Reborn Hacker
Chapter 15
I didn't notice it when I turned it on at the beginning, but as the web browsing became stagnant, a flash of inspiration flashed in my mind.
"This computer...has long been someone else's 'broiler'?"
He Ran thought that this directly opened the resource manager, yes, the CPU usage rate is basically 100%, occasionally the mouse does not work, and the Internet speed is super slow.Together, we can be sure that the computer I am using now is someone else's "broiler".
He Ran didn't know how he should feel now, but his mood was very complicated now.As a first-class hacker 10 years later, who also has 10,000+ "bots", the computer I use now turns out to be someone else's "bots". Well, it feels like I was tricked by my colleagues... This analogy may not be true. That's great, at least it's impossible to determine the nature of the person who controls this "broiler" before he has done anything illegal.
He Ran thought: Although this computer cannot be regarded as my own personal computer, if I use a computer here in the future, I will definitely use this one. Trouble, thankfully I haven't been doing much with this computer yet.By the way, when I sent the idea of the blog to Black just now, it didn't seem to be so stuck. That is to say, at the beginning, that person didn't control the computer. To be cautious, let's fix the system loopholes and remember to clean up syslog.But I still have to close those ports first, I am now being bullied by dogs.
Thinking this way, He Ran disconnected the network first, and the CPU usage quickly returned to normal, and then quickly closed all high-risk ports. After that, He Ran quickly wrote a small scanning program, by the way. Scan out other possible vulnerabilities in the computer, and then perform preliminary repairs.After all, those vulnerabilities are likely to have become a backdoor for other hackers to control the computer they use.It is impossible to fix the bugs perfectly in a short period of time, not to mention, it is clear that as long as one bug is fixed, a new bug will appear, that is to say, a truly perfect system cannot exist.Even if it really exists, it is not what he can accomplish now.And what he has to do now is to fix all the loopholes within his current capabilities, the most important thing is to fix the loopholes known to hackers in 95.
Fortunately, during the summer vacation, He Ran sorted out all the program codes he remembered, and then took them out to look at them from time to time, so it was more convenient to fix these loopholes.
After he did everything within his power as quickly as possible, He Ran carefully deleted all traces in the system log about his surfing the Internet and what he did after that, including fixing bugs.
It is definitely very difficult for ordinary people to let the computer out of the fate of "broiler". If He Ran himself is a hacker who is reborn 10 years later and understands the principle of "broiler", he will not find that this computer has become a "broiler". , let alone fix those bugs so quickly.
The one who did this didn't know that it was his operations that could escape the eyes of the hacker who regarded the computer he was using as a "broiler".
Otherwise, just his record of fixing bugs would be enough to make all the current bigwigs in the hacker world jump out. After all, he has also fixed many bugs that hackers don't know about at present.
And any one of these fixed vulnerabilities can definitely be regarded as a one-hit victory in the struggle of hackers.
But the hacker soon discovered that a certain "broiler" of his in country Z was out of his control. After all, He Ran's vigilance is not low. When becoming someone else's "broiler", such a person with such high vigilance is enough to attract the attention of hackers.Therefore, the hacker paid close attention to the Internet access of that IP address afterwards.
From a deeper level of thinking, He Ran guessed that the hacker should have left a back door on this computer, and did not rule out the possibility that other hackers used this computer as a "broiler".He has also fixed some loopholes, but hackers are people who can't think with common sense. Maybe some hacker in a certain corner of the world has discovered loopholes that people have never discovered before, and have never announced it. Such a situation It is very troublesome.
In order to prevent the computer to be used in the future from becoming someone else's "broiler" again, He Ran decided to write the honeypot system when he came here today and tomorrow.The honeypot system, as the name suggests, will definitely give sweetness, but this sweetness is not delicious.The honeypot, that is, the honeypot, is deliberately deployed in a dangerous environment so that it can be attacked, and relative to the purpose of deploying the honeypot, the honeypot has no legal product value, that is, it cannot be used for external normal services.In later generations, the deployment of the honeypot system is a provocation for many hackers, because a great function of this honeypot system is to lure hackers to intrude or attack, and these behaviors will be recorded. There are also people who use the honeypot system to steal the technology of different hackers in later generations, or the hacking software used by hackers. It is simply to catch a turtle in a urn.This is definitely a shame for hackers, and once a honeypot device is discovered, it will easily cause hackers to retaliate.Therefore, it is difficult to define the advantages and disadvantages of using the honeypot system, but in terms of intelligence collection, it is indeed an extremely efficient weapon.
