I am a hacker (3)

xiaoxiao2021-03-06  95

6. Software Development Department and the War of the Network (1)

If you go to our unit, please find someone: Who is the most cattle in your unit? Most of you will get the answer: it is a person in the network.

If you continue to ask, except what they are? Most of the answers are: Finance Ministry. gosh.

If you ask again, do you have it? The possible answer is: Should it be the Software Development Department?

From here you can see that our Software Development Department is better than that of the financial department of other people's hearts.

In our unit, people include leadership, the part of the network is amazing, because the homepage of their entire day can be seen everywhere. Everyone is in harmony with them all day.

Everyone feels that they are so beautiful with the page that uses the ASP. So, the network partner really thought that they were very cattle, and the tail was a bit! Then it is a guerman who is financed, they do

Salary query system, everyone must use their things every month. So their name is also very good.

Only our software department, developing things, the most cost-to-brain, but developing things generally in this unit is a small number of people. So, no one knows what we have made, no one knows.

Tao us there is something. In addition, the guys in our ministers go to C , go to Java's things. So a general modification registry, network usage skills,

Instead, it is ignored. Not these buddies don't understand. Instead, everyone feels too simple, can't remember, I need to check online, I can't remember it.

Every time the person in other sectors encounters a computer problem, starting to find someone in our software development department, and these buddies are mostly a sentence: simple, go online to find a Dongdong repair

Just just ok. As a result, in order to find the stuff, it took 1 hour. Finally, finally solved, but it is still not as good as the network and the finance department, and it will be done in less than 10 minutes.

. They all made these things all day, so they were more familiar, and they were remembered in their brains.

Our people, each time they complain why they don't ask, how does the API function intercepts, how do VXD written? inverted. Ha ha.

After a few times, the people of our software department have low in other departments, and after the problem, it is almost the network department and the financial department.

In fact, these we don't care. I didn't want to waste time on these issues. Moreover, everyone has their own strengths, they will engage in web pages, engage in registration, and good things

situation. nothing to say. However, there are several kids in the network, always call us, give us small shoes. In this way, our people have opinions, tigers do not make hair, you are really

I thought we were a sick cat? Do you really think that we are not as good as you? Humph!

The software department may be the largest in the entire unit. Everyone is often written, while Down. Yes, there is also a private place. And Down's things are very

Big things, such as Visual Studio 7CD, such as MSDN 2CD, such as Delphi pull. and many more. Anyway is all big. Our only MM is no exception. She is mainly a composition

File. Write procedures are relatively different. But her down is not less than us. For example, the popular garden 2, such as what is blue life and death. and many more.

Everyone is busy with their own things. There is no movement in your small office. It is estimated that it is busy with your own business. Everyone is looking into themselves. I am also on Down Redhat

9.0, 3 cd. At the same time, I listened to the "middle school era", pure feeling, really good. I like this pure music. Next to the buddy, I will sing the "nunchaku" of Jay Chou in Chongqing. Every time I have a feeling of jumping, I will shout: sing again? Sing again, sing, I will sing you with a purple light!

Haha! The buddies sang the last few words and dropped his table. Other buddies laugh. The MM of our department will turn on me.

It is hot with purple light, this sentence is here.

All of us, everyone has a laptop, mainly to bring convenient to the development program. Our devices are all bought by the equipment department. Then, the rookie, I don't know because of patriotism, or

Because it is cheap, it is uniformly bought. The largest problem of purple light is a large amount of heat. At that time, the mm of our department just came later. It is also in the summer, the machine opened a morning is put it on the table.

I didn't have it when I was eating, I came back, everyone gathered together. If you want MM, you may think about listening to us, let's knock some documentation, anyway, she took the purple light and took it straight.

Pick up her thigh. Just listen, "ah" screams, MM jumped up, and the purple light fell. You think, in summer, people MM wear a stockings, a skirt, at the time

This is put on her stockings. I don't know if the purple light is really hot, or the MM is particularly sensitive. Anyway, she jumped at the time. Scared us a few buddies, everyone doesn't know what is going on,

I only listened to MM to touch her legs, saying that it was hot. Everyone understands. At that time, several buddies laughed. Help MM pick up violet light, it is ok, it is still bad. Since then, the purple light is famous here.

