Chapter 359: Dragon’s Howl! Part 2
Text [Rise of Dragon] Chapter 359: Dragon's Howl! (Part 2) Since this is Chang Ling'er's office computer, generally a larger company will buy the enterprise version of those genuine antivirus software (with intranet firewalls, etc.), while Chang Ling'er's company has purchased an old domestic antivirus software and the enterprise version of Ruix antivirus software. Huang Fei couldn't help but feel a little depressed. The virus database update of this antivirus software is relatively slow. Many Trojans can pass by just modifying the text or using the tool to offset the base address.
For example, the simplest 00 shift (filling) method is to add spaces to the program's compilation code, and then use some 16-banned modifiers (such as ultraedit, which is more famous in China), switch to the hexadecimal editing mode after opening, and you can see that you just need to modify the characters corresponding to the found antivirus software feature code. If it still doesn't work after modification, add a space, the hexadecimal code characters of the space are 20, and then replace all 20 with 00. In this way, the antivirus software has been passed. This method is still the mainstream method of dealing with this soft-killing method!
Huang Fei shook his head. After opening the browser, the ie browser did not have any prompts. The website was obviously hacked by China hackers, but now it shows the status of being attacked by cc. Huang Fei saw the trick. The firewall installed on this computer still cannot resist the penetration of the Trojan horse, but was intercepted by Huang Fei's tool that was bound to the directory of the system. As long as there is any file read or if you try to create a new program in it, you must bypass the tool to succeed. However, if it is intercepted, the tool will automatically decompose the program and then appear on the tool's intercept list. You can open the intercept list and analyze and edit the program. No format cannot be edited in any form. This can also be said to be a simple firewall of Huang Fei.
After the extremely penetrating Trojan virus was intercepted, Huang Fei immediately opened the intercept list. The rooted virus will permanently take root in the system and infect all .exe executable programs. Huang Fei immediately used the tools to harmoniously use the kindergarten version of the flower instructions, and then opened another tool, which is his proud work, "Cloud Virus Maker", a virus product ten years later, 15 years later than the "cloud detection" of computer antivirus software.
The so-called "cloud virus" is similar to the "cloud investigation and killing plan", which is a virus that can be managed in the background!
Huang Fei used the decomposition and transmission technology to analyze the source of the Trojan virus and found that someone used the virus released by the server of the Yuguo Yasukuni Shrine. Huang Fei opened the browser again and entered the website again. The person tool bundled the system blocked the Trojan again intercepted the Trojan again. That is, when intercepting, Huang Fei clicked on the scan of the "Cloud Virus" maker, and soon a original address came out, a server in Alaska.
It was the M national who was making trouble again. Huang Fei frowned slightly. It seemed that the incident this time must have been caused by the M country to instigate Yuguo to do it. The Prime Minister of Yuguo only visited China a few months ago and said he wanted to increase economic cooperation with China. Now he turned against him and refused to accept the people. He said he would catch the fishing boats in China and would not release him.
After Huang Fei found the address, he did not intend to invade the computer of the IP segment. Huang Fei secretly transmitted the "cloud virus" Trojan horse through the network of the National Network Connection Department to the computers of the entire National People's Republic of China. If someone knew about this action, it would drive them crazy.
All the online computers of Yuguo have become one person's broiler, and this number can be so scary, but Huang Fei would not do such a thing, or to be more precise, it should be disdainful. Although Yuguo's network fluency is better than that of China, Yuguo's people's thoughts are too dirty. Huang Fei decided to use it and let people all over the world see how Yuguo deals with M. This is the consequence of angering China's "God". The dragon's howl is about to explode.
Huang Fei first used the "cloud virus maker" to create a new virus sample, and added restrictions on the previous cloud decomposition of viruses. After successfully creating it, Huang Fei directly opened major websites in Japan with multiple browser windows, and then secretly replaced the virus. "It automatically excludes the IP segments of China. When it encounters the IP "cloud virus" in Japan, it will automatically invade their computers, and then automatically generate a hidden folder on the D disk!" Huang Fei also called this virus "sandwich biscuits"!
