Reborn Hacker
Chapter 28
"Can I go to listen together too?!" Liu Haoyuan jumped up knowing that he could go to the special remedial class.
"Yes, I told Teacher Tan for you." He Ran reached out and took a physics tutorial book from the shelf.
The corner of Zhang Sai's mouth twitched slightly: "Chess King, if you want to go, be prepared to be hit."
Liu Haoyuan was immersed in the excitement of being about to enter the elite team at the moment, and selectively ignored this behavior of throwing cold water.
"He Ran, take a look at this code." Qi Zhanhang raised his hand and said to He Ran.
"Code?" He Ran turned his head, then walked towards Qi Zhanhang, "Isn't this in my notebook? What's wrong?"
Qi Zhanhang said seriously: "I saw the exact same code on a certain hacker technology website. This code was manually unpacked from a newly emerged virus and obtained after analysis."
He Ran narrowed his glasses: "I see. I think I know which boring guy did it."
Then He Ran laughed again: "Let's not talk about that, what do you think about the physics competition?"
"Just do what you have to do." Qi Zhanhang's usual answer.
"Sure enough, you would answer like that. If I asked Xu Tao, he would probably have the same reaction as you." He Ran was a little helpless with the temperament of these two people.
"Anyway, the time for the actual competition is still a bit far away. After the deadline, I don't need to worry about this issue for the time being." He Ran tapped his index and middle fingers on the table, "After school starts, I have something new to say, and when the time comes There should be a few more people listening with you, including Xu Tao of course."
"What's new? Why don't you buddy, why only tell 'No.1'." After Liu Haoyuan was excited, he rushed over after hearing a sentence.
Zhang Sai also put down the book in his hand: "To be honest, I always feel that you guys are running a small group."
"I see." Qi Zhanhang replied very simply, ignoring the words of the other two people.
He Ran's temper determined that he would never do the same thing as Qi Zhanhang: "Computer stuff, last semester I met a few students with the same interests in supplementary classes outside, and sometimes we would communicate with each other. It's not that we want to form a small group , but your interest is not in this area, so we can't drag you in."
"In high school, of course study is the most important thing. You do these things in addition to making up classes, so be careful about your grades." Although Zhang Sai's words were a bit harsh, he could still hear a little persuasion.
"Study is of course important, but interest is also very important, for future development." Liu Haoyuan thought of his own chess and "Warcraft", and turned to support He Ran and their actions.
Zhang Sai glared at him and stopped talking.
M country Washington
"Have you booked your flight ticket yet?" Xiao Yize asked Jerry beside him while flipping through the analysis data on the Transcendent virus on the Internet.
That's right, a certain piece of code from He Ran's virus was sent to some hacker technology websites. After being tricked several times in a row, Xiao Yize solved most of the code problems, but there was always a section that couldn't be solved, so You can only continue to get hit.So he thought of posting the code on the Internet and letting other people help solve it together.
"It's been booked, the time is early next month, and the location has been decided in SH City, Country Z."
"I see. In addition, you should pay close attention to the blogging." Xiao Yize nodded and said, "Go and do your work."
Jerry quickly walked out of Xiao Yize's office.
Black: Joe, do you know this code?
Xiao Yize sent the code that could not be analyzed thoroughly.
Joe: I saw it on a certain website, you posted it?
Black: Exactly, but so far no one has an answer for me.
Joe: The core code of a certain virus, what do you want to know about it?
Black: Still that thing.
Joe: Okay, I see.Simply put, this code is used to attack the vulnerability of Notepad.
Black: Vulnerabilities to attack Notepad?
Joe: That's right, until now, the virus model is still under development, and viruses targeting non-operating system vulnerabilities are also a trend.
After being told by Joe, Xiao Yize began to worry about the anti-virus software in his company.
Black: Our upcoming antivirus...
Joe: A little upgrade can solve it.
Xiao Yize paused for a moment, then why did I spend so much effort to find a solution?
Black: Is there a solution?
He Ran "crackling" typed out the patch code and sent it over.
Joe: That's fine.
He Ran has already upgraded his own virus before giving the patch to Black. Of course, the transcendent will not tell XYZ himself.
