to collect money.
If you block this, it's not just to startle the snake, but he can go to other accounts in the future.At that time, you may not be able to monitor it.
Golden Turtle Bank's VIP customers are all big money, and they usually don't notice this small amount of transfer.
When people from the bank called to ask, they discovered that the money in their account had been transferred for no reason, and they all denied that they had ever operated it.
Judging from the system records, the money was transferred through legal operations, entering user names and passwords.
Some people will think, oh well, I'll just look up the IP addresses of these operations and find out where the operators are.
In fact, this meaning is for reference only.
Even if people don't hide it deliberately, with NAT forwarding everywhere and countless machines sharing IP addresses, it is difficult for you to locate the real black hand by IP address.
If the other party sets up a proxy to move the IP overseas, or simply walks on the street to find a wifi network and hacks the Internet, they can easily put the blame on others.
The Cyber Security Section of the Criminal Investigation Bureau is in charge of this case. They have already investigated the information and sent it to Meng Fei's mailbox.
Meng Fei browsed through them one by one.It can be seen that, at least superficially, the machines that initiate the operation are the clients' own computers.
Since these computers are all owned by the user, and the user has denied operating it, there is no clue.
This is a real veteran, a veteran who doesn't leave a trace.
Even if you can find an overseas proxy server, at least I know someone has done tricks.
If only VIP customers really leaked their passwords and were operated by others in different places, it is not a serious problem.
But within two weeks, the account numbers and passwords of hundreds of VIP customers were leaked at the same time, which is a bit scary.You don't even know how much leaked out.
The account list of VIP customers is only kept in the bank.Therefore, even if we don't say how the password was leaked, the account list can only be leaked from the bank.
If there is a real leak, Mantis Software can't get rid of it.The security system of Golden Turtle Bank is developed and maintained by Mantis Software.
Because of this, the bank asked the Criminal Investigation Bureau to invite an expert familiar with Mantis Software to participate in the investigation.
This is none other than Meng Fei, who just took office.
His task is not to catch the man behind the illegal transfer of money, but to find out how the bank accounts of VIP users leaked from here.
A task of finding a needle in a haystack.
After Li Yu was ruled out by him, the VIP account managers are now the biggest suspects.
Because there is a huge pit here, and it is also the weakest point of the whole system.
Every VIP account manager's computer can access the information of all VIP customers from the server, which is necessary for their operation.
Just to prevent account managers from leaking this information, the security system uses various technical means to protect them, so that they can only see the necessary information, and it is difficult to copy or send it out.
If there is a way to break through the constraints of the security system, it is possible for account managers to obtain this information and sell it to the black industry.
This is not to say that leaks are impossible in other ways.It's just that in Meng Fei's experience, the bad guys always choose the easiest part to start with with a high probability.
He must first be familiar with the operation routines of VIP account managers, and then analyze step by step whether there is a chance of breaking through the shield by chance at each step.
Even if it is not on the surface, if you look at every line of code, every instruction, the vulnerability may be hidden.
Perhaps normal operations cannot be triggered, and some special actions can be used to expose them.
For example, in his previous life, there was a very strange loophole in Windows.
When you log in, you have to enter your username and password.Later, someone discovered by accident that switching the input method when entering the password can skip this step.
The password restriction has become like a fake.
Maybe the source of the leak is that an account manager accidentally did an uncommon operation, only to find that he could see the VIP user's account list and download it?
Meng Fei did not need to analyze step by step, he directly called up the BUG system in his brain.
"Scan for all vulnerabilities that could expose a list of VIP customer accounts."
At this time, he could feel countless codes and logics running through his mind like lightning.
In the first few times when he used the strongest bug system, he didn't have this feeling, and everything passed without awareness.
It can be felt now because as the level increases, his control and understanding of this power from the system is getting stronger.
He could feel the powerful computing power from nowhere, analyzing every bit at an incredible speed.
Eventually a series of vulnerabilities were listed.
I saw him shaking his head again and again.
It's not that these vulnerabilities are unavailable, it's that they are too difficult to use.
If you get a development team, you might be able to take advantage of one or two of them after a few months of hard work.
A VIP account manager sitting here empty-handed and alone, trying to exploit these loopholes to get a customer's account list is absolutely impossible.
But the result of his analysis this time can only confirm that the client in front of him and the server connected to this time have no problem.
He didn't know if other machines would be different.
In theory the software on these machines is the same.
But no one knows whether different versions of the patch will be installed on different machines, or simply installed by an insider with a Trojan horse that directly destroys the security system?
He intends to analyze all the machines used by VIP account managers.
This is not enough to install an antivirus software and scan it once.
Antivirus software can only recognize the viruses and Trojans it recognizes.If you write a program that looks normal to "steal" the information that is already on your machine, there is a high probability that it will be ignored by antivirus software.
