Chapter 355 Vulnerabilities
As Avandy walked into the building uneasyly, she put her cell phone into the storage box as usual. As soon as she walked into the door, the metal detector rang.
"Oh, I almost forgot, I haven't taken out my e-cigarette yet."
Avandi pretended not to care and took out the electronic cigarette in his pants pocket.
The two security personnel guarding the door looked at it and didn't say anything. There were too many people with various personalities here, and there were also many people who did not like to be restrained. The company also treated this very preferentially. Otherwise, how could it be possible to design so many convenient facilities for care?
An electronic cigarette did not attract much attention. A Wandi put the electronic cigarette back into his pants pocket in fear. He cursed inwardly, at least a disguised pen would be better than an electronic cigarette. But if you think about it carefully, a pen is not easy to charge, and the disguising nature of the electronic cigarette charging is obviously better.
As usual, Evandi walked up to the second floor, came to his desk in the tree house, sat down, and wiped the sweat from his forehead well.
“Don’t you go for breakfast?”
Wayan opposite asked curiously.
"No, no, I've eaten this morning."
"Then I'll go have some breakfast."
Wayan did not notice anything and followed him out of the office area.
Originally, Awandi liked to come early, but at this time, he was the only one left in the office area.
In the original order, all the company's desks were designed with wireless design, both the keyboard and the mouse were wireless, and even the work data transmission between them was no longer used for mobile storage devices. Many desks no longer had USB sockets.
Yes, not only can the mobile storage device be unable to be identified, but there is not even a USB socket.
Avandi couldn't help but feel tricky about the cybersecurity protection at the company's headquarters. This was the first time he felt that a company could do cybersecurity to this extent. Perhaps he was ignorant, Avandi thought that maybe large foreign companies do this.
However, the cracks are always broken from the inside. Although many people do not have USB sockets on their desks, there are a few exceptions. They have high requirements for precise control of the mouse, and wireless mouse still cannot meet their requirements well. Therefore, after these people applied, the USB socket was specially left on the desk for them to use wired mice.
Avandi slowly moved over, took a deep breath, and sweat kept flowing down his forehead.
Even his arms holding the electronic cigarette were trembling. He quickly looked around and found that no one was behind. He immediately pulled out the tail end of the electronic cigarette, then squatted down and pulled out the mouse line under the electric lifting table, and inserted the tail end of the electronic cigarette with one hand.
...
The host in the sleep state has no movement.
This made Evandi breathe a sigh of relief. It seemed that the host should have been identified as a mouse or keyboard. Using the vulnerability of the USBHID protocol, no matter what the white man wanted to do, he should now achieve his goal. Next, he didn't have to worry about anything. After waiting for more than ten seconds, he pulled out his e-cigarette, returned to his original state, and quickly returned to his desk and sat down.
Just like he was guilty and did something bad, Evandi couldn't help but stare at the desk for a few hours. When he found that his colleague was completely unconventional, he didn't notice that his host was being tampered with, and then he breathed a sigh of relief.
While Awandi was relieved, in the storage box several meters below his feet, the shutdown phone that had been locked into the box by Awandi automatically illuminated the screen and entered the boot state.
At the same time, all computer monitors in the entire office area began to emit specific electromagnetic wave signals, while the mobile phone that was already turned on automatically quickly entered the FM frequency modulation state. In the blink of an eye, a hidden electromagnetic wave network was established. Segment of data information was encoded into specific electromagnetic waves to connect to the mobile phone FM by hardware such as the host's graphics card and monitor.
After starting up, the mobile phone is connected to the base station network and quickly transmits a series of encrypted data packets through the 4G network.
...
In a private house more than ten kilometers away, Wisco drank a cup of coffee and turned to look at the monitor.
“…Huh, it actually succeeded.”
With a fist, Wisco couldn't help but feel a little surprised.
"Of course."
The weak man wearing black-framed glasses sighed: "I've said a long time ago that if I still think that ICS\/SCADA monitoring data acquisition system can be safe from the Internet physical isolation, then it would be a fool. The technology is changing with each passing day, so what about physical isolation? There is no security technology to prevent social engineering attacks of hackers in the new era."
"But thank you, but this matter would not have been successful without your help."
Wisco stood up and patted the weak man on the shoulder: "Tomorrow, the Ronald Enterprise delegation will visit the headquarters of the hardcore technology company, and I will mix in the delegation, so... can you do everything today?"
"I can't give you the answer."
The weak man stared at the screen and quickly typing on the keyboard with his hands.
"You know, this technology of encoding binary data through FM propagation has limitations. I have to try whether it can form a mesh network and see if I can find the Internet interface."
"Okay, I won't disturb you."
Shrugging his shoulders, Wisco did not urge the weak man to go aside and looked at the encrypted information on his phone.
Less than half an hour later, the weak man there suddenly shouted: "Okay, it's successful, damn it, this company actually built three layers of isolated networks. There is no wireless device to connect to the first layer of the core. Fortunately, there are still loopholes between the first layer and the second layer."
The weak man was extremely proud.
"Oh, the loophole?" Wisco walked over and said curiously.
"Although many industrial control networks have proposed various seemingly perfect security measures, they can never eliminate loopholes caused by human negligence."
The weak man explained: "This company designed a three-layer mesh network isolated from the work network, monitoring system, and core server of employees. According to the original design, even if we successfully implant Trojans, we cannot invade the monitoring system. Fortunately, I found that someone seemed a little careless and used his work mobile phone to remotely connect to the monitoring network system, and used a secure access mechanism with security vulnerabilities. Through this connection, I can directly see all the monitoring."
"So, everything went well?" Wisco smiled.
"Make me another cup of coffee."
The weak man pinched his finger, "This company uses a terrible degree of automation... Let's see, well, this is considered the urban Internet of Things, hehe, the computer actually took over all the street lights, surveillance, tap water, air conditioning, etc. They actually buried a layer of solar panels on the ground? It's so luxurious. The cost per ten meters will cost at least millions of dollars, right?"
"Hey, I'm sorry after saying so much."
The man turned around: "Most are irrelevant Internet of Things. They should have designed several backup emergency grid systems, and they are all in the core network, so it is probably impossible if you expect power outages at critical moments."
"How many sets of spare ones?" Wisco opened his eyes wide.
"Well, there are at least two sets."
The man stretched out two fingers and couldn't help but scold: "fu·ck, this company is really a waste of money, but I have to say that the waste of money this company has troubled us because we have no choice but to their power system."
After taking the coffee handed over by Wisco, the man took a sip and exhaled: "Now it seems that I can only adjust the surveillance for you."
"Can you see real-time monitoring?" Wisco said unexpectedly: "Didn't you just say that the transmission speed is limited?"
"Thanks to several internal idiots, I have built a mesh network, but there is no way to reduce the point code rate and multiple delays. Let me see how many monitoring points there are..."
As soon as he typed the Enter key with his index finger, rows of data suddenly appeared on the monitor.
"hiss……"
"What's wrong?"
Chapter completed!