. I use violet to death, and I have become the most creative threats of people here. Every time you use it, everyone laughs.

"Yifa, the network does not pass" our mm shouts. Our mm called Li Yuanyuan, and it took advantage of it. Other buddies are all coveted with her. But it seems that our Lee MM is all white eyes.

Serve.

"Really, the *** network" suddenly complained that this started.

I saw it, I really, the window of the flash Get has no green speed line. Head, you have come out from the office, ask: "Is there any network?"

Seeing everyone's complaints, the head is going back now. We see that he is dialing. After a while, he came out: "The network said that the switch to connect our department has faults, blames us.

The amount of data is too large. They will fix it as soon as possible. "

This is already the fourth time this week, and it will come here every day. Everyone hates the teeth.

"Rely, will not switch to fail every day?"

"I really thought that we didn't understand, where there is a large amount of data, will the switch failure?"

"Yeah, the most is the speed slow? Where can I break?"

Everyone started seven mouth.

I know that everyone is correct. How can a switch that might be so easy. Even if you come out, you will not be so easy after you change it. I use the procedures and gateways I wrote.

Establish a connection. Discover the connection establishment success. But it is broken immediately, this time is very fast. For other programs, you can't see it, and the network is not the same. I immediately

White, it is indeed that someone is engaged in ghosts. Obviously, the gateway in our department has been moved. It is also said that the switch is faulty. Is it really bullying we have not played a network? I analyzed it.

The reason can be determined that the router port is connected to the router port to connect to our department. Obvious people are faulty.

The lesson is time, otherwise they are so happy, doing things are not good. I am most annoying is that when I get down, the network is broken. In fact, I am very familiar with the network of our unit. All I have 100% grasp. Our unit is used by Huawei router, R262x series. Oh, the network department

Some people still don't know, I have compiled Huawei router's operating system in a few months ago. In fact, the operating system of the router is relatively simple, more simple than Linux.

. Therefore, when our unit just bought this router, a brother of the equipment department made me help them accept, I took the opportunity to borrow a home, I will put it on the night.

Where did he get a buddy, the buddy is a teaching assistant of a famous university electronics engineering department. Give the router to their laboratory, use that logic analysis instrument, then read with ROM

The writer, basically some of his main things on my disk. Although these things are not a complete operating system. But the code of the criteria should be

about there.

After giving home, I will read the last paragraph when I don't matter. I have an amazing discovery soon. It turns out that Huawei router has a privileged password! In other words, if you want to enter

Privilege, you must enter the correct password. Otherwise, it cannot be entered. Like the computer's BIOS, it may be convenient for their engineers' maintenance. His actually left an universal password.

I completely understand why his manual said: in case you speak the password, please contact Huawei dealer. It seems that their engineers know this password. And each router

Universal portions are not the same. Otherwise, once the leak, the Huawei router don't want to sell. Even if some universal passwords are leaked, there is nothing, you know that router is

Which corner of China works?

This amazing discovery is really excited for a long time. This time I didn't seem to be bad. Because, I declad the universal password of the Taiwanese router that happened to be installed into total outlet routes throughout the unit.

. Haha, you think about it, I have said that I have a Class C address who can change. Haha, it is because of the credit of this router.

Now I just need to enter this router, so this is this, I see that your network is also given to our hob! ?

Thinking of this, my face overflows the revenge acknowledgment. . . . . .

7. War of the Software Development Department and the Network Department (2)

Although I have 100% of the grasp, I want to get the control of the router connecting to our ministry or a matter of time. And the gods that must be doing are not known. After all, it's own, people

Internal contradictions in the people, you will do it open your joke. It's not good to openly. In fact, the network partner is also good. Some network issues are often discussed together. They have seen

There are many things, so I often ask them some questions. But their head, surname Hu, Long and "Kaijiang Scout", the sly, the sly, thin, wearing a glasses.