What he needs to scan is all the code that might be running on the machine, whether it's a virus or not.
He has to know their origin, purpose of operation, specific behavior, and whether there are loopholes.
The equivalent of a comprehensive security test of a whole bunch of unknown software.
This probably involves more than 300 computers in the account manager's office on this floor.
Before the change, even if you don't count the time to develop scanning tools, it would be good to be able to get ten units a day, and this work should be done for at least a month.
But now he can directly use the BUG system to scan one by one.
Of course he doesn't walk around in front of every computer to cast his "magic" in full view.And it's not that tight on time.
He would do it when everyone was off and at night in the dead of night.
At this time he heard a gurgling sound.
He lowered his head and whispered to the girl beside him:
"Your stomach is ringing."
After getting rid of Li Yu, Xiao Han, who has been busy with work and forgot the time, realized this, his fair face suddenly turned red.
"Yeah, I'm so sorry, I almost missed the meal!"
(End of this chapter)
**031 Looking for a needle in a haystack**
After finally getting rid of Li Yu and returning to his seat, Meng Fei is already a great hero in Xiao Han's eyes who can easily repel Li Yu.
"How was your first day at work?"
What Meng Fei didn't expect was that Roan's WeChat avatar would actually light up and send greetings.
I handed in my mobile phone during working hours at the bank's workstation, and it was impossible to open my own mobile phone.
They can only contact VIP customers through the work WeChat account and operate on the computer.
But Meng Fei is not subject to this restriction.He has networking skills.The strongest BUG system in the brain directly controls the mobile phone in the pocket.
"It feels okay."
Meng Fei was actually talking about the girls around him.As for Li Yu, he didn't even want to mention it.
"Is the case difficult?"
Roan only cares about business.
If the experts he selected can successfully solve the case, the relationship between Mantis Software and relevant departments will be further deepened, and they will be more qualified to compete for more projects.
But on the other hand, if it is a mess, Meng Fei's loss will be small, and Mantis Software's reputation will be a big problem.
"Don't worry, big boss, I'll get it done."
Roan was taken aback.I've heard that this kid is restrained and cautious before, why is he so careless now?
In fact, for Meng Fei, this case is indeed difficult. Even if he has the system in hand, he will still have some troubles.
But always be confident in front of your boss, unless you have trouble with the future.
The case seems very simple, that is, the money of several VIP customers was somehow transferred away.
But it is complicated and complicated, and finding the real reason is like looking for a needle in a haystack.
In the past two weeks, hundreds of thousands of small funds have been transferred from the accounts of VIP customers of Golden Turtle Bank to an illegal account that has been monitored.
The bank did not immediately close the illegal account.The shutdown isn't really that big.This account is just used by the gangsters behind the scenes to collect money.
If you block this, it's not just to startle the snake, but he can go to other accounts in the future.At that time, you may not be able to monitor it.
Golden Turtle Bank's VIP customers are all big money, and they usually don't notice this small amount of transfer.
When people from the bank called to ask, they discovered that the money in their account had been transferred for no reason, and they all denied that they had ever operated it.
Judging from the system records, the money was transferred through legal operations, entering user names and passwords.
Some people will think, oh well, I'll just look up the IP addresses of these operations and find out where the operators are.
In fact, this meaning is for reference only.
Even if people don't hide it deliberately, with NAT forwarding everywhere and countless machines sharing IP addresses, it is difficult for you to locate the real black hand by IP address.
If the other party sets up a proxy to move the IP overseas, or simply walks on the street to find a wifi network and hacks the Internet, they can easily put the blame on others.
The Cyber Security Section of the Criminal Investigation Bureau is in charge of this case. They have already investigated the information and sent it to Meng Fei's mailbox.
Meng Fei browsed through them one by one.It can be seen that, at least superficially, the machines that initiate the operation are the clients' own computers.
Since these computers are all owned by the user, and the user has denied operating it, there is no clue.
This is a real veteran, a veteran who doesn't leave a trace.
Even if you can find an overseas proxy server, at least I know someone has done tricks.
If only VIP customers really leaked their passwords and were operated by others in different places, it is not a serious problem.
But within two weeks, the account numbers and passwords of hundreds of VIP customers were leaked at the same time, which is a bit scary.You don't even know how much leaked out.
The account list of VIP customers is only kept in the bank.Therefore, even if we don't say how the password was leaked, the account list can only be leaked from the bank.
If there is a real leak, Mantis Software can't get rid of it.The security system of Golden Turtle Bank is developed and maintained by Mantis Software.
Because of this, the bank asked the Criminal Investigation Bureau to invite an expert familiar with Mantis Software to participate in the investigation.