Black: You've been a huge help to me.By the way, I have never asked you, can you come to the software release meeting?I think you should be in country M.
Because He Ran used Joe Smiths' name at the beginning, Xiao Yize never thought that the other party would be from country Z.
Joe: It's been busy during the day, I'm afraid not.
This answer, He Ran has secretly deepened the concept that Joe is from M country.
Black: Yes, that's really a pity. I also want to see what kind of person can be who can master such a strong computer technology.
Joe: Haha, of course there is one nose, two eyes and one mouth. Do you still expect me to be a monster?
Black: I mean, uh, look at you.
Joe: ...
Country Z 17:33
Joe: Is everyone here?
Xutao: Arrived.
Fly (Li Fei): Arrived.
Zhang (Zhang Xiaodi): Here we are.
Hermit (Zhou Yinzhi): Arrived
Spike (Qi Zhanhang): ...
Seeing Qi Zhanhang's answer, he raised his head to see the speechless gaze he gave him, and then lowered his head and continued typing.
Joe: Let me introduce you now. Fly Li Fei, Zhang Zhang Xiaodi is a senior student of H University of Technology, a hermit Zhou Yinzhi, an office worker. Xutao Xu Tao, Spike Qi Zhanhang, these two are my classmates.
No one else replied, why continue: I gathered you all for the Honker League, and if you know someone with excellent skills and trustworthy character, I will let him join our group after the test .
Hermit: This is a must.
Joe: Other than that, what I'm going to talk about after that is all about technology.At the same time, I will distribute the information, and if you have any questions, you can ask them here.Note, only in this chat room.
Qi Zhanhang knocked on the table.
"Of course, you can do whatever you want. We meet every day, so you can ask me whatever you want."
Qi Zhanhang nodded to express his satisfaction.
Joe: What I'm going to talk about this time is SQL database injection attacks.
……
SQL injection attack has not been proposed in 96, but it is clear that this attack will become the basic attack method of hackers in the future.
SQL injection attacks are relatively easy to use. For a simpler one, you can guess the user name and password directly by adding some code after the URL of the website.A little more complicated ones can directly change the user name and password through some code, that is to say, directly seize the authority through injection.Once you become an administrator, the database will no longer have the function of confidentiality.If it is an enterprise database, then you have to bear the consequences of customer information being stolen.
Of course, He Ran already has a more powerful method, and this method is also one of the theories that were proved at the beginning: detached virtual management.But this method is too advanced, and its coding language is brand new, why can't it be taught to these people yet.
Detached virtual management is to use the virtual highest management authority to directly bypass the background authority settings and enter the database to automatically generate a virtual management account, and then perform related actions.Why is the brand-new writing language named: zero language, because programs written in this language cannot be compiled except for specific decoding tools and decoding methods. At the same time, programs that have not been compiled will be automatically hidden after writing. After the management platform, it means that these programs do not exist unless they are activated.
The writing method of zero language is much more convenient and flexible than the known languages, and it is also more confidential.However, the zero language was just completed by He Ran when he graduated from graduate school. This language still has many unknown defects.
Perhaps zero language does have the ability to change the entire network, but an imperfect zero language will only collapse the order of the network, why not take risks.
Before He Ran was reborn, he just used zero language to write a small program for detached virtual management, and it was realized on the basis of some experts' theories.The reason why those experts did not realize it was that their thinking was solidified by the C language. At some point, the C language is not flexible enough, and it will fall into an endless loop for ambiguous commands.The biggest advantage of zero language is its flexibility. In a sense, zero language may become the exclusive language of the intelligent age.
After this lecture, Li Fei and others raised many questions, and He Ran answered them one by one.
In order to better select the technicians who enter the chat room, He Ran sent the designed assessment content to Li Fei and Zhang Xiaodi, two relatively free people.
