Chapter 52: Plan (below)
-
The Strongest Hacker
- Gu Dashi
- 1295 characters
- 2021-03-02 09:09:10
Chapter 52 Plan (Part 2)
"People are security companies. I want to invade so easily. I will first look for information to see if I can start." Zhang Yang said helplessly.
"Oh, so, hey, okay, then you first look for information, I will go back and call my old man, let him prepare some materials for me, I will go back and get it for National Day, I will come back three or four days in advance, and give you Get your notebook, I tell you, my old man has a lot of good materials." Fang Shaoyun smiled proudly, and then waved his hand away.
Seeing Fang Shaoyun close and leave, Zhang Yang shook his head helplessly. Although Fang Shaoyun just said that he didn't guess Zhang Yang's plan, he also guessed a beginning. Pan Wenlong is cruel enough, but Zhang Yang is not good at it. He has already thought about it, first find out the firewall and anti-virus software vulnerabilities of Baiying Group. At the same time, Zhang Yang also got all the customer information of their company.
At that time, Zhang Yang will steal the data of these customers regularly, and let these customers find that these customers will naturally find trouble with Baiying Group after discovery, and Zhang Yang wants to sell this leaked information to Baiying Group! As for how much to sell, it depends on how uncle Zhang is feeling.
MLGBD, Lao Tzu looks at you arrogant! Zhang Yang sneered. This is just a preliminary plan. Zhang Yang is still somewhat ambiguous about the blue domain. After he learns the blue domain to the point of the red domain, Zhang Yang still has a plan to draw a salary. Don’t you just rely on money? What can you do when you have no money?
Isn't it 50,000 yuan? How much will Baiying Company lose by then? Zhang Yang wasn't prepared to use his power in the red domain so early, but there are some things that can't be tolerated, but it is just to advance the means of hiding identity a little bit. Zhang Yang had a plan for how to hide his identity.
Publicity on the Internet is impossible to do nothing, as long as he did, he did not hide his IP at the beginning, so it is easy to make people doubt.
If you want to hide your identity from anyone, the best thing is to not show your ability in front of anyone. Keep it low-key, let’s not say that the previous point Zhang Yang has already committed, just the latter point, it’s not low-key Zhang Yang's character. Low-key means pretending to be a grandson.
Just the on the Internet, what is the meaning of pretending to be a grandson in reality, people always have to live in reality, Zhang Yang’s ideal is that the network is the same as the reality, and no one can doubt his identity on the network. Is the same person.
After opening the analysis results of Baiying Security's firewall and anti-virus software, Zhang Yang quickly began to study, no software can be perfect, even if it was perfect at the time, then there will be vulnerabilities in the future. Even several intelligence agencies in the United States dare not say that the firewall on their servers is perfect.
According to the analysis results, Zhang Yang quickly had a rough prototype in his mind, and soon Zhang Yang discovered a vulnerability in Baiying firewall, which is a loophole in character decoding, but this is more related to the system, Baiying The Group's firewalls are large customers because they have few individual users. These large customers have their own servers.
So it is also a firewall that protects IISWEB. It has multiple blocking functions, such as checking the HTTP requests submitted, etc., and if there are suspicious characters in these requests, it can block such requests, but Baiying security firewall Some special characters of %2e cannot be decoded correctly, which means that many malicious requests can be passed to the WEB server bypassing the protection of the firewall.
This vulnerability was discovered relatively late, but this vulnerability is not what Zhang Yang needs to find. He is looking for a general vulnerability in the middle of Baiying's products. The so-called general vulnerability means that it exists in your series of products. The same loophole.
Some of these vulnerabilities are defects in the system itself, which were not found during design, while some are human factors, such as Microsoft's WIN series and office series, there are many common vulnerabilities. These vulnerabilities are Microsoft programmers. The intentional stay is still the existence of the system itself, and most people know it well.
Think about it, if a vulnerability exists in one of your products, then it is justifiable, but if this general vulnerability covers several products before and after you, and several generations of products, then it has a problem. Microsoft can rely on its own monopoly position not to be afraid of not using its own products after being discovered by users, but Baiying is not safe!
There are so many security companies and security products all over the world. If any security company’s product has a common loophole, wait for it to be drowned by the user. If it causes losses, then you are waiting for compensation. All right.
However, general vulnerabilities are more difficult to find. After all, this thing is a big deal. Microsoft has general vulnerabilities. People can explain that there is a problem with the compatibility of software and system embedding, or that there are too many programs that need to be taken care of, which leads to vulnerabilities. Some reluctantly, but it can be explained.
But if you have an anti-virus software and a firewall with a general vulnerability, then you can’t say anything. What is the firewall doing? It is to protect the security of user information. Now there is a loophole security on the firewall. Do you want to use it?
After analyzing the firewall, Zhang Yang went to analyze the anti-virus software~EbookFREE.me~ This work is not a matter of two days a day. If there is, it is the best. If not, Zhang Yang may have a follower.
The week may soon pass. On the last night of the holiday, Zhang Yang found two common loopholes hidden in Baiying Security, or simply the backdoor left by Baiying Security.
The rest of the time is to study the knowledge of the blue area, such as placing a honeypot on your own broiler, and how to control a broiler to the maximum extent through the back door.
When it was okay, Zhang Yang went to the anubis forum and asked some knowledge about the blue domain. In just over two weeks, Zhang Yang's blue domain level was rising at a rate that was a geometric multiple, and Zhang Yang was completely accumulated. One kind, don’t look at Zhang Yang’s knowledge of the blue domain. In fact, although the computer domain is divided into red domain and blue domain, there are too many things in common between the red domain and the blue domain.
Thanks to the blessing of thanatos, Zhang Yang's red domain level was raised to a very high level, so that when Zhang Yang came back to learn blue domain knowledge, he could not only describe it with half the effort.
In fact, sometimes Zhang Yang thinks about it and admires thanatos. With his strength, he can quietly invade the North American Air Defense Command and copy the information in it without being discovered by the other party, but he was surprised for five years. Time to train yourself as a rookie, such a person, the mentality is like his computer strength, deep and terrible.
Update is a little late, hey, sleep too much, everyone's ticket smashed! !