Cyber Heroes

Chapter 365 Hartmann

Hello. Xiang Shan crossed his arms and greeted Hartman in a friendly manner.

Hartman was distracted. But he reacted immediately. He immediately stood up and said loudly: Yes, sir.

Um...I'm not your commander...

Head of the Hanuman working group, Xiangshan. It's you. You are my commander now.

Xiangshan didn't expect that this hacker would have such a strict character. He felt a little embarrassed and just asked: What are you doing now?

Are you asking about the progress of the work, sir?

Hartman's voice was quite loud, and several people from the security department not far away heard it. They took a look and found out it was Xiang Shan, so they left it alone.

After all, Xiangshan is indeed the boss now. Moreover, the boss has been trying to exchange academic knowledge with those hackers for the past few days. Now that Hartman is here, it is natural for the boss to ask.

After all, there really wasn't anything he couldn't ask.

I am scanning these electronic devices to deduce the spread of electronic viruses, sir.

Only then did Xiangshan notice that there were indeed many personal devices piled on this table.

Did you find anything?

It's still being scanned, sir. I just screened out the files in the 'whitelist'. The remaining suspicious objects are being analyzed using the toolkit. Hartman said, Actually, I can probably guess the method, but I won’t make a judgment until I know for sure.”

Xiang Shan asked: Can you tell me?

I speculate that it should be a kind of Trojan. It knows the common characteristics of research data, searches the entire computer for data that matches the characteristics, and then sends it to the designated location when there is a public network. After completing all this, the Trojan It will be automatically deleted to prevent itself from being retrieved. Therefore, if you check those scholars who have had leaks, you will definitely not be able to find the virus. But it will leave traces.

Human immunity is divided into non-specific immunity and specific immunity. Non-specific immunity will eliminate the non-self in the entire person. Specific immunity, on the other hand, only targets specific pathogens. Generally speaking, after pathogens enter the human body, they are attacked by non-specific immunity. A malicious piece of RNA can't get itself into a cell directly, so it needs a protein shell - this is a virus.

Pathogens such as viruses will disguise themselves to activate receptors on the surface of human cells, pretending to be substances needed by certain cells, and enter the cells. A large number of viruses will activate the resistance of the specific immune system. Helper T cells recognize the antigen and in turn read the encoded records in the memory T cells to produce the antigen.

This set of logic can also be roughly applied to computers and computer viruses. Computer systems are defined by engineers as legal operations and illegal operations, and some operations are naturally difficult to perform. It is difficult for pure malicious code to take effect directly. So hackers will add shells to malicious code. The virus either extracts permissions or exploits vulnerabilities to disguise its modifications as legitimate operations. Anti-virus software and analysis software can retrieve the codes of these shells and compare them with virus databases to detect and kill them. Security software and virus databases represent helper T cells and memory T cells.

However, viruses written by humans are the product of intelligent design, so they often have sexy operations that are unimaginable for naturally evolving things - such as self-deletion.

The virus destroys its own shell and does not give the immune system a chance to recognize it.

The spread of computer viruses also follows infectious diseases. However, a virus that “disappears and does not produce antibodies” will definitely make it difficult to identify “Patient Zero”.

But Agni seems to be able to find trace of modifications of the virus - or records of symptoms, and then use the records to infer the transmission trajectory.

Speaking of this, Hartman was a little proud: Actually, I still know a little about 'Zhurong'.

Xiang Shan felt a little strange: Are you friends? Or do you have enmity?

I don't know him. Hartman shrugged: But I have studied him.

Have you studied him? Then why didn't you catch him? Xiang Shan felt very strange: If you had caught this guy earlier, wouldn't there be so many problems?

I'm neither a policeman nor a member of the IRS (U.S. Internal Revenue Service). Hartman was also very surprised: If there is no order, what is the purpose of arresting this economic criminal?

Economic criminal... Xiang Shan was completely confused. In the eyes of this hacker, can the behavior of Zhu Rong be summed up as an economic crime...

No...it does seem to meet the definition of economic criminal, but...

Xiang Shan asked: Then why are you studying it?

Hackers are people who look for loopholes in systems. Some people are good at finding holes accidentally left by construction workers, and some people like to drill holes themselves. Hartman said: Following the footsteps of other hackers, it is easy to find them. It’s a hole. I have studied other hackers’ methods. But I rarely take the initiative. Usually I just follow them and look for things that can be exploited.”