However, the honeypot system has only been proposed for people today, and there is no systematic research. Compared with the subsequent research in the network security field, it is definitely not worth mentioning.Moreover, the honeypot system should be difficult for current hackers to find. After all, even if someone knows the honeypot technology, it must be in its infancy. If special circumstances are excluded, there is 80% certainty that no one will find it. Naturally There is no need to talk about retaliation from hackers.In fact, the vast majority of people will choose to gamble when they have a 50% probability. He Ran has always been a more cautious person. Generally speaking, he will not do that thing without a 60% certainty. of.
Having made up his mind, He Ran didn't go online again, but started writing the program.
On the other hand, the hacker Swagger whose real name is GaryDouglas, who originally had absolute control over the computer, began to pay extra attention to the IP that He Ran logged into.
Until 20:30, He Ran was only half finished, but the time was almost up, so He Ran turned off his computer and prepared to go back to school.
Walking to the small shop in front, I wanted to say hello to Chen Qian before returning, but Chen Qian suddenly asked: "Boy, have you had dinner yet?"
"Ah?" He Ran rubbed his stomach, and then remembered that he rushed here after school and didn't even eat dinner.Hehe smirked, and replied: "No, I forgot."
Chen Qian raised his hand and threw a piece of bread over: "I knew it, here, take it, eat it on the way back. How can students do without eating?"
Quickly took the bread, He Ran smiled and thanked: "Thank you, Brother Chen, then I'm really leaving."
"Let's go." Chen Qian waved his hand.
He Ran finally returned to school at 21:00 when the school evening self-study ended. The main content of life for this day was over.
M国华盛顿1995年09月04日00:03
Although he didn't have much hope for contacting Joe, Xiao Yize still opened the trailblazer website as a routine, read the website letter, and wrote a new letter to Joe.
The moment he saw Joe's letter on the website, Xiao Yize blinked vigorously, and even rubbed it twice afterwards.Yes, that was indeed a letter from Joe!
Xiao Yize couldn't wait to open the letter on the site, and first read the letter that came first, which was the one that mentioned the blog.Xiao Yize once again had the opportunity to see the prospect of this thing in Joe's simple description, and the subsequent list broke the most difficult joint for him.Xiao Yize opened the work plan, put the blog on the agenda, and thanked Joe.Xiao Yize felt warm for Joe's carefulness. Of course, He Ran didn't mean it. He was just thinking about the copyright issue. However, sometimes misunderstandings are beautiful, aren't they?
Although blog cannot be regarded as software, it has very important strategic significance.Xiao Yize could foresee that the release of various information and publicity could rise to a new level after the appearance of the blog.At the same time, he once again hoped that Joe could come to country M to become the company's development consultant, and he also proposed another plan, that is, a remote consultant. Joe will own 2% of Xiao Yize's company shares. It seems very small at present, but no one can underestimate it. Future Appreciation Value.
Feeling grateful, Xiao Yize clicked on the second letter on the site, and saw that there was an inquiry about the development of anti-virus software. Xiao Yize thought of the bottleneck that the developers finally broke through yesterday. Although it was said to be a breakthrough, the details There was still a little problem, Xiao Yize talked about it, and put forward some ideas of his own.As for the fact that Joe said that he would be able to surf the Internet at a fixed time from Monday to Friday, he was particularly happy. Seeing the time written by Joe, he guessed that it was Joe’s time allocation after work (still misunderstood). Xiao Yize, after converting the time, It is found that it is almost the time when the company goes to work every morning in country M.
For the fact that he could continue to contact Joe, Xiao Yize was indeed overjoyed.So much so that when I entered the company the next day, my face was full of spring breeze.It is a pity that due to the hacking incident that He Ran encountered for the first time since his rebirth, that morning was wasted.So that afternoon, President Xiao Yize's mood changed from sunny to... stormy.A tragic afternoon for all employees of the company.
Of course, He Ran wouldn't know, because Xiao Yize would never tell him his negative feelings towards Joe.However, while Xiao Yize was in a bad mood, he was also worried that something happened to Joe, so when he wrote a new letter on the site to "report" his current situation, he asked him if something happened.
