Hardcore crisis
Chapter 355 Loophole
When Avandi walked into the building uneasily, he put his cell phone in the storage box as usual. As soon as he walked through the door, the metal detector rang.
"Oh, I almost forgot, I haven't taken out my electronic cigarette yet."
Avandi pretended not to care and took out the electronic cigarette from his pants pocket.
The two security guards guarding the door looked at them but didn't say anything. There were too many people of all kinds of personalities here, and there were also many people who didn't like to be restrained. The company also gave them preferential treatment, otherwise what? It is possible to design so many facilities for convenient care.
The e-cigarette didn't attract much attention. Aiwandi put the e-cigarette back into his pants pocket with fear. He cursed secretly that at least a disguised pen would be better than the e-cigarette. But if you think about it carefully, pens are not easy to charge, and e-cigarette charging is obviously better at camouflage.
Just like usual, Aiwandi walked up to the second floor, came to his desk in the tree house, sat down, and wiped the sweat from his forehead.
"Aren't you going to have breakfast?"
Wayan on the other side asked curiously.
"No, no need, I already had it this morning."
"Then I'm going to have some breakfast."
Wayan didn't notice anything strange and followed him out of the office area.
Aiwandi likes to come early, so the office area was quiet at this time and he was the only one left.
Originally, according to the requirements, all the company's desks adopted a wireless design. Both the keyboard and the mouse were wireless. Even the transmission of work data between each other no longer used mobile storage devices, so many desks no longer had USB socket.
Yes, not only is it unable to recognize removable storage devices, it doesn’t even have a USB port.
Aiwandi couldn't help but feel troubled by the network security protection of the company's headquarters. This was the first time he felt that a company could achieve network security to this extent. Maybe he was ignorant, Aiwandi thought, maybe big foreign companies did this.
However, the breach is always broken from the inside. Although many people do not have USB sockets on their desks, there are a few exceptions. They have high requirements for precise mouse control, and wireless mice still cannot meet their requirements well, so After these people applied, a USB socket was specially left on the table for them to use a wired mouse.
Avandi slowly walked over, took a deep breath, and sweat continued to flow from his forehead.
Even the arm holding the e-cigarette was shaking. I quickly looked around and found that no one was behind me. I immediately pulled out the tail end of the e-cigarette, then squatted down and pulled out the mouse cable from under the electric lift table. Insert the end of the e-cigarette firmly.
…
There is no movement from the dormant host.
This made Avandi sigh in relief. It seems that it should have been recognized as a mouse or keyboard by the host, and by exploiting the vulnerability of the USBHID protocol, no matter what the white man wanted to do, he should have achieved his goal now. He didn't need to worry about anything next. After waiting for more than ten seconds, he pulled out the e-cigarette, returned to its original position, and quickly returned to his desk and sat down.
As if he had done something bad out of guilt, within a few hours, Aiwandi couldn't help but stare at the situation on that desk. When he found that his colleagues had no abnormality, he didn't even notice that his host was being hacked. After moving his hands and feet, he breathed a sigh of relief.
While Aiwandi breathed a sigh of relief, in the storage box a few meters below his feet, the turned-off mobile phone locked in the box by Aiwandi automatically turned on the screen and entered the power-on state.
At the same moment, all the computer monitors in the entire office area began to emit specific electromagnetic wave signals, and the mobile phone that had automatically turned on quickly entered the FM frequency modulation state. A hidden electromagnetic wave network was established almost in the blink of an eye, and pieces of data information were transmitted by the host. Hardware such as graphics cards and monitors are encoded into specific electromagnetic waves to connect to the mobile phone FM.
The mobile phone also connected to the base station network after starting up, and quickly transmitted a series of encrypted data packets through the 4G network.
…
In a private house more than ten kilometers away, Wesco drank a cup of coffee and turned to look at the monitor.
"... Phew, it actually worked."
With a wave of his fist, Wesco couldn't help but feel a little surprised.
"Of course."