And our head often go to dry at the middle cadres, because our head is a Ph.D. That Hu captain (the people of our software is called him), but also learning chemistry, because

For amateur hobbies, it is also good to play computer, that is, the master in other departments. Since I used Flash, I had a promotional material in our unit, and the upper person was very happy. when

When there is no software department, the unit building network department is time, there is no other candidate, so the "master" will open the leader of the network. Of course, these me also listen to other veterans.

The characters are said. I also came later.

Of course, our head is later, otherwise, it is impossible to take him. Every time the Hu captain presents them to get the website, and it is not a time. Our head always uses some unable to defecate the truth to reject them. Don't come to Taiwan every Hu captain. You think, China's officialdom is struggling, everyone should have a few people. So, he hates

Our head, and even the parties we have hated together, this is better to understand. With him the theoretical level, I want to make a rich in the world with our head. Hu captain is

I have grown together with our network construction, although other aspects can't, but he is confirmed by the network, which is not blowing. Get a small hand in the router or firewall

foot. Still not a small dish? Don't need other people at all.

I asked my buddies in the network. They said that the password of the router only had their heads, and the router is all of their heads. It seems that Hu captain must have a yin. In fact, this

Some of us, I want to know. Ph.D. The level is definitely higher than you, I can't afford it. Our head is the direction of the main attack is network encryption. Recognition for encryption algorithms

Row. I have taught him a lot of co-reliance algorithms. It's amazing, I see blood, let me understand a lot. More than some shit books. To be honest, some books of the author I

I doubt that he didn't understand it, I copied it.

But our head is not to say. It is not stopping calling to the network, or calling the head of the head.

But now my machine can't go online, more tricks, and no use. Go to the finance department next door, easy to expose. The guy is not understanding for the programming, but you should look out, you will

What to do. Moreover, making a hacker, or the machine is used up.

Take him, first think of the way to talk about it. The Finance Department and our software department are connected to the same switch. This switch is connected to the same router. The network work is working fine. Description

Any software of the software is definitely filtered. The machines of the network are directly connected to the total exit router via a switch. Because Hu captain made IP and network for all units of machines

The card is binding, so IP has no way to change, otherwise, the IP of the financial department can be online.

Ping's computer in the finance department. If you don't afford it, it is really a pass. Obviously not the problem of switches. To go online, I have to find a computer in the finance department to help me. Oh, when

However, the information of the finance department released Server. Speed ​​block, quantity and foot. Ha ha.

Don't break your password, because I have already in the back door before they install patch. But I didn't make anything, I left a back door. Never used it, I don't think it means. but now

I have to use it.

Everyone may say that your financial security is too delicious, how do your financial security guarantees? Oh, their dishes are affirmative. However, this Server does not have our department's wealth

Database. Their databases are uniformly distributed from software to hardware from software to hardware in another separate computer. This Server is publishing information

Specifically, it is to engage in wage inquiries. The salary data per month is used to use Access database COPY, so there is nothing value. Even if you attack, there is no shadow for finances.

ring.

Very easy to enter That SERVER. First look at the installation route and remote access? Look, no! It seems to install a proxy server. I passed a proxy , this thing is small.

And the function is also strong. Everything goes well, soon my machine can go online. Since everyone is internal network, 100M specifications, there is no difference between speed and direct access.

First, we must obtain the password of our router. Then everything is OK. I originally attacked the computer of the Hu captain. The IP of Hu captain knows. But I swept the computer of Hu captan, and his 2000 professional version of the patch added. Not

There is a SERVER. So I am very troublesome. needs time. But now I don't have time, you must speed up the speed. Moreover, he affirmed the firewall. Maybe I will find financial offices

Server scans him again. So, I have to be fast. After all, Hu captain is absolutely "master" level on the network configuration and protection level. Impermanence.