The author has something to say: small information:
Broiler
A bot is a computer that has been breached by hackers and planted with a Trojan horse virus. Hackers can manipulate it at will and use it to do anything, just like a puppet.The broiler can be a variety of systems, such as windows, linux, unix, etc., or it can be a server of a company, enterprise, school or even a government army.
No one wants their computer to be controlled by others, but many people's computers are almost defenseless and can easily be completely controlled by remote attackers.Therefore, your computer becomes the meat on other people's chopping boards, and others can eat whatever they want, hence the name broiler (machine).
蜜罐
"A honeypot is a security resource whose value is reflected when it is detected, attacked or destroyed."It can be simulated as an ordinary host in the network or a server that provides a specific service. When an intruder detects or attacks it, it can record the network communication data between the attacker and the honeypot host through background software, and use analysis tools Analyze these data to discover the methods and strategies of attackers to enter the system, and analyze the loopholes and defects of the system accordingly.This makes it possible to discover new attack methods, and then resist this new attack method by reconfiguring the security system.
Firewall
The so-called firewall refers to a protective barrier composed of software and hardware devices, constructed on the interface between the internal network and the external network, and between the private network and the public network. It is an image of a method of obtaining security. It is a combination of computer hardware and software that establishes a security gateway (SecurityGateway) between the Internet and the Intranet to protect the Intranet from illegal users. The firewall is mainly composed of service access rules, verification tools, packet filtering and The application gateway consists of four parts. A firewall is a piece of software or hardware that sits between a computer and the network it is connected to.All network traffic to and from this computer passes through this firewall.
For information on how to identify a computer as a "broiler", avoid becoming a "broiler", and self-rescue after becoming a "broiler", please see: bbs.houdao.com/r2380989_1/ To learn about virtual honeypots, please see: baike.baidu.com/ view/5552876.html For firewall, please see: baike.baidu.com/view/3067.htm
"This computer...has long been someone else's 'broiler'?"
He Ran thought that this directly opened the resource manager, yes, the CPU usage rate is basically 100%, occasionally the mouse does not work, and the Internet speed is super slow.Together, we can be sure that the computer I am using now is someone else's "broiler".
He Ran didn't know how he should feel now, but his mood was very complicated now.As a first-class hacker 10 years later, who also has 10,000+ "bots", the computer I use now turns out to be someone else's "bots". Well, it feels like I was tricked by my colleagues... This analogy may not be true. That's great, at least it's impossible to determine the nature of the person who controls this "broiler" before he has done anything illegal.
He Ran thought: Although this computer cannot be regarded as my own personal computer, if I use a computer here in the future, I will definitely use this one. Trouble, thankfully I haven't been doing much with this computer yet.By the way, when I sent the idea of the blog to Black just now, it didn't seem to be so stuck. That is to say, at the beginning, that person didn't control the computer. To be cautious, let's fix the system loopholes and remember to clean up syslog.But I still have to close those ports first, I am now being bullied by dogs.
Thinking this way, He Ran disconnected the network first, and the CPU usage quickly returned to normal, and then quickly closed all high-risk ports. After that, He Ran quickly wrote a small scanning program, by the way. Scan out other possible vulnerabilities in the computer, and then perform preliminary repairs.After all, those vulnerabilities are likely to have become a backdoor for other hackers to control the computer they use.It is impossible to fix the bugs perfectly in a short period of time, not to mention, it is clear that as long as one bug is fixed, a new bug will appear, that is to say, a truly perfect system cannot exist.Even if it really exists, it is not what he can accomplish now.And what he has to do now is to fix all the loopholes within his current capabilities, the most important thing is to fix the loopholes known to hackers in 95.
Fortunately, during the summer vacation, He Ran sorted out all the program codes he remembered, and then took them out to look at them from time to time, so it was more convenient to fix these loopholes.
After he did everything within his power as quickly as possible, He Ran carefully deleted all traces in the system log about his surfing the Internet and what he did after that, including fixing bugs.
It is definitely very difficult for ordinary people to let the computer out of the fate of "broiler". If He Ran himself is a hacker who is reborn 10 years later and understands the principle of "broiler", he will not find that this computer has become a "broiler". , let alone fix those bugs so quickly.
The one who did this didn't know that it was his operations that could escape the eyes of the hacker who regarded the computer he was using as a "broiler".
Otherwise, just his record of fixing bugs would be enough to make all the current bigwigs in the hacker world jump out. After all, he has also fixed many bugs that hackers don't know about at present.