The frail man wearing black-rimmed glasses sighed: "I've said it a long time ago. If you still think that the ICS/SCADA monitoring data collection system can be foolproof by physically isolating it from the Internet, you are definitely a fool. Today's technology is changing with each passing day. What about physical isolation? No security technology can protect against the new age of hacker social engineering attacks.”
"But thank you anyway. Without your help, this matter probably won't succeed."
Wesko stood up and patted the frail man on the shoulder: "Tomorrow, the Ronald Enterprise delegation will visit the headquarters of the hard-core technology company, and I will blend in with the delegation, so... can everything be done today?"
"I can't give you an answer."
The frail man stared at the screen, his hands quickly typing on the keyboard.
"You know, this technology of encoding binary data through FM transmission has limitations. I have to try to form a mesh network and see if I can find an Internet interface."
"Okay, I won't disturb you."
Shrugging his shoulders, Wesco did not rush the frail man, and instead walked aside to look through the encrypted data on his phone.
Less than half an hour later, suddenly, the frail man over there shouted: "Okay, it worked. Damn it, this company actually built a three-layer network that is isolated from each other. There is no wireless device to connect to on the core layer." , but fortunately there are still loopholes between the first and second layers.”
The frail man was extremely proud.
"Oh, loophole?" Wesco walked over and asked curiously.
“Although many industrial control networks have proposed various seemingly perfect security measures, they can never eliminate vulnerabilities caused by human errors.”
The frail man explained: "This company designed a three-layer mesh network that isolates employees' work networks, monitoring systems, and core servers from each other. According to the original design, even if we successfully implanted a Trojan, there would be no way Intrusion into the monitoring system. Fortunately, I found that someone seemed a little careless and used his work mobile phone to remotely access the monitoring network system, and also used a secure access mechanism with security holes. Through this connection, I can directly see all monitoring.”
"So, everything goes well?" Wesko smiled.
"Make me another cup of coffee."
The frail man pinched his fingers and said, "The level of automation adopted by this company is simply terrifying... Let me see, well, this is the urban Internet of Things. Hehe, computers have actually taken over all the street lights, surveillance, and tap water. , air conditioning...wait, they actually buried a layer of solar panels in the ground? It's really luxurious, the cost of every ten meters must be at least one million dollars, right?"
"Hey, after saying so much, I'm still sorry."
The man turned around: "Most of them are irrelevant to the Internet of Things. They should have designed several backup emergency power grid systems, and they are all in the core network, so if you expect a power outage at a critical moment, it is probably impossible. ”
"How many spare sets?" Wesko opened his eyes wide.
"Well, there are at least two sets."
The man stretched out two fingers and couldn't help but cursed: "Fu·ck, this company really wastes money, but I have to say that this company's waste of money puts us in trouble because we have nothing to do with their power system. "
Taking the coffee handed over by Wesco, the man took a sip and exhaled: "Now it seems that I can only help you turn off the surveillance."
"Can you see the real-time monitoring?" Wesco said unexpectedly: "Didn't you just say that the transmission speed is limited?"
"Thanks to a few internal idiots, I have built a mesh network, but there is no way to reduce the bit rate and increase the delay. Let me see how many monitoring points there are..."
He hit the Enter key with his index finger, and rows of data suddenly appeared on the display.
"hiss……"
"What's wrong?"
Seeing the frail man gasp, Wesco asked uneasily. (To be continued ~^~)
You'll Also Like
-
Weird Star Witch
Chapter 826 4 hours ago -
Villains of All Worlds: Starting with the Beautiful Vampire Bride
Chapter 135 6 hours ago -
Infinite entries? I become the Zerg Scourge!
Chapter 81 6 hours ago -
End of the World: The materials consumed by women are returned ten thousand times
Chapter 160 6 hours ago -
I'm in Marvel
Chapter 139 6 hours ago -
Family Rise: Start with Daily Intelligence
Chapter 260 8 hours ago -
Dantian has a little field
Chapter 333 8 hours ago -
Evil Path to Longevity, Start with Moving Blood and Bones
Chapter 572 8 hours ago -
My perfect apocalyptic life
Chapter 325 8 hours ago -
Destiny Villain: I can check the script of my life!
Chapter 662 8 hours ago