In an Alaska cybersecurity organization.
A Chinese man wearing a baseball hat was chewing gum in his mouth. He looked at the computer in front of him. Because he received the notice that he would hang up after obtaining the permissions of several websites in Japan, he didn't care. Looking at the quickly refreshed data on the screen, he smiled proudly. These were computers destroyed by his virus. In his eyes, Chinese hackers were just hooligans and used ddos to attack other people's websites. There was no big technology. And the most important thing now is that the "God is a fool" that made him afraid has disappeared. Without him, no one will be afraid.
However, the IP displayed by the data has obviously changed slowly. The IP segment that was originally China has now become the IP segment of Japan. With his confusion, he reopened the websites, but unknowingly, the heuristic virus has taken root on his computer.
"Brother Wen, the computer in the cloud cannot be turned on! Grandma's Chinese people hang up horses on their website!" Qingfeng said anxiously.
"We were caught off guard. I almost got caught in my computer. Everyone, retreat quickly and follow my command. Qingfeng, you can continue!" Yu Wen shouted to the microphone.
Then, all the websites controlled by the Sword Alliance returned to normal. As expected, the people of the Chinese were indeed insidious.
After learning about this, Xiaorong originally wanted to inform the Hongkes, but someone had already reminded him on the Hongkes forum! Seeing that the second wave of offensive was about to be resolved by the people of the Japanese, "God" finally took action.
Huang Fei gently pressed the Enter key, then clicked the start of the system, and he chose to shut down because his program will not be kept here. As long as the power is shut down, the program will be automatically cleared. Of course, as long as it is pressed to start, the background on the server that Huang Fei borrowed from Tencent will be started, so Huang Fei will not need to operate it at all. With this press, the most harmful and fastest-propagating virus in the world, "Yumei Storm" appeared. This name was the name given to it by the antivirus software company in M Country later!!
"Hey, are you asleep?" Huang Fei moved Tao Peixi.
The latter opened his eyes slightly, "Are you finished your work?" Tao Peixi looked at Huang Fei and asked.
At this time, Tao Peixi also woke up Chang Ling'er, who was also confused. Huang Fei looked at the two women and smiled, "Thank you, I'll treat you to dinner next time!" Huang Fei said.
"You've done it, right? Then will it be on my computer?" Chang Ling'er asked in confusion.
"Don't worry about this. I have restored my previous operation and there will be no files left!" Huang Fei said.
Chang Ling'er nodded, because she believed it because she saw Huang Fei's proficient operation of the computer before.
"Let's go back?" Tao Peixi leaned on Huang Fei's shoulder, looking very tired.
"Oh, okay! Let's go to the five-star hotel opposite!" Huang Fei smiled...
Then, several people walked out of the company...
The website of the Ministry of National Defense of M Country was the first to sound an alarm, and most of the web pages were hung with Trojans. No one knew when the hackers came in.
The Alaska hacker was still nervously repairing the Trojan virus. However, his computer has lost the screen now, and the pixels suddenly fell to the lowest point, creating snowflakes. Oh my God, this is the latest display screen. How could such a thing happen? But it is obvious that he turned off the computer and turned on it again. The picture started very normal. However, after the progress bar of the Windows system was read, a grimace appeared on his screen, which scared him so much that he fell off the chair.
"How could this happen!" He restarted the machine again, but it was still the same. He finally knew that his computer was infected with a virus, but this virus was obviously not his. His virus did not have such functions. He just tested it on a virtual machine and had not yet connected to the host network. How could it be poisoned? It is conceivable how powerful the penetration of this virus is.
"What's going on?" Data from the Internet Center Building in New York, M country showed that a large number of Japanese IPs visited M country's websites, and a large number of Japanese people began to invade or attack M country's websites.
"When did the Japanese people become so powerful?" A cyber officer from M country was a little surprised after looking at the websites with the Japanese flag on them.
"Impossible, impossible! How could the Japanese people have so many such powerful hackers? Are they crazy?" Peter's face suddenly darkened after receiving the news, and he shouted at the assistant beside him.
Chapter completed!