The content of the assessment is three levels. The first level is to break through the defense of Swagger's computer (Why didn't you say hello to Swagger), the second level is to write a program by yourself, the program type is not limited, you can get the score by directly inputting the source code, A score of 40 or above is considered a pass (currently the highest standard is a mobile program written by He Ran), and the last technical level is to pass He Ran's exam questions. There is no definite answer. This paper is only for assessing people who take the exam. Whether it has the idea of technological innovation.After all these have passed, He Ran will test his character. The basic method is to invade the other party's computer, and He Ran's monitoring Trojan horse will screen the text operators, etc., and various operations in various computers. At the same time, this kind of monitoring will not directly feed back the monitored specific content to the monitor, but will only feed back the behavior that violates the hacker's principles or violates moral regulations and laws during the monitoring. Once such feedback occurs, the exam People will lose the qualification to enter the chat room.
The purpose of He Ran is to let the core Honker Alliance members have a clear sky in the future, and members who know that they cannot manage the entire website, but the decision-making of the core personnel is absolutely not allowed to make mistakes.
The author has something to say: small information:
壳
From a technical point of view, a shell is a piece of code that runs before the original program.The code of the original program may be compressed and encrypted during the packing process... When the packed file is executed, the shell-this code runs before the original program, and it restores the compressed and encrypted code to the original program code , and then return execution to the original code.The shells of the software are divided into encryption shells, compression shells, camouflage shells, multi-layer shells, etc. The purpose is to hide the real OEP (entry point) of the program and prevent it from being cracked.
想了解脱壳,请看:baike.baidu.com/view/528311.htm1998年12月,RainForestPuppy(RFP)在Phrack54上发表文章“NTWebTechnologyVulnerabilities”,首次提到SQL注入2000年2月,RFP发表文章“HowIhackedPacketstorm–AlookathackingwwthreadsviaSQL”,披露如何利用SQL注入攻击渗透Packetstorm网站;“SQL注入”的前世今生和防御思路:www.techweb.com.cn/news/2010-10-25/704004.shtml——————————————
"Yes, I told Teacher Tan for you." He Ran reached out and took a physics tutorial book from the shelf.
The corner of Zhang Sai's mouth twitched slightly: "Chess King, if you want to go, be prepared to be hit."
Liu Haoyuan was immersed in the excitement of being about to enter the elite team at the moment, and selectively ignored this behavior of throwing cold water.
"He Ran, take a look at this code." Qi Zhanhang raised his hand and said to He Ran.
"Code?" He Ran turned his head, then walked towards Qi Zhanhang, "Isn't this in my notebook? What's wrong?"
Qi Zhanhang said seriously: "I saw the exact same code on a certain hacker technology website. This code was manually unpacked from a newly emerged virus and obtained after analysis."
He Ran narrowed his glasses: "I see. I think I know which boring guy did it."
Then He Ran laughed again: "Let's not talk about that, what do you think about the physics competition?"
"Just do what you have to do." Qi Zhanhang's usual answer.
"Sure enough, you would answer like that. If I asked Xu Tao, he would probably have the same reaction as you." He Ran was a little helpless with the temperament of these two people.
"Anyway, the time for the actual competition is still a bit far away. After the deadline, I don't need to worry about this issue for the time being." He Ran tapped his index and middle fingers on the table, "After school starts, I have something new to say, and when the time comes There should be a few more people listening with you, including Xu Tao of course."
"What's new? Why don't you buddy, why only tell 'No.1'." After Liu Haoyuan was excited, he rushed over after hearing a sentence.
Zhang Sai also put down the book in his hand: "To be honest, I always feel that you guys are running a small group."
"I see." Qi Zhanhang replied very simply, ignoring the words of the other two people.
He Ran's temper determined that he would never do the same thing as Qi Zhanhang: "Computer stuff, last semester I met a few students with the same interests in supplementary classes outside, and sometimes we would communicate with each other. It's not that we want to form a small group , but your interest is not in this area, so we can't drag you in."
"In high school, of course study is the most important thing. You do these things in addition to making up classes, so be careful about your grades." Although Zhang Sai's words were a bit harsh, he could still hear a little persuasion.
"Study is of course important, but interest is also very important, for future development." Liu Haoyuan thought of his own chess and "Warcraft", and turned to support He Ran and their actions.
Zhang Sai glared at him and stopped talking.
M country Washington
"Have you booked your flight ticket yet?" Xiao Yize asked Jerry beside him while flipping through the analysis data on the Transcendent virus on the Internet.
That's right, a certain piece of code from He Ran's virus was sent to some hacker technology websites. After being tricked several times in a row, Xiao Yize solved most of the code problems, but there was always a section that couldn't be solved, so You can only continue to get hit.So he thought of posting the code on the Internet and letting other people help solve it together.
"It's been booked, the time is early next month, and the location has been decided in SH City, Country Z."
"I see. In addition, you should pay close attention to the blogging." Xiao Yize nodded and said, "Go and do your work."
Jerry quickly walked out of Xiao Yize's office.
Black: Joe, do you know this code?
Xiao Yize sent the code that could not be analyzed thoroughly.
Joe: I saw it on a certain website, you posted it?
Black: Exactly, but so far no one has an answer for me.
Joe: The core code of a certain virus, what do you want to know about it?
Black: Still that thing.
Joe: Okay, I see.Simply put, this code is used to attack the vulnerability of Notepad.
Black: Vulnerabilities to attack Notepad?
Joe: That's right, until now, the virus model is still under development, and viruses targeting non-operating system vulnerabilities are also a trend.
After being told by Joe, Xiao Yize began to worry about the anti-virus software in his company.
Black: Our upcoming antivirus...
Joe: A little upgrade can solve it.
Xiao Yize paused for a moment, then why did I spend so much effort to find a solution?
Black: Is there a solution?
He Ran "crackling" typed out the patch code and sent it over.
Joe: That's fine.
He Ran has already upgraded his own virus before giving the patch to Black. Of course, the transcendent will not tell XYZ himself.
Black: You've been a huge help to me.By the way, I have never asked you, can you come to the software release meeting?I think you should be in country M.
Because He Ran used Joe Smiths' name at the beginning, Xiao Yize never thought that the other party would be from country Z.
Joe: It's been busy during the day, I'm afraid not.
This answer, He Ran has secretly deepened the concept that Joe is from M country.
Black: Yes, that's really a pity. I also want to see what kind of person can be who can master such a strong computer technology.
Joe: Haha, of course there is one nose, two eyes and one mouth. Do you still expect me to be a monster?
Black: I mean, uh, look at you.
Joe: ...
Country Z 17:33
Joe: Is everyone here?
Xutao: Arrived.
Fly (Li Fei): Arrived.
Zhang (Zhang Xiaodi): Here we are.
Hermit (Zhou Yinzhi): Arrived
Spike (Qi Zhanhang): ...
Seeing Qi Zhanhang's answer, he raised his head to see the speechless gaze he gave him, and then lowered his head and continued typing.
Joe: Let me introduce you now. Fly Li Fei, Zhang Zhang Xiaodi is a senior student of H University of Technology, a hermit Zhou Yinzhi, an office worker. Xutao Xu Tao, Spike Qi Zhanhang, these two are my classmates.
No one else replied, why continue: I gathered you all for the Honker League, and if you know someone with excellent skills and trustworthy character, I will let him join our group after the test .
Hermit: This is a must.
Joe: Other than that, what I'm going to talk about after that is all about technology.At the same time, I will distribute the information, and if you have any questions, you can ask them here.Note, only in this chat room.
Qi Zhanhang knocked on the table.
"Of course, you can do whatever you want. We meet every day, so you can ask me whatever you want."
Qi Zhanhang nodded to express his satisfaction.
Joe: What I'm going to talk about this time is SQL database injection attacks.
……
SQL injection attack has not been proposed in 96, but it is clear that this attack will become the basic attack method of hackers in the future.
SQL injection attacks are relatively easy to use. For a simpler one, you can guess the user name and password directly by adding some code after the URL of the website.A little more complicated ones can directly change the user name and password through some code, that is to say, directly seize the authority through injection.Once you become an administrator, the database will no longer have the function of confidentiality.If it is an enterprise database, then you have to bear the consequences of customer information being stolen.
Of course, He Ran already has a more powerful method, and this method is also one of the theories that were proved at the beginning: detached virtual management.But this method is too advanced, and its coding language is brand new, why can't it be taught to these people yet.
Detached virtual management is to use the virtual highest management authority to directly bypass the background authority settings and enter the database to automatically generate a virtual management account, and then perform related actions.Why is the brand-new writing language named: zero language, because programs written in this language cannot be compiled except for specific decoding tools and decoding methods. At the same time, programs that have not been compiled will be automatically hidden after writing. After the management platform, it means that these programs do not exist unless they are activated.
The writing method of zero language is much more convenient and flexible than the known languages, and it is also more confidential.However, the zero language was just completed by He Ran when he graduated from graduate school. This language still has many unknown defects.
Perhaps zero language does have the ability to change the entire network, but an imperfect zero language will only collapse the order of the network, why not take risks.
Before He Ran was reborn, he just used zero language to write a small program for detached virtual management, and it was realized on the basis of some experts' theories.The reason why those experts did not realize it was that their thinking was solidified by the C language. At some point, the C language is not flexible enough, and it will fall into an endless loop for ambiguous commands.The biggest advantage of zero language is its flexibility. In a sense, zero language may become the exclusive language of the intelligent age.
After this lecture, Li Fei and others raised many questions, and He Ran answered them one by one.
In order to better select the technicians who enter the chat room, He Ran sent the designed assessment content to Li Fei and Zhang Xiaodi, two relatively free people.
The content of the assessment is three levels. The first level is to break through the defense of Swagger's computer (Why didn't you say hello to Swagger), the second level is to write a program by yourself, the program type is not limited, you can get the score by directly inputting the source code, A score of 40 or above is considered a pass (currently the highest standard is a mobile program written by He Ran), and the last technical level is to pass He Ran's exam questions. There is no definite answer. This paper is only for assessing people who take the exam. Whether it has the idea of technological innovation.After all these have passed, He Ran will test his character. The basic method is to invade the other party's computer, and He Ran's monitoring Trojan horse will screen the text operators, etc., and various operations in various computers. At the same time, this kind of monitoring will not directly feed back the monitored specific content to the monitor, but will only feed back the behavior that violates the hacker's principles or violates moral regulations and laws during the monitoring. Once such feedback occurs, the exam People will lose the qualification to enter the chat room.
The purpose of He Ran is to let the core Honker Alliance members have a clear sky in the future, and members who know that they cannot manage the entire website, but the decision-making of the core personnel is absolutely not allowed to make mistakes.
The author has something to say: small information:
壳
From a technical point of view, a shell is a piece of code that runs before the original program.The code of the original program may be compressed and encrypted during the packing process... When the packed file is executed, the shell-this code runs before the original program, and it restores the compressed and encrypted code to the original program code , and then return execution to the original code.The shells of the software are divided into encryption shells, compression shells, camouflage shells, multi-layer shells, etc. The purpose is to hide the real OEP (entry point) of the program and prevent it from being cracked.
想了解脱壳,请看:baike.baidu.com/view/528311.htm1998年12月,RainForestPuppy(RFP)在Phrack54上发表文章“NTWebTechnologyVulnerabilities”,首次提到SQL注入2000年2月,RFP发表文章“HowIhackedPacketstorm–AlookathackingwwthreadsviaSQL”,披露如何利用SQL注入攻击渗透Packetstorm网站;“SQL注入”的前世今生和防御思路:www.techweb.com.cn/news/2010-10-25/704004.shtml——————————————
You'll Also Like
-
Devil Fruit Era: I have maxed out my Armament Haki Ryusakura
Chapter 185 6 hours ago -
You were asked to be a conscript, but you created The Matrix
Chapter 158 6 hours ago -
Gao Wu: I am invincible now that I have connected to the Immortal Gate.
Chapter 266 6 hours ago -
Battle of the Other Worlds: Summon the Traveler Wu Song at the Beginning
Chapter 200 6 hours ago -
Martial Arts: I am in the Valley of Unrequited Love, I am invincible by touching corpses
Chapter 122 6 hours ago -
The Great Lord of the World
Chapter 302 6 hours ago -
Review of tomb raiding: The top ten treasures shocked Lao Hu
Chapter 213 7 hours ago -
Hong Kong Movie: I am a police hero with a supernatural power
Chapter 201 9 hours ago -
Watching Ke Xue’s video, it was revealed that Shinichi cannot take the civil service exam?
Chapter 335 9 hours ago -
Entertainment: Is anatomy more professional than forensic medicine? Check it out
Chapter 247 9 hours ago