And any one of these fixed vulnerabilities can definitely be regarded as a one-hit victory in the struggle of hackers.
But the hacker soon discovered that a certain "broiler" of his in country Z was out of his control. After all, He Ran's vigilance is not low. When becoming someone else's "broiler", such a person with such high vigilance is enough to attract the attention of hackers.Therefore, the hacker paid close attention to the Internet access of that IP address afterwards.
From a deeper level of thinking, He Ran guessed that the hacker should have left a back door on this computer, and did not rule out the possibility that other hackers used this computer as a "broiler".He has also fixed some loopholes, but hackers are people who can't think with common sense. Maybe some hacker in a certain corner of the world has discovered loopholes that people have never discovered before, and have never announced it. Such a situation It is very troublesome.
In order to prevent the computer to be used in the future from becoming someone else's "broiler" again, He Ran decided to write the honeypot system when he came here today and tomorrow.The honeypot system, as the name suggests, will definitely give sweetness, but this sweetness is not delicious.The honeypot, that is, the honeypot, is deliberately deployed in a dangerous environment so that it can be attacked, and relative to the purpose of deploying the honeypot, the honeypot has no legal product value, that is, it cannot be used for external normal services.In later generations, the deployment of the honeypot system is a provocation for many hackers, because a great function of this honeypot system is to lure hackers to intrude or attack, and these behaviors will be recorded. There are also people who use the honeypot system to steal the technology of different hackers in later generations, or the hacking software used by hackers. It is simply to catch a turtle in a urn.This is definitely a shame for hackers, and once a honeypot device is discovered, it will easily cause hackers to retaliate.Therefore, it is difficult to define the advantages and disadvantages of using the honeypot system, but in terms of intelligence collection, it is indeed an extremely efficient weapon.
However, the honeypot system has only been proposed for people today, and there is no systematic research. Compared with the subsequent research in the network security field, it is definitely not worth mentioning.Moreover, the honeypot system should be difficult for current hackers to find. After all, even if someone knows the honeypot technology, it must be in its infancy. If special circumstances are excluded, there is 80% certainty that no one will find it. Naturally There is no need to talk about retaliation from hackers.In fact, the vast majority of people will choose to gamble when they have a 50% probability. He Ran has always been a more cautious person. Generally speaking, he will not do that thing without a 60% certainty. of.
Having made up his mind, He Ran didn't go online again, but started writing the program.
On the other hand, the hacker Swagger whose real name is GaryDouglas, who originally had absolute control over the computer, began to pay extra attention to the IP that He Ran logged into.
Until 20:30, He Ran was only half finished, but the time was almost up, so He Ran turned off his computer and prepared to go back to school.
Walking to the small shop in front, I wanted to say hello to Chen Qian before returning, but Chen Qian suddenly asked: "Boy, have you had dinner yet?"
"Ah?" He Ran rubbed his stomach, and then remembered that he rushed here after school and didn't even eat dinner.Hehe smirked, and replied: "No, I forgot."
Chen Qian raised his hand and threw a piece of bread over: "I knew it, here, take it, eat it on the way back. How can students do without eating?"
Quickly took the bread, He Ran smiled and thanked: "Thank you, Brother Chen, then I'm really leaving."
"Let's go." Chen Qian waved his hand.
He Ran finally returned to school at 21:00 when the school evening self-study ended. The main content of life for this day was over.
M国华盛顿1995年09月04日00:03
Although he didn't have much hope for contacting Joe, Xiao Yize still opened the trailblazer website as a routine, read the website letter, and wrote a new letter to Joe.
The moment he saw Joe's letter on the website, Xiao Yize blinked vigorously, and even rubbed it twice afterwards.Yes, that was indeed a letter from Joe!
Xiao Yize couldn't wait to open the letter on the site, and first read the letter that came first, which was the one that mentioned the blog.Xiao Yize once again had the opportunity to see the prospect of this thing in Joe's simple description, and the subsequent list broke the most difficult joint for him.Xiao Yize opened the work plan, put the blog on the agenda, and thanked Joe.Xiao Yize felt warm for Joe's carefulness. Of course, He Ran didn't mean it. He was just thinking about the copyright issue. However, sometimes misunderstandings are beautiful, aren't they?
