HK1294 Exposure and Stealing, Breaking the Waves and Fighting Pirates!(1/2)
.
July 28, afternoon. Jing Yayuan.
Even if the internal network is isolated from the Internet, it still cannot stop Shi Lei's invasion. It must be said that Shi Lei accepted the Xuanhuang Thieves Group before, which was definitely a very wise decision.
After easily obtaining AMIMON's WHDI technical information, Shi Lei did not intend to secretly apply it in VR game helmets, but logged into the official website of BBC TV.
Shi Lei hacked the official website of BBC TV station by controlling the web server, and then published an announcement on the homepage of the official website.
The title of the announcement is "WHDI.For.Free!", which means 'free WHDI technology'.
In the announcement, Shi Lei used English to reprimand the Israeli company AMIMON, accusing AMIMON of being a technology monopoly company that has obtained a large amount of monopoly benefits through WHDI technology.
Therefore, as an anonymous hacker, I have the responsibility to stop AMIMON’s ugly behavior and publish AMIMON’s WHDI technical information to the world.
In addition to the official website of BBC TV, Shi Lei also published the same announcement information on major social networking sites and news portals around the world, announcing WHDI technology to the world.
Because Shi Lei used an anonymous identity and Shi Lei's skills were very good, even experts at the same level did not know who leaked AMIMON's core confidential information.
After the WHDI technology was leaked, AMIMON responded quickly. They first asked the World Intellectual Property Organization for help, hoping that the technical information about WHDI would completely disappear from the Internet.
However, their wishes will certainly not come true.
WHDI technical information is widely circulated on the Internet and cannot be stopped by the World Intellectual Property Organization. Besides, a large number of netizens have downloaded WHDI technical information. So what if it is blocked on the Internet?
AMIMON launched an investigation into the leak of WHDI technology, but AMIMON knew very well that the server where they stored technical data was not connected to the Internet at all. For this reason, AMIMON's senior management was more interested in the possibility of internal crime.
After all, how can outsiders steal data from internal servers that are not connected to the Internet?
After launching an investigation, AMIMON quickly discovered that the surveillance records had been purged. This clue seemed to further point to the internal perpetrators. If it were not for the internal perpetrators, it would be difficult for outsiders to clear the records of the surveillance system.
The reason is that the monitoring system and the server that stores data belong to independent internal networks and are also isolated from the Internet. How can outsiders control two internal networks that are not connected to the Internet?
AMIMON Company mainly suspected the possibility of internal crime. This saved Shi Lei a lot of trouble.
However, making WHDI technology public to the world is only Shi Lei's first step. Due to patent restrictions and legal reasons, even if WHDI technology is leaked, Dream Entertainment cannot directly use WHDI technology.
In order to use WHDI technology openly, Shi Lei chose to start with two companies from the Southern Dynasty. The two companies from the Southern Dynasty were LG and Samsung.
LG and Samsung both have one technology. That is the wireless technology known as the most promising, 60GHz 'millimeter wave' technology. This technology, later known as WirelessHD technology, has just released a ten-meter range
Internal linking specifications.
In the future, this technology camp will be very strong. In addition to the two companies from the Southern Dynasty, there are also four companies from the Wasang Kingdom, namely NEC, Sony, Panasonic and Toshiba.
The six companies in this camp are all behemoths. The technology they jointly promote is indeed a very promising solution in the field of wireless display technology.
Shi Lei plans to steal WirelessHD technology and mix it with WHDI technology to form a brand new technical solution to avoid patent restrictions.
LG and Samsung, these two giant companies, have not disconnected their internal networks from the external Internet like AMIMON.
These two large group companies have R&D centers all over the world, and data between R&D centers needs to be exchanged. Except for absolutely confidential technology, which is stored in an environment isolated from the Internet, the rest of the data is placed on the internal network.
They are very confident in their network security!
Both LG and Samsung have the world's top hackers behind them. Even if the world's top hackers attack their internal networks, they are unlikely to succeed.
It's always easier to defend than to attack!
Unless, like Shi Lei, he has an unannounced vulnerability!