First, a software router is installed on the Financial Server. Then enter our total router, add a rule in the routing table, forward all the data of the Hu captain to the financial

On the software router of the Office, then through the Router of the Finance to turn to that outlet router. Then I installed my own bag filtering software on the router of the Finance. In this way, Hu

The captain's external packet will be recorded, and he logs in the router is usually used to use Telnet, which is not encrypted. Oh, can your password still run?

In order to save time, you must let the Hu captain will send a password soon, so I all dial the call.

"Hello, Director Hu? Our Software Department. Just now our network has been 3 minutes, but now there is no, trouble, do you check it?"

Put down the phone, I started my package filtering software. Sure enough, very fast, Hu captager's IP packet begins to come back.

Oh, you almost laughed. You think, obviously he just filtered out of us. But I am told that we have been 3 minutes, which is impossible. Does he are still unclear?

So I will definitely log in to the router and check the settings. Of course, no problem is definitely no problem. For a while, he may notice. Ha ha.

Sure enough, he didn't have a packet. I immediately recorded the file with the fastest speed DOWN. And restore the settings on the exit router, then remove the financial department Server on me.

All things installed. Then break away. I started to analyze me to intercept the packet on my machine. Because I have a test analysis of Telnet's data package. So password location

It is now analyzed in a messy packet. by! The password is actually ~ i * hate & doctor% zhang. Haha, Doctor Zhang is our head. It seems that this guy is really hate.

I got on our head, even the password didn't forget to remind it. However, this guy's password is a bit difficult if it is decipherous.

Ok, immediately enter that router and open the firewall setting rule. Sure enough, this bastard has dropped all the DROP of the address of our software department. After I deleted it, immediately

Exited, the network immediately passed. Who is with Li MM, cheering: "Tong, the Internet", our FlashGet has started a green line. Everyone cheered a few times and began to make myself.

Things.

I am thinking, do you want to change the privilegemony, let Hu captain go to the dealer. Later I thought, bad. The joke is big. I gave up.

After a while, Hu captain came over. We played with him, everyone said that will not be broken in the future? Hu captain smiled unnatural. The eyes go not to see our screen. Look

This guy certainly found someone to change the router, it seems to come to reconnaissance. I am secret in my heart. But the surface is not moving, and the Java program is edited.

After the Hu captler turned a circle, there was no harvest. out.

I estimate how the people who are unlikely to enter the router with his knowledge depth. As for the decomposed universal password, he cannot understand. I think his only explanation may be

His password is guess by others. Sure enough, after he left, I re-tried to enter the router and failed. Obviously, his password has changed. The head leader is not a fool. The quality of the general network administrator is definitely there.

"Shit" I thought in my heart, and after he re-changed the settings, I had to get the way to get the router channel, talented.

How can I get his password for all, I am thinking. I heard the head called me: "Xiao Wang, come in"

I am shocked in my heart. Is it the guilty of Hu King knowing me, tell me?

I am uneasy into the head of the head.

8. Software Development Department and the War of the Network (3)

Enter the head office and found that he was writing his own things on the table, as if it was a paper.

My heart is put down, and the general head should criticize me, usually I will focus on me. Now he actually didn't lift it.

"I called the phone, I called us to send a decrypted master, I don't have time now, you will go for me."

"What are you doing? I am not a decryption. Is this not your old Bank? My program is not yet?" I have to engage in the router of Hu captain, I want to go.

"It doesn't matter, the workload is calculated, the work of the hand is put down, this is the person who wants himself personally." Head, looked up and laughed and continued to say: "It is estimated that it is also a piece of chicken fry.

Love, probably the machine is infected by the virus, you go to play. "

Heaven, the minister personally wants people, this can not be pushed. Our head is indeed a practical person, and even the minister personally sides, he doesn't want to express it, and I have it. I wonder,

These things are not the things of the network, how do you headquarters called the part of our software?

The headquarters of the headquarters is the *** style, and it feels like entering a star hotel. I directly go to the designated office. Seeing Hu captain is also there, as well as a finance department

The computer is comparable to the guy of the cattle. In addition to the minister, the minister actually held a policeman, which is exactly a very young, estimated 22 female police officers. The police uniform, I feel very sleepy.

