Tuesday, May 3, 2011

Tangled warfare

Since the implant in the router's anti-spyware was found and removed after, ANSG has been closely watching the dynamics on the Internet, Kevin inference, Showers must be action, but waited for some time, is still little movement no, did not find any more recently large hacking incident. However, members can send their complaints have nothing, their work is this, the day may occur on the network monitoring hacking incident and emergency response, corresponding solutions.

Time to two days to the weekend, they finally found a little clue.

Time has been about eight o'clock at night, according to the time difference, there should be cause the United States five or six o'clock, Showers finally started operations. The operation was personally directed the shower of blood, because the longer the duration of the task. Their mission is to steal this a U.S. military aircraft design software, the software is relatively large, in order to take some time to fully download, so the risk of detection is relatively large.

Their place is an exchange of encrypted IRC chat channel, IRC chat rooms WEB general is very different, hackers, especially in foreign hackers, there is an important habit to be overcome like the website of the IRC server set up and technical exchanges and boasted of this. IRC is based on a relatively mature technology, it is usually waiting in the port number 6667, and has a dedicated IRC protocol, follow the RFC1459 specification. In the specification, the detailed provisions of the IRC client and server communication requirements. Where the service conforms to this specification can end with the client to follow the norms of communication, regardless of whether the two developers working together. This is a hierarchical network, the charm of thought and the division of labor. Read the RFC specification, which may find the loopholes, is an important course of a hacker. Can say from this side, RFC is the hacker of the Bible.

Compared with the traditional WEB chat, IRC has a very distinct features, which are loved by hackers. First, IRC is a fast refresh of the screen, the speed in milliseconds, not feel any delay and jitter, very protective of vision:); followed by IRC has high confidentiality. In an official IRC server, if you are not in the public chat rooms to talk with people but instead close chat (that is often said that open small window), then any other person will not know what you talk about, including the administrator. This is not like in some of the Web chat rooms, the administrator can be certain CGI or ASP program to snoop into your chats. This is why many hackers also use IRC to communicate with one of the reasons. It's also easy to manage, powerful, and so on.

Check out the location, etc. Showers members have already scanned well, but for fear to arouse his suspicions, they implanted as early as the Trojan horse in the target computer. A shower of blood gives a list of IP addresses, where the computer has the IP may be connected within the United States military, a good distribution of tasks, we started working invasion system.

National Defense Science and room shower of blood at this time only three of them, as a shower of blood is the administrator of the school room, he had the room key, so they can initiate action at this time. Showers of other members they have not met before through rigorous inspection absorbed into the organization. Showers are not governmental organizations, but by a shower of blood and the others self-created. Showers members have a common characteristic - all want to help countries with their own technology to do something.

A quiet room, three computers, exceptionally clear sound of the fan rotation, and their melodious keyboard, percussion, they are preoccupied with staring at the black white monitor, things went well, through the layers of the investigation, they found looking for things, start the download process, intellectual rain rain and stone have been ready, just waiting for the download is complete immediately began cleaning the scene and escape route has also been prepared, if it is tracking, and even start to consider the long buried in the chicken fast formatter.

Pentagon.

Just asleep not long ANSG crew were immediately called together, on duty discovered the whereabouts of Showers!

Stumbled crew were immediately clear, and playing the spirit of twelve, swear this must not let the other escape. Tracking program started, and soon they came to the first layer of defense invaders, the same, they in place, each responsible for part of the work, scanning, analysis, intrusion ... ... closely with all articles, the first layer of defense is soon to be a breakthrough. They had to rush in before the track design software is downloaded to the target, or only cut off at the last moment the other's connection.

"Didi tick -" speaker in the outgoing long-awaited alarm sound, is being prepared with a program of Xu Yi wrist flick, then it will be some excitement, this is his last track, when implanted in the showers Intrusion Detection in those chickens sent to the alarm program, that is, the moment the invasion was a machine.

"Hope is the showers so I can get impatient!" Xu Yi prayed to see a little alarm in the server address, a server in Canada, immediately by the back door connected to that server and found on this server The agent has been opened, Xu Yi hearts rejoicing, and quickly track the agent's destination address, by the way also used a bit of this agent, so he added a layer to the equivalent of a springboard, and then came to a server in Finland or proxy server, plus a springboard to continue to follow ... ...

"There is the door! Appears to be a big movement, or would not be so careful." Xu Yi was going to continue, he suddenly found to have a lot of that server is connected. Quickly uploaded a small program, covering the target system in order to view users that procedure, his hide.

How, so busy? Xu Yi found that the system there are two sets in addition to their own people know the reason why two sets, because they are completely against, some cover, some people against each other, because it is a party want to continue to break, while the other will try to stop them blocking .

Xu Yi heart to have doubts, decided to no matter what the proxy server's address and, instead, the other user tracking system, the tracking is very simple, what catch the Pentagon.

Selling cakes! Looks like a guy my last track!

Xu Yi shocked, he did not want to go and get clean out your IP in the end was the Pentagon to track which computers know each other a few brush, immediately get away from it, was not found in their own to see the invasion before the target What is the stuff in the end. Although Xu Yi wanted to immediately follow the other members of showers, but now he is more interested in their operational goals.

A software? What software is so hard for, action has been found each other are still not giving up?

Really, since been found, like this is certainly no chance to download, hey, let me help you a bar. Xu Yi Chuan from a chicken in a small program up, running, but he did not start immediately.

Xu Yi looked back, Oh Oh! Finland was broken it! The technology is still the Yankees above a chip, Xu Yi found that the intruder lost the several cities, has come to Canada.

Shot should help them, right? Xu Yi from trouble trying to buy time to intruders, but also a force at this time added.

He is! Xu Yi's intuition told him that the people must be shot on several occasions that the mysterious person. Had his shot, Yankees clearly have increased pressure.

Why not you in the end is divine it? Xu Yi thought, and so began secretly tracking shot this guy.

No comments:

Post a Comment