Shi Lei first chose LG as the invasion target. Compared with Samsung, Shi Lei subconsciously believed that LG was easier to deal with. In fact, this was indeed the case.
This is not because the world’s top hackers behind LG are weaker than Samsung’s backers; it’s because Samsung’s server computing resources exceed those of LG.
The competition between peak-level hackers and peak-level hackers is usually based on server computing resources. If the server computing resources are sufficient, even world-class hackers can defeat the world's top-level hackers.
Looking for teeth.
For example, if Shi Lei fights against Tao Wenxian, Tao Wenxian has the support of Yizuer, plus the IWN Secret Network and the supercomputer Lightning, but Shi Lei only has a laptop, so how can Shi Lei defeat Tao Wenxian?
Even when Tao Wenxian was eating potato chips and watching the show, Yi Zuer tortured Shi Lei into a dog!
This is the principle of defeating ten societies with one force!
With the assistance of Yi Zuer, Shi Lei carefully invaded the internal network of LG Company. As a global multinational enterprise, LG Company's internal network is very advanced, even more advanced than the networks of some government departments.
In LG's internal network, even Shi Lei, the world's top hacker, felt the crisis at every step. However, Shi Lei had the assistance of an advanced pseudo-artificial intelligence system, more than 1,300 tflops of loosely distributed computing resources, and
300tflops of intensive distributed computing resources.
Such powerful computing resources. Let alone LG, even the FBI, Shi Lei was confident of attacking their internal network.
In LG's internal network, Shi Lei ordered Yi Zuer to search for information with low permissions, while Shi Lei personally searched for information that required high permissions.
South Korea, LG Corporation Headquarters, Cybersecurity Department.
"Jin Zaixian. Check the status of server No. 4. The data fluctuation is a bit abnormal!" A middle-aged man gave the order.
Kim Jae-hyun is a security expert in LG's network security department and is one of the best in technology. "Minister Park, please wait a moment. I will check in detail immediately."
Server No. 4 is a high-level confidential server of LG. Although the information stored in it is not top secret, it is still some relatively important information.
Jin Zaixian carefully checked the status of the server. Shi Lei immediately discovered the status of the server. He paused the operation and cleared the temporarily generated data records.
About thirty seconds later, Kim Zai-hyun responded to Minister Park: "Minister Park, no problem was found on server No. 4, and the data flow is all normal!"
Although server No. 4 is connected to the Internet, due to data traffic restrictions, as long as there is a fluctuation in data replication, it will be discovered immediately. At the same time, the server's security defense mechanism can also instantly disconnect the transmitted data. With this set
Defense mechanism, even if it is connected to the Internet, it is relatively safe.
"Pay close attention to the security of the internal network!" Minister Park said seriously, "The core WHDI technology of Israel's AMIMON company has been leaked. I don't want our LG company to become the next joke!"
The security experts from the network security department all laughed. Jin Zaixian also laughed and said: "Minister Park, is it their internal personnel who committed the crime? After all, the internal network is isolated from the Internet, how can outsiders invade?"
Minister Park also laughed a few times and did not continue to speak.
Shi Lei found that the command to perform data checking disappeared in the server. He started to decrypt data and scan data again. High-level confidential data files were all encrypted.
Fortunately, most files do not have special encryption schemes. Ordinary encryption schemes cannot prevent Yizuer from decrypting them. Shi Lei and Yizuer searched files one by one, trying to find WirelessHD technical information.
It is not that Shi Lei has not considered that LG stores the data of WirelessHD technology in a top-secret server that is not connected to the Internet.
However, a top-secret server does not mean absolute security. A top-secret server can indeed effectively isolate the interference from the Internet. Even if it is placed in a safe room, it can also block theft problems in the real world.
Everything has advantages and disadvantages.
There are also disadvantages to a top-secret server that is isolated from the Internet. This disadvantage is the transfer of file data. As a top-secret server that is isolated from the Internet environment, its essential purpose is to isolate the feeling of external viruses and hacker methods.