Confusion, who is our unit made things?

"Is the software department? How did Zhang Dr. Zhang?" Minister said.

"I am a director called me to replace him, he has something, I can't come." I quickly explained the minister.

The minister did not say anything, start greeting me to sit down, and then speaking.

"This time, this is, mainly our friendly units need our help. This is the police officer of the Municipal Criminal Police Brigade, and one of them is designing to computer.

Everyone helps. Everyone in Block is an excellent talent of the relevant department, and then helps the police, fight crime, and every citizen's obligation, so you will try our best to help Lin.

Police officers do. . . Let's take the police officer and you talk about you. "The person who is the official talks, I know what is going on, and I will relax it immediately. Oh, see what is going on. No

It is thought that today is still in contact with the police, and it is still a case. Oh, fun.

The Minister and the Lin policeman have played a few hahaha, leaving the office. Now we have four people in the house.

I was obliquely opposite Xiaolin police officer, and the minister left, huh, huh, no pressure. I started to take her. Wow, now the new uniform of the female police is really good. Very spiritual. And this forest mm,

How to describe it, it should be said to be "handsome". The round face, big eyes, white skin, short hair, is usually what we say "乖". And the two small dimples are also

Love.

The minister left, there were three big men left, all waiting for her to talk, Xiaolin is a bit unnatural. Look out, she should also just do this soon. After a while, she started to introduce us to us.

It turned out that in all cases, there was a suspect that he had never been explained. And they have no other evidence, only one computer file being added. The police suspect that this document is

It is evidence. So I want to unlock, but this file is a unknown software that is not known from where Down. The decryption program cannot be found online. They have worked hard for a long time.

There is no way to unlock. So I have to ask us to help. Because our computer application level is here, although I know that this is the result of "publicity", it is white.

It is the result of "Buffling". However, they are anyway to use organization relationships, find the door.

I didn't say a word. Occasionally look at Lin MM, and then look at Hu captain. This is not talking to me. I don't want to talk. Ha ha.

"Will it be a Word file with a password? If so, I can solve" Hu captager finally spoke.

I almost laughed out, relying on, if it is Word, the prescribed police team is so happy to move? Is it not said to be said, it is a unknown program that is unknown by foreign DOWN.

"Not, it is a foreign download called Filelock program." Lin MM seems to be a hipster. From her eyes, I saw a piece of disappointment. Probably she didn't expect our meter

The computer master will ask such a line of travel.

"You can search online, usually there will be a decryption program." Hu captain continued.

"But we didn't find it." She stopped, supplement: "This software is very unknown, so we have no way to contact the author, and online generally very small people use this software.

So, there should be nothing to his crate. "

I imagined, the criminal police team has suffered a lot of hard work. We used to reverse the project, but this program seems to be complete, we can't read his procedure.

Order, tracking has also failed. "Lin MM now seems to be confident, and it is impossible to see that our Hu is nothing.

The buddy of the Finance Office did not say, I estimate that he didn't even have it, he didn't dare to speak. Oh, I don't want to talk, I want to see a few brushes in the end.

Ha ha.

Hu captain also saw it, this Lin police officer is not a line. Maybe it is the computer master of their police team. No one is more stupid. It is not used by the inquiry, and the empty call is not used.

He is familiar with the network configuration, but decrypts encryption, I dare to say that he is a line. Because encrypted decryption technology, it is generally not difficult to learn through the system. Hu captain a half-way

Road home. I have been engaged in the network all day. While time to study these. So he is absolutely not too late. As for the buddy of the Finance Department, this is nothing to do with the registration. Instant

Therefore, I suspect that he didn't understand it. Ha ha.

"That's no way, who knows that he uses a deceased? Tibetan is easy, find something difficult." Hu captager began to fight the game.

"Yeah" Lin MM is laughing. Some disappointed. Then routine formula: "Is there a good way to have two other comrades?" Her eyes swept us.

The buddy smile "There is no way, this is really difficult".

Lin MM stopped on my face and asked forget me. I have already started to clean up the