Hk054 Deja Vu Returns First Class Broiler
ess company, Xia Guo's name is Aixin Company, was established in 1984 and is headquartered in Tokyo, Wosang country, mainly involved in management consulting, software development, mobile network services, and Internet browsers and so on!
The main product of ess, the omfront browser, has a very high share of mobile devices in Woosang!
This network-based company, in order to use the name of the supercomputer Yan, applied to Tokyo Institute of Technology to rent the right to use the supercomputer Yan.
After finding out the news, Shi Lei immediately searched the website homepage of ACCESS through the Internet search engine. From a company's website home page, you can know a lot of things. For example, the current situation of the company, such as the company's financial statements, and even the personal passwords of company members, etc., can be peeped from a company's homepage!
Shi Lei entered the homepage of ACCESS and browsed the company's current situation. The development potential of this company is good, especially the cooperation object of the omfront browser is actually the two giants NTT and Sony. [
After browsing for a while, Shi Lei tried to scan for loopholes on the homepage of ACCESS, so as to enter the website. As a company in the t industry, ACCESS's company homepage really has its own independent server, rather than the server space provided by a rented network service provider.
After Shi Lei judged the server's system, he immediately got into the server from an unpublished vulnerability. The server of ACCESS' homepage stores many files. Shi Lei browsed carefully and finally found something he was interested in.
ACCESS rents supercomputer Yan with very few system resources, and they have powerful servers themselves. The reason for renting supercomputer Yan is just to enhance the company's reputation!
Shi Lei actually found the login account and login password of the supercomputer Yan inside the Axios web server. It turned out that ACCESS released the account and password of the rented supercomputer Yan to every senior employee of the company. At will they use the portion of the supercomputer resources that the company rents. This is not the generosity of ACCESS, but their own research projects, which need to be kept confidential and cannot be sent to the supercomputer Yan for processing, and they are reluctant to waste the resources of the supercomputer Yan. So, let the senior staff use the resources of the supercomputer Yan at will!
Originally this was a benefit of ACCESS, but now it has become a convenient channel for Shi Lei to hack into the supercomputer Yan!
Shi Lei browsed the web server of ACCESS over and over again, and after some thought in his heart, he decided to use ACCESS' server as a first-class broiler, officially preparing to invade the supercomputer Yan!
The server of ACCESS is very good!
This company has five core servers, forming a server group. The computing speed of each core server has reached 02 trillion times. The computing power of the entire server group has reached one trillion times per second, which is equivalent to one trillion times. A small supercomputer!
In 2006, the computing speed of the 500th supercomputer in the world was only 27 trillion times. In other words, the server group of ACCESS is absolutely in the advanced ranks in the world!
After deciding to use ACCESS' servers, Shi Lei started hacking ACCESS. Because Axios' server group has reached the level of a small supercomputer, Shi Lei carefully controls the No. 1 server and scans the ports opened by the other server group.
Shi Lei had already invaded ACCESS' web server, but the web server was only used for the company's homepage and to store some unimportant documents. The core information of the company is all stored in the server group formed by five core servers!
The computing speed of the No. 1 server was not satisfactory after all, Shi Lei couldn't help but secretly impatient, but he could do nothing!
While waiting for the scan results from the No. 1 server, Shi Lei fantasized about the kind of science fiction where a broken laptop could hack the satellite's super powers. If he also has the ability to defy the sky, how wonderful it would be!
In hacking, intrusion, acquisition, and control have different meanings. For example, a server that stores confidential documents can obtain the secrets without intruding into the server.
In the same server, there are also many permission settings, and confidential files are generally also added with independent passwords. Therefore, even if the confidential document is obtained, the secret is not necessarily obtained, and the password needs to be cracked.
As for controlling a server, that is the most difficult! It is extremely difficult to gain control over a server, especially an advanced server!
Although the performance of the advanced server is very powerful, it is also very cool to use. But in the same way, the security policy of the advanced server, the server firewall, is more difficult to handle. And, there are security guards!
Although Shi Lei knew of numerous server systems and unannounced vulnerabilities, he did not do whatever he wanted. He could hack whoever he wanted. Every time a hacker invades, a network link is bound to be established. Once a network link is established, data exchange occurs. If the security guards of the advanced server observe the data flow at any time, any abnormality will be discovered. For example, the server is likened to a pool full of water, and the network link is likened to a water pipe connected to the outside. When the server is under normal conditions, when there is no data exchange, that is, when the water pipe does not flow out. If the hacker surreptitiously adds a water pipe to the loophole to release water, will the security guards still be unable to detect the water leak?