Xiang Shan had indeed heard of such a thing. Some little black hats, who are like traffickers and pawns at the bottom of the world, will only learn some very basic technologies from some big hackers. [They may even only use scripts written by big hackers, called script kiddies] After they use certain scripts to hack into innocent websites, the Trojan files and passwords generated by those scripts in the website Probably all the same.

These script boys are more like the furnace and puppets of the script master. They will hack into some innocent websites, slightly modify the material on the home page to prove themselves, and then proudly put their accomplishments in anonymous communities to accept the worship of others. But all this is to facilitate the secretive actions of the big hacker behind the scenes. For big hackers, this is casting a wide net. Maybe when will we need to use such a small amount of resources?

But Xiangshan really doesn’t know that hackers of the level of “Agni” can also do this kind of thing...

In other words, a hacker of the level of Zhu Rong can actually be treated like a script boy...

For me, reversing Trojans written by other hackers is actually more interesting than breaking into a complex system. Hartman said: I'm not saying that I'm not good at the latter. In fact, I am also very good at finding vulnerabilities. I'm good at it, but compared with other hackers, I can't make a big difference. But I like to think about the little tricks that other people have played, sir. I cracked seven of the things that mediocre Vulcan left on the Internet. Seven or eighty-eight. I knew that he still had several things that he had not confessed... Many famous hackers, you thought they had confessed all their crimes. Have you seen Harry Potter? It said that those Wizards like to tease Muggles very much, so they put a fire protection spell on themselves during witch hunts, and then stand in the fire and bark twice to play. Those hackers may not be so leisurely when standing in court, but they must be holding back their hearts. I think 'that's all you know'. I'm different...

Only then did Hartman realize something and stood up straight again: I'm sorry, sir. I may have been a little verbose.

Xiangshan doesn't really dislike this kind of person. He felt that this guy had the same kind of technical geek vibe about him. He waved his hand: So you know the evidence of many big hackers? You can send them to jail at any time?

It's not that exaggerated, sir. The most I can do is confirm 'what this ID has done online' or 'which IP this ID used to log in'. Many times, if you want to convict criminals, you still have to dig out Their identities in the real world can only be obtained by seizing their devices when they operate their accounts. Hartman was honest: The FBI is very professional in this regard.

When he said this, he also glanced at the former FBI monitor next to him. The former FBI supervisor actually nodded proudly.

Xiang Shan scratched his head: You can't lock the position of 'Zhurong' quickly?

Hartman was surprised: Don't you know, sir? My main job is to investigate computer virus infections and assess the extent of intelligence leaks. As for catching 'Zhurong', we have to wait until this is done.

Xiang Shan nodded: I thought I could find that person directly through you.

Well, maybe I'll be there when the person is caught in the end and keep her online through provocation or something like that. But in most cases, social engineering is the best attack.

Xiang Shan nodded: You are still very transparent. I thought you were very proud of your skills.

No, I am indeed very proud. Hartman said: My technology can maximize the power of social engineering methods. Only the correct order can use my power correctly.

Xiang Shan said: That's why you want to... join the army?

Hartman nodded.

Then why didn't you sign up to join the army normally?

I have the technical advantage, but not the physical advantage, sir. Hartman said: I don't quite understand what the normal process should be. But people like me can't perform at their own level. Now computer science I progressed very quickly, and if I had relaxed my studies because of daily military training, I might not be the best hacker in the world.

Xiangshan probably understood why those United States soldiers didn't like this person at all.

It's weird that I like it.

Moreover, this guy didn't seem to hide his intentions at all, and actually told himself, a foreign chief, on this occasion.

Xiangshan even noticed the expression on the face of the former FBI supervisor. I'm afraid he also thinks this colleague is ridiculous. But he seemed not to be allowed to speak, so he remained silent.

Hartman even said happily: I will become the deputy director of the FBI one day. As long as my skills are combined with the power of the FBI, I will definitely eradicate cybercrime in the United States!

Hearing this, the former FBI officer showed a smile, but quickly stopped.

——This poor child doesn’t know why he is isolated...

However, Xiangshan doesn't dislike this kind of technical nerd.

He chatted with this Agni for a little while.

ticket!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like