Friday, March 18, 2011

Invasion of the White House

Since the last time that only a high school student when Kingson, Xu Yi will have the intention of closing its followers, so he was out of a problem to him, had planned more than one problem, but he did not know that he began to find each other in this logical principles of the hard disk lock, his follow-up exam to become useless, while Xu Yi He also reduced the requirement, as long as the other party to the logic of his hard left lock to get, even if qualified. So he Kingson system in a secret place left a hidden file, the invasion, he found that the files are still in, it means that the hard drive each other very well to break open the lock.

This idea is not Xu Yi Shou Tu moment the first heat, but his decision after careful consideration. Binbin inherited memory stands out that he still insists that the principle does. He believes that, as a hacker, should not expose his identity as a top priority. However, born again, he has to make a living for their own interests, must be to do a lot with a blockbuster event, in order to avoid caring people noticed, I, Xu Yi This came up with such a sure way, but he plans Shoutu tip of the iceberg. And, Kingson The apprentice, and now can only say that is still in the study period, as the last can not get the recognition Xu Yi, then see if he can withstand the test.

Disconnect the connection and Kongson, Xu Yi began to practice hand holding the White House Web site. As the official White House web site is the gateway to the United States, the world's hackers are eyeing here, every day, the White House servers have been numerous attacks by hackers around the world, so it's no doubt that safety is first class. Carries it to the object as a practiced hand, is simply another good enough.

White House, the U.S. portal site, and some lower than normal IQ guy how much they thought it was the number of confidential documents and information, invaded the site, there must be a large harvest and so on. What if someone is an idiot you? You know that every day the server was another attack, but also to confidential information into the inside? Unless those Americans are brain Xiudou it!

So, the White House only use the server for the hackers, it was only the function of a practiced hand. Do you want to challenge their skills, then the White House is certainly the best choice of servers, where has the world's top guardian of security personnel that server.

As usual, Xu Yi is the first landing Broiler, open springboard services. Some time ago, he had in the world to find a lot of chicken servers, now only in accordance with the chickens one by one in the list of IP connections only.

In fact it is not difficult to find chicken, usually a few steps so the steps can not be separated. First, you start from your own machine, you can scan a wide range of hacking tools used can also be specific to a machine invasion. After identifying the target, they begin to invade the target machine. After the success of the invasion, the invasion of the traces left behind clean, and if too many loopholes in this machine, you may have to help him consolidate about the system.

With luck, this station may be configured chicken is very luxurious, but the administrator is Cai Cai, then congratulations, you won the jackpot, which sets chicken has become your personal belongings can be long-term use, and quite smoothly.

In general, the server's configuration would surely be much better your own machine, performance is naturally did not have to say that this time you can begin to take full advantage of the first chicken of the resources for you to find more chicken. Step and the beginning, as in the chicken run your vulnerability scanning tool, to a worldwide search for a specific vulnerability for your server.

Xu Yi is to use this method to find the chickens, he wrote a scanning software, using some people do not know the loopholes in the system, it was swept out of the chicken, piece by piece, more incredibly, he just picked a number from which Need for chickens, but there are four or five machines, will they make a list, and then stored in their e-mail which, after all, this machine is not the data bureau insurance. So, he saved many important documents are in the mailbox or the broiler in some very stable.

Sure enough, the White House Web site Nangao, Xu Yi software scans a moment, almost no common vulnerability, a lot less common and no, it is not surprising, because the server is too little to open the service, and only the HTTP Web services, but also the kind of static, ordinary people do not start.

Xu Yi also expressed understanding for this, after all, staring at the world's hackers are there, the network administrator is the world's estimated one of the most depressing day, hackers are so many "popular", he would be willing to open strange other services it!

As long as there is no absolute security for the Internet, to which all adhere to the tenets of hackers. You can not invasive, does not mean there is no vulnerability, not just the level you did not find loopholes in it. Of course, this may not be the server administrator's responsibility, because a lot of time hacking success is often the system itself flawed or incomplete due to a variety of network protocols, it is hard to detect.

Although the White House doing a good server security in place, but it also beat more than ten years has advanced the knowledge of Xu Yi, Xu Yi did not take much effort to invade the inside, landing with a user name, or XYZ.

Said to be quite contradictory, hacking has always been not to expose his identity as the top priority, but sometimes their approach but runs counter to this principle. Like Xu Yi so, he landed a target system can take the name of the other meaningless, so security is absolutely guaranteed, others want to investigate if there was no way check from. But hackers often are keen to use that they have identified an ID, such as exposure to risk is greatly increased. The reason, perhaps vanity of hackers, although they do not want to be the public aware of their identity, but subconsciously they want to be recognized by colleagues, after his debut as the use of the ID to create a brand, you technology is stronger, the higher your value.

And now Xu Yi also has this peculiarity, he has thought about this issue, finally decided to break something for XYZ to the name. If the former, he may no longer care about the title, but the combination of a junior high school he was a kind of memory you want to show his desire, desire that the character within the Binbin under the repression has become very weak , but after all still there.

Xu Yi stroll around inside the server, and not anything interesting, just when he wanted to withdraw, was detected and successfully invaded the machine, the invasion of the ID is "Null".

Can be infiltrated, that the other party , and Xu Yi is boring, suddenly from the heart of the contest, while the other has not and he found himself before the retreat, but it got the IP address of the other invasion. He began to track the target from this IP address. Xu Yi, of course not fool enough to not know each other a springboard to invade the machine, to know that the U.S. FBI is not the guy who Chiruan Fan, although this machine is not confidential information, the other may not care about these intruders, but who can guarantee that they are bored some day, want to play the cat to catch mice in a video game.

Xu Yi really like the fact that, as expected, that IP is just the other side of a chicken only, located in Switzerland, and this sets the security of broilers has been the consolidation of the invasion was very strong, but it did not able to stop the Xu Yi by the Taiwan chicken Xu Yi has found a UK IP, after the success he found that the invasion was a chicken. It seems the other side is also a prudent man, do not know how many layers he set the springboard. Xu Yi think of tracking time, the other side finally found their own was being traced. He began to defend, but also began to track the source of Xu Yi. They launched a competing station you come to me, is the side of defense, while offensive, to see who found each other's real address.

Xu Yi, after all, is the future of the hackers, Null broken only after two broiler trouble was traced to the third station broiler XYZ operating system is installed how he was not familiar with SUN's Solaris operating system. Solaris also belongs to a branch of Unix, but the research Null little, he tried several times, they know are a few flaws make up the other side, he now has no time to find loopholes in the interim, because he found XYZ in the short short period of time has broken through the defensive line in his four-three, he knew he had lost the battle, but unfortunately he had to quit the battlefield. XYZ, he remembered the name, expect a higher next time, and his next.

Xu Yi, see each other out of the battlefield, and stop the invasion, he did not win much joy, but there is some pleasure in mind, it is not happy because of his victory, but for the extraordinary encounter technical counterparts and happy. This invasion was spent a lot of thought and effort that he, in his own time, there is no scheduled break each other's defense, the guy who called Null significantly more powerful than Kingson.

This time, Wang Bin, from the outside back, his head slightly sweating, just come in tired, a little computer that they do not understand the gang colleagues, casual encounter something called him to take treatment, just a little head with Fixed.

Xu Yi smiled, he had this experience. Bin-bin done before in Internet cafe network, will not boot, will not open the display, will not switch the input method will not ... ... so on and so a lot of people, casual encounter small things to look for network management, when Network Management During that time, his heart has been in a crazy state, worried that she may at any time runaway, I really wanted a crush each other, that kill and then crumpled, and then twist twist, put pan fried, a chance to smash a foot.

Look at the time, fast lunch, and Xu Yi So off the machine and say goodbye to the Bin.

"Xu Yi, not to say that today, I treat what, how it goes?"

Xu Yi smiled apologetically: "Wang and, at noon I just remember something, next time."

See Xu Yi so that the Bin did not re-adhere: "Okay."

Xu Yi, said the time to treat is Offhand, again wait for the next sister, he drove to Sulan there is not to say its very heart to heart with the Bin, do not want to have too much contact with him.

No comments:

Post a Comment