The No. 1 server slowly scanned the Axios, and the server group port was open. Shi Lei waited and thanked the flowers. After finding a suitable port, Shi Lei directly used ACCESS' web server to simulate the internal communication of ACCESS, requesting access to the server group. [
After the server group received the request from the web server, since both parties belonged to ACCESS, the firewall of the server group did not block the request of the web server. Shi Lei successfully sneaked into the server group through an unannounced loophole through the normal request!
After entering the server group, Shi Lei did not act rashly, but began to spy on the firewall composition of the server group. If the firewall is not fixed, I am afraid that Shi Lei has just started to clean up the permission group, and the firewall will issue an alarm!
Shi Lei used the No. 1 server to analyze the firewall while manually spying. Axios' firewall is obviously not a popular product on the market, but a customized firewall system entrusted to a network security company.
To borrow a phrase from the hacker world, a free firewall has zero defense effect!
It took nearly two hours for Shi Lei to basically understand the situation of the firewall. Axios' firewall is actually provided by Norton!
In the previous life, Shi Lei had deliberately studied Norton's firewall, and Shi Lei was very familiar with each of their products. Although the firewall of ACCESS is a customized product of Norton, its source code is also developed based on the Norton series.
Shi Lei wrote a malicious program inside the server group, ready to pierce the firewall and make the firewall fail!
The best way to defeat a firewall is to, like Shi Lei, master the vulnerabilities of the server system, enter the server, and destroy the firewall from the inside of the server.
After all, the external defense of the firewall is very strong, but the internal defense is relatively much weaker!
After about ten minutes, Shi Lei compiled a malicious Trojan against Norton's firewall, and then started destroying the firewall from the inside. The specially customized Norton Firewall still can't get rid of Norton mode. The malicious Trojan horse written by Shi Lei started to strangle it from the inside!
The function of the firewall was gradually replaced by malicious Trojans, and the whole process was silent and did not attract the attention of the security guards at all.
After the malicious Trojan strangles the Norton Firewall, the method detects the Norton Firewall's signature and begins to self-destruct and clear it from the server.
Shi Lei put his hands on the keyboard with a successful smile. He didn't expect that it was so smooth, and he got the Norton firewall!
After typing a few lines of code on the keyboard, the authorized users within the ACCESS server group were all listed on Shi Lei's computer screen.
On the surface, the server group only has three super-authorized users, and more than ten users of various levels of authority, large and small. Shi Lei cautiously continued to tap the code and injected it into the server group's authority authentication system.
After a while, two accounts were displayed on the display again, and the permissions of these two accounts were still above the three super-authorized users on the bright side!
"Nima, he is as insidious as Brother Stone, and likes to hide the real super-privileged users!" Shi Lei showed a disdainful expression on his face.
Hiding the real super-privileged users is quite common in advanced servers. If a hacker who is a bit of a hacker invades a high-level server and obtains a super-privileged user on the surface, and then starts to misbehave and establishes his own super-privileged user, it will be exposed in an instant!
Shi Lei found out Axios, the real super-authorized user that was hidden, but he did not move these two super-authorized users, nor did he establish his own super-authorized user. Instead, start writing code to replace the original permission system in the server group system.
If you use the server group system, the original authority system, create a super authority user, even if it is hidden. Once the super authority user of ACCESS checks the authority user group of the server, the newly created super authority user will also be exposed, which is equivalent to the exposure of the intrusion behavior.
Therefore, Shi Lei needs to establish a new permission system to replace the original permission system in the server group. In the new permission system, the two hidden superusers on the surface are still the highest permissions. But in fact, Shi Lei will establish a more advanced super-privileged user, hidden in the system.
Due to the use of the new permission system, even if the original two super-privileged users thoroughly checked the server's situation, as long as they did not find that the permission system was replaced, they would not be able to discover Shi Lei's hidden super-privileged users. Under normal circumstances, the security personnel on duty will not suspect that the system has been replaced at all. [
Because, replacing the system is definitely the most difficult task, and only a world-class hacker like Shi Lei can do it!
ps: It's a little bit far from the ticket target, but Shanshan believes it can be reached!
Ask for tickets~ Friends who haven't collected it yet, you can collect it! Ask members to click and help Shanshan Chong click on the list!
Ask for a reward, ask for a comment, ask for a reply from the book review area~!
In addition, only one person won the prize in the last small event, and there is a couple of couple accounts left. If anyone needs it, please post in the book review area. We will open another small event, this time with an eight-digit Tencent account, or seven Digit yy number! If you need it, roar in the book review area~
[Thank you for the reward] If the cherry blossoms blow snow, reward 588