This is none other than Meng Fei, who just took office.
His task is not to catch the man behind the illegal transfer of money, but to find out how the bank accounts of VIP users leaked from here.
A task of finding a needle in a haystack.
After Li Yu was ruled out by him, the VIP account managers are now the biggest suspects.
Because there is a huge pit here, and it is also the weakest point of the whole system.
Every VIP account manager's computer can access the information of all VIP customers from the server, which is necessary for their operation.
Just to prevent account managers from leaking this information, the security system uses various technical means to protect them, so that they can only see the necessary information, and it is difficult to copy or send it out.
If there is a way to break through the constraints of the security system, it is possible for account managers to obtain this information and sell it to the black industry.
This is not to say that leaks are impossible in other ways.It's just that in Meng Fei's experience, the bad guys always choose the easiest part to start with with a high probability.
He must first be familiar with the operation routines of VIP account managers, and then analyze step by step whether there is a chance of breaking through the shield by chance at each step.
Even if it is not on the surface, if you look at every line of code, every instruction, the vulnerability may be hidden.
Perhaps normal operations cannot be triggered, and some special actions can be used to expose them.
For example, in his previous life, there was a very strange loophole in Windows.
When you log in, you have to enter your username and password.Later, someone discovered by accident that switching the input method when entering the password can skip this step.
The password restriction has become like a fake.
Maybe the source of the leak is that an account manager accidentally did an uncommon operation, only to find that he could see the VIP user's account list and download it?
Meng Fei did not need to analyze step by step, he directly called up the BUG system in his brain.
"Scan for all vulnerabilities that could expose a list of VIP customer accounts."
At this time, he could feel countless codes and logics running through his mind like lightning.
In the first few times when he used the strongest bug system, he didn't have this feeling, and everything passed without awareness.
It can be felt now because as the level increases, his control and understanding of this power from the system is getting stronger.
He could feel the powerful computing power from nowhere, analyzing every bit at an incredible speed.
Eventually a series of vulnerabilities were listed.
I saw him shaking his head again and again.
It's not that these vulnerabilities are unavailable, it's that they are too difficult to use.
If you get a development team, you might be able to take advantage of one or two of them after a few months of hard work.
A VIP account manager sitting here empty-handed and alone, trying to exploit these loopholes to get a customer's account list is absolutely impossible.
But the result of his analysis this time can only confirm that the client in front of him and the server connected to this time have no problem.
He didn't know if other machines would be different.
In theory the software on these machines is the same.
But no one knows whether different versions of the patch will be installed on different machines, or simply installed by an insider with a Trojan horse that directly destroys the security system?
He intends to analyze all the machines used by VIP account managers.
This is not enough to install an antivirus software and scan it once.
Antivirus software can only recognize the viruses and Trojans it recognizes.If you write a program that looks normal to "steal" the information that is already on your machine, there is a high probability that it will be ignored by antivirus software.
What he needs to scan is all the code that might be running on the machine, whether it's a virus or not.
He has to know their origin, purpose of operation, specific behavior, and whether there are loopholes.
The equivalent of a comprehensive security test of a whole bunch of unknown software.
This probably involves more than 300 computers in the account manager's office on this floor.
Before the change, even if you don't count the time to develop scanning tools, it would be good to be able to get ten units a day, and this work should be done for at least a month.
But now he can directly use the BUG system to scan one by one.
Of course he doesn't walk around in front of every computer to cast his "magic" in full view.And it's not that tight on time.
He would do it when everyone was off and at night in the dead of night.
At this time he heard a gurgling sound.
He lowered his head and whispered to the girl beside him:
"Your stomach is ringing."
After getting rid of Li Yu, Xiao Han, who has been busy with work and forgot the time, realized this, his fair face suddenly turned red.
"Yeah, I'm so sorry, I almost missed the meal!"
(End of this chapter)
You'll Also Like
-
My Talent For Cultivating Immortals Can Be Refreshed
Chapter 414 6 hours ago -
People Are Drawing Cards In Konoha, But Some Men Don’t Play
Chapter 57 8 hours ago -
In Black Basketball, The Opening Template Is Shogo Haizaki
Chapter 72 8 hours ago -
Behind the Scenes of Aura Revival: I Am the King
Chapter 180 8 hours ago -
Don't like security guards? Here comes the little iron fist!
Chapter 87 8 hours ago -
Fuck you females, I'm a real man
Chapter 70 8 hours ago -
Game production: I created Mihoyo
Chapter 193 8 hours ago -
Watching the short video of One Piece, the characters of the Bankai instantly burst into tears
Chapter 93 8 hours ago -
Naruto live broadcast starts from the movie version
Chapter 194 8 hours ago -
I'm a card beast!
Chapter 180 8 hours ago