However, when transferring stored data, there is a possibility of external attacks. No matter what storage medium is used to store data, transferring data from a top-secret server will inevitably come into contact with other storage media.
If there is a malicious computer virus in other storage media, it will be a huge tragedy for the top-secret server.
Therefore, generally unimportant information will not be placed in top-secret servers. According to Shi Lei's inference, LG will not put WirelessHD technology in top-secret servers.
Not only because LG doesn’t pay much attention to WirelessHD technology, but also because there are many companies that master this technology, LG doesn’t need to care too much.
At around eight o'clock in the evening, Shi Lei finally found the WirelssHD technology, and with the cooperation of Yi Zuer, opened the encryption lock of the file. However, how to transfer the files became a big problem!
Shi Lei has discovered LG's security mechanism in LG's internal server, which is a data flow restriction scheme. Once there is an abnormality in the data flow, the server will immediately terminate the corresponding process.
For example, for LG's Server 4, under normal circumstances, the data flow only fluctuates between 5KB and 8KB per second, but at a certain moment, the data flow suddenly rises to 20KB, and there is no relevant authorization. Then Server 4 will immediately end the corresponding process.
Data flow process.
The file size of WirelessHD technology exceeds 300MB. Shi Lei is quite sure that as long as he dares to remotely copy and download the WirelessHD technical data, the security personnel of Server 4 will definitely detect the abnormality immediately.
In order to successfully obtain WirelessHD technical information, Shi Lei must think of a safe and appropriate method.
‘Damn it. This traffic restriction defense mechanism is so annoying!’ Shi Lei cursed in his heart. LG’s traffic restriction defense mechanism is very advanced. It directly writes the traffic restriction defense mechanism into the underlying defense of the system, which is a core component of the system.
If Shi Lei attempts to end this process, the entire server 4 system will reject it. Forced termination will shut down the main system of server 4.
There was such a big movement, except for the security personnel of LG, who were all in the office playing a group unobstructed conference. I'm afraid there was no second situation that could have prevented them from discovering the movement on server 4, right?
‘Damn it! Do we have to enter the treasure mountain and come back empty-handed?’ Shi Lei was a little helpless. Hackers are called gods in the Internet world, but gods also have restricted areas. The internal network of a very large international company is one of the restricted areas.
Especially in restricted areas, when there are also gods, it is very difficult to obtain the necessary information without the gods noticing.
"Yes! I almost forgot about other methods!" A smile suddenly appeared on Shi Lei's face. He had been thinking about how to use hacker methods to obtain LG's WirelessHD technical information, but Shi Lei forgot that ordinary methods could also achieve the same purpose.
Stones from other mountains can attack jade!
"Yizur, start the image recognition engine, prepare for high-speed recognition, and identify all WirelessHD technical data through the camera once!" Shi Lei's idea was to use the image recognition engine to steal the data.
Shi Lei invaded LG's No. 4 server and obtained the necessary information. However, due to some technical problems, Shi Lei was unable to return the information.
Especially using the copied command can easily trigger the alarm of LG. Therefore, Shi Lei had to find another way to complete it.
The graphic recognition engine is a behavioral dynamic recognition engine, a text recognition engine, a human facial feature recognition engine, and a static image recognition engine, which are integrated image recognition technologies.
This technology has not yet been perfected, but there is no big problem in identifying WirelessHD technical data.
Since it is remotely connected to LG's Server 4, the WirelessHD technical information displayed on Server 1 requires remote transmission of images from LG's Server 4. In order to prevent traffic restrictions from being triggered, Shi Lei set up remote display
The image quality of the content and the display speed of switching data.
Under the premise of ensuring that WirelessHD technical information can be accurately identified, it doesn't matter even if the image quality transmitted remotely is poor. Because the Unreal Graphics Processing Engine can automatically repair the image, there is no fear of poor image quality.
As time passed by, Shi Lei looked at the percentage progress bar on the screen with sweat on his forehead. He had not been so nervous for a long time.
At 10:40 pm, Shi Lei finally let out a long breath!
WirelessHD technical information has finally been ‘downloaded’ from LG’s internal server.
To be continued...