Although blog cannot be regarded as software, it has very important strategic significance.Xiao Yize could foresee that the release of various information and publicity could rise to a new level after the appearance of the blog.At the same time, he once again hoped that Joe could come to country M to become the company's development consultant, and he also proposed another plan, that is, a remote consultant. Joe will own 2% of Xiao Yize's company shares. It seems very small at present, but no one can underestimate it. Future Appreciation Value.
Feeling grateful, Xiao Yize clicked on the second letter on the site, and saw that there was an inquiry about the development of anti-virus software. Xiao Yize thought of the bottleneck that the developers finally broke through yesterday. Although it was said to be a breakthrough, the details There was still a little problem, Xiao Yize talked about it, and put forward some ideas of his own.As for the fact that Joe said that he would be able to surf the Internet at a fixed time from Monday to Friday, he was particularly happy. Seeing the time written by Joe, he guessed that it was Joe’s time allocation after work (still misunderstood). Xiao Yize, after converting the time, It is found that it is almost the time when the company goes to work every morning in country M.
For the fact that he could continue to contact Joe, Xiao Yize was indeed overjoyed.So much so that when I entered the company the next day, my face was full of spring breeze.It is a pity that due to the hacking incident that He Ran encountered for the first time since his rebirth, that morning was wasted.So that afternoon, President Xiao Yize's mood changed from sunny to... stormy.A tragic afternoon for all employees of the company.
Of course, He Ran wouldn't know, because Xiao Yize would never tell him his negative feelings towards Joe.However, while Xiao Yize was in a bad mood, he was also worried that something happened to Joe, so when he wrote a new letter on the site to "report" his current situation, he asked him if something happened.
The author has something to say: small information:
Broiler
A bot is a computer that has been breached by hackers and planted with a Trojan horse virus. Hackers can manipulate it at will and use it to do anything, just like a puppet.The broiler can be a variety of systems, such as windows, linux, unix, etc., or it can be a server of a company, enterprise, school or even a government army.
No one wants their computer to be controlled by others, but many people's computers are almost defenseless and can easily be completely controlled by remote attackers.Therefore, your computer becomes the meat on other people's chopping boards, and others can eat whatever they want, hence the name broiler (machine).
蜜罐
"A honeypot is a security resource whose value is reflected when it is detected, attacked or destroyed."It can be simulated as an ordinary host in the network or a server that provides a specific service. When an intruder detects or attacks it, it can record the network communication data between the attacker and the honeypot host through background software, and use analysis tools Analyze these data to discover the methods and strategies of attackers to enter the system, and analyze the loopholes and defects of the system accordingly.This makes it possible to discover new attack methods, and then resist this new attack method by reconfiguring the security system.
Firewall
The so-called firewall refers to a protective barrier composed of software and hardware devices, constructed on the interface between the internal network and the external network, and between the private network and the public network. It is an image of a method of obtaining security. It is a combination of computer hardware and software that establishes a security gateway (SecurityGateway) between the Internet and the Intranet to protect the Intranet from illegal users. The firewall is mainly composed of service access rules, verification tools, packet filtering and The application gateway consists of four parts. A firewall is a piece of software or hardware that sits between a computer and the network it is connected to.All network traffic to and from this computer passes through this firewall.
For information on how to identify a computer as a "broiler", avoid becoming a "broiler", and self-rescue after becoming a "broiler", please see: bbs.houdao.com/r2380989_1/ To learn about virtual honeypots, please see: baike.baidu.com/ view/5552876.html For firewall, please see: baike.baidu.com/view/3067.htm
You'll Also Like
-
Tianlong Family's Alternative
Chapter 55 9 hours ago -
Urban fantasy: I am the strongest ancestor
Chapter 62 9 hours ago -
The Foundation's world is exposed, and all the anime characters are broken
Chapter 59 9 hours ago -
I, Yang Jian, join the chat group in Conferred Gods
Chapter 50 9 hours ago -
Siheyuan: Starting at 52, I, He Daqing, will not run away
Chapter 130 9 hours ago -
Reincarnation for All: Start as a chaebol!
Chapter 92 9 hours ago -
Live broadcast of popular science of thunder fruit, the country is crazy about it
Chapter 78 9 hours ago -
I encountered a robber and was mistaken for a gangster despite my calmness
Chapter 51 9 hours ago -
Original Bengtie short video: Top ten character-specific divine songs
Chapter 94 9 hours ago -
Daqin: Zulong was being hunted down, and I met the immortal cultivator
Chapter 68 9 hours ago