Wednesday, March 2, 2011

No absolute safety

Of course, here said the "is" is relative. Internet there is no absolute safety, it was a binbib consistently view, also he these years as a hacker experience. As h1 system, in his eyes, his system must be stubborn, but in item, indestructible, still have endeared seems several conduits. Each other computer operating system is Linux system, although relative to Microsoft's Windows, Linux system vulnerability is less, but also still exist many, many hacker is taking excavating Linux operating system system vulnerabilities for fun. binbib designedly to dig, but in the application process, he also accidentally discovered several. This is not an binbib lackeys excrement luck, but accidentally the inevitable, it is him into strange questions later, after his thinking and validation discovered.

Each other and found no abnormalities, he is now on his own mood, h2 worship let him flattered, hacker is really cool!
binbib does not aim h1, but his teacher, he in h1 system around in a circle and check some important documents, but didn't find his teacher any information, the botnet control software pour discovered, binbib sneaking its source code downloaded down, and intend to leave to slowly hereafter research.

Then find a burst of, or no gains. Do? Direct showdown with him? No! Item binbib rejected the idea, the other must immediately referrals, and still don't know whether he when meeting - this is hackers were found after usually cautious handling of hackers will replace own IP, never the IP online.

Finally, an example of binbib think the way.

First, item binbib begins to set the springboard, in their own zongguan chicken open agency service, but it still can be traced to each other, but he has his own way, in his own machines also opened agency service, will that zongguan chicken series into a ring, i.e. own machine is also the springboard in a node, so even if that person tracked over, he will also think binbib host also is a stepping stone, to be confused enemy effect.
After all ready, binbib intentionally in each other's machine action make big spot, big to just can be found, and other binbib still didn't seem to know has been found is same, still in his machine GuangLaiGuangQu.

But h1 seems really excited, binbib efforts several times he had turned, not found. Helpless, binbib finally adopted a quite exaggerated method, he directly into each other's firewall to K off. This time you must always abnormal!! Hey hey! binbib"crafty smile" rise.

H1 finally discovered the existence of the invaders, that he is still being invaded pour to invade, in the heart is great anger, unexpectedly someone dared in dares challenge, must give him some color to see see!

H1 first will own network have disconnected, then examined the systems to check again, because the invaders have no "could" wipe his intrusion trace, h1 soon know binbib invasion ways, he will immediately loophole needed, and then he again even on network, according to the invasion of IP traced to invaders. In tracing before, he looked at it this system user, discover unexpectedly and two are using his operating system. One is him, and the other one is - BX.

H1 was very shocked, each other even in such a short time again for a successful invasion your own system! This... It can't be! H1 couldn't believe her eyes, his operating system is always very confident, just being invaded, because the other utilize a doesn't know by himself in the software vulnerabilities, and now he has put the leak blocked off, and as little less open service, can seal ports are seal up, but now the other unexpectedly also smoothly penetration of came in, and is so quickly, then relaxed, it had to let h1 shocked.

H1 again will network returned. Carefully check the system, but this time he didn't last so good luck, he found nothing, each other like only a ghost came in. H1 again will reduce operation of the procedure, leaving only a few system operation process, he was necessary to hesitate connected network. In fact now he can't do anything. He even on network just want to look at each other can't come just, h1 invaded a terrific already know invaders ace, far beyond their own level.

No comments:

Post a Comment