Chapter 250: The Dragon is Roaring for a Fatal Strike
Text [The Matrix] Chapter 250 The dragon is roaring, a fatal blow-
-
At 1 a.m. China time, the 100,000 account registration quotas for "Growth" that were opened today were still sold out. At this time, the number of people online still reached more than 300,000, because many people have to go to work. If you play until so late,
If you do, you will be late for work, and your time in "Growth" will also be reduced. Another reason is that "Growth" stipulates that the game time is only three hours a day.-
If you don’t get real rewards, you can’t continue playing, so people nowadays have developed a habit of working hard during the day, and starting playing after dinner, until the game time is used up for the day. Now except Huang Fei
The fierce battle value in the game has reached more than 300 points, and the second place is only 158 points. This is the distance, so the game character Huang Fei has gradually become known to everyone, and of course he has also been admired by many female players. If Huang Fei
Now that you're online, you're sure to see a lot of friend requests.-
But this night is destined to be busy. After China Internet was hit by a smart virus craze before, although it has been relatively blocked, another problem has been exposed on this seemingly calm network. The Shanghai Stock Exchange website is in
In the eyes of Chinese netizens, everything is normal. They go online to search for information and express their opinions, but behind this normalcy is a showdown between force and hardness. -
m country x organization headquarters in Los Angeles.-
"No, the previous six common vulnerabilities have all been fixed!" Gypsy said.-
"I'll do it, I'll use this sa to elevate my power." Meka interjected, but this sentence was recognized by everyone.-
"This server is managed using a SQL database. I believe I can try to use the sa account to escalate privileges here." After Meka finished speaking, he immediately opened a SQL analysis tool.-
The sa account of sql is the system administrator account. If a hacker exploits the site's injection vulnerability, it is easy to obtain the highest authority of the system. Once the hacker obtains the highest authority, he can use injection tools such as nbsi to create a system account and use port 3389.
Log in remotely, and the skill in this area is the sa injection attack form.-
In the past few years, most online games at home and abroad were hacked by hackers using sa injection vulnerability techniques.-
"No way, the server has prohibited the creation of the account with sa permission. 'God' must have done something." Meka spread his hands helplessly. After thinking for a while, Meka continued: "I will try dbowner and public privileges again.
See if you can!" (The order of sql permissions is sa, dbowner, public. The main form of hacker intrusion in dbowner is differentiated backup technology. This is when hackers use the backup function of the database to put some
In one sentence, the Trojan is backed up to a designated directory through the database, and then the web Trojan is uploaded through the c/s Trojan, and then the web Trojan is used to escalate privileges and obtain system permissions. Finally, this public may also be used by hackers, and hackers use this permission.
Only databases can be listed, so in this form hackers will list the backend account and password, and then use the backend to upload web Trojans to achieve the purpose of elevating privileges. Xiaozhi read this from a book, although he has tried it before, but that is
In the third grade of junior high school!)-
After a while, Meka wiped the sweat from his forehead and said, "Damn it. The seventh vulnerability SQL privilege escalation failed! It's too tight. Several common killing loopholes are ineffective on this server!" Meka couldn't help but sigh.
.-
Pace shook his head, "If we continue like this, we will definitely not get the permissions of the server. After all, the person inside the server is 'God', and everyone knows his skills. If you want to get permissions from him, just
To use alternative methods, he must have known our common intrusion techniques, and it must be very simple to find a way to resist!!" -
Everyone agreed with Pace's statement, because it is indeed true.-
"Let me do the 8th vulnerability! I will modify the invasion." Pace said.-
"No problem, we will cooperate with you together." Meka responded, and others also explained their opinions one after another.-
Huang Fei looked at the feedback data one by one. As he expected, they would definitely use several common vulnerabilities in the Windows server system to invade. But how could Huang Fei not know about the vulnerabilities they could find? Huang Fei could find the common vulnerabilities.
There can be more than 20 vulnerabilities, and 8 is not enough for him. But when he saw that the other party actually used a bypass method to escalate his privileges, he was a little surprised. -
I saw Pace open a tool called sd. This tool can analyze and scan all open service ports, connection lines and access paths of the other party's server. After 3 minutes of scanning, Pace only saw that there was only one exploitable server.
The port is port 80.-
Port 80 is open for http (hypertext transport protocol), which is the hypertext transfer protocol. This is the most commonly used protocol for surfing the Internet. It is mainly used for www (worldwideweb), the protocol for transmitting information on the World Wide Web. We
You can access the website by adding ":80" to the http address (often referred to as "website address"). For example, because the default port number for browsing web services is 80, you only need to enter the URL instead of ":80".
.[Excerpted from Encyclopedia] And this port is enough for Pace to modify and utilize.-
Pace first visited the Shanghai stock market website normally, and also added: 80 after the domain name. After it became accessible, Pace immediately opened a port tool he wrote, entered the server's IP address, and then the software continued to
Accept packets intercepted from port 80. Because it is an open service, a lot of server information is exposed at a glance.-
What Pace wants to collect is not how to invade this server, but to seize the administrator's account, because his software sends normal traffic and the server will not reject it. Then he can monitor port 80, and as soon as the member logs in, he will
You can intercept the member's account password. Although the password is encrypted with md5, organization x has the largest rainbow table in the world. It is the easiest to crack the password md5! (Rainbow table is
A huge set of pre-calculated hash values for various possible letter combinations. It is not necessarily for the md5 algorithm. There are various algorithms. With it, all kinds of passwords can be quickly cracked. The more complex it is.
The larger the password, the larger the rainbow table required. Nowadays, the mainstream rainbow tables are more than 100g. The mainstream md5 cracking website is. If you need to crack the md5 password, you can find Xiaozhi. Xiaozhi has a member account!)-
But after 5 minutes, Pace saw that the traffic coming through had not changed at all, and he felt a little impatient. Now on the other side, Huang Fei was quickly inputting the code, and a century-old attack tool was about to be born.-
After another 5 minutes, "Boss, it failed! The use of the eighth vulnerability failed, there is no way, the damn 'God' is too powerful!" Gypsy looked at Pace's screen and said.-
Iverson's face was very gloomy. It had been nearly two hours since the confrontation, and Organization
, to take down such a server requires at least 50TB of traffic! We only have so many broilers under our control, I want to see how this 'God' can resist this simplest method!!" Iverson laughed. -
"Boss, do you really want to use ddos? Doesn't this mean in front of everyone that we have failed in the solo confrontation with 'God'?" Meka was a little reluctant...-
"Meka, there is no other way. Time is very tight. For the development of the organization, we must prevent China's stock market from opening online tomorrow!" Iverson explained.-
Seeing that Iverson was so determined, Meka was too embarrassed to persuade him, so he nodded. -
"Boss, AT&T transferred 50TB of traffic to us. Are you sure we want to attack their servers?" Gypsy asked.-
"50TB is nothing to the world's largest telecom operator. After all, we are forced to use it!!" Iverson said.-
10 minutes later, just when Iverson was about to give the order to start the attack, something surprising happened.-
The first was Pace's computer, because he was still connected to the data interception software at this time. A broken phantom first appeared on his computer screen, and then began to flash and flash, and then four big words appeared on the screen, "Game"
Finish!"-
Subsequently, Pace's computer hard drive began to be formatted quickly, and Huang Fei was now constantly sending the formatted decomposition program to that IP. When the tool showed success, Huang Fei pointed the IP to the next one.-
"Oh, oh, oh!!" Pace kept making sounds in his mouth, but he was speechless. He was shocked when he saw that his computer hard drive was instantly formatted. -
Subsequently, within just 1 minute, all the computer hard drives of all members of organization x were formatted one after another..-
Iverson watched this scene and stayed where he was. He didn't take any action. He just stared at the screen, watching the error messages popping up on the computer, watching the computer system being deleted, and watching the computer being shut down.
Because he knew that this time the shutdown would never start again.-
"Ah!!!!" Meka grabbed the monitor on the table and smashed it to the ground. The 24-inch monitor was instantly cracked and the screen was completely shattered. -
But this is just one of them. Other members of Organization
"Ah, ah, ah!!" Meka, with tears in her eyes, desperately picked up everything on the table and threw it against the wall. No one came out to stop it, because everyone thought it was just an illusion and this could not happen.
thing.-
Iverson suddenly vomited a mouthful of blood, then covered his heart with both hands, fell to the ground, trembling all over, he had a heart attack...-
Pace stood up from his chair blankly, looked at the others expressionlessly, and then his eyes jumped back to his computer. Then, he yelled, suddenly grabbed the monitor with both hands, and smashed it like Meka.
On the ground..-
Although Meka's palm was scratched, he didn't feel anything and still smashed things desperately...-
The entire x organization changed from a harmonious atmosphere at the beginning to chaos. 20 minutes later, when the ambulance crew came here and saw the broken computer accessories on the ground, they couldn't help but be shocked, but they still carried Iverson up.
Got the stretcher..-
"It's over." Pace said calmly after watching the ambulance drive away downstairs.-
"It's over, we can't fight him!" Meka also walked to the window and said with a smile. Then he handed Pace a cigarette, who took the cigarette politely and put it in his mouth. -
"I want to go to China! Do you want to go?" Meka continued.-
Pace turned to look at Meka, and the two looked at each other, "I don't want to go! If you have any news, tell me. I like a free life." Pace patted Meka on the shoulder. -
After hearing this, Meka suddenly picked up a computer accessory on the ground and threw it out the window. Then, there was a crisp sound of glass breaking. -
"Haha." "Haha!" Meka and Pace held their shoulders and laughed out the window. When the members of the x organization inside looked at them laughing, they also laughed... -
The whole network monitoring room of China Network Information Department.-.
"Team leader, 'God' exited the server! And left a message inside." A technician from the China Internet Information Department said to Li Hua.-
Li Hua was still in a daze, but the technician's words woke him up. He smiled and asked in surprise: "What did 'God' say?" -
"The dragon is roaring, one blow is fatal!" the technician replied...-
In an ordinary house in M City, China.-
Huang Fei looked at the tool codenamed "x" on the screen and shook his head helplessly, "Organization
..-
【Volume 1】End-
ps: To be honest, when Xiaozhi was writing these chapters, he really thought that he was about to reach a bottleneck and it was extremely difficult to write. Finally, he finally wrote it down! The first volume was also completed according to the route he requested.
But I will ask, why is it over? Isn’t there still the European Black Alliance and other hacker organizations? Haha! Those will continue to appear in the following chapters! Xiaozhi confirms to everyone that in the second volume, this book
It will definitely be more exciting! I also have good news for everyone. This book will be officially on the book recommendation list on the homepage at 17:30 tomorrow, for one week! Don’t forget to use your VIP tickets and recommendation tickets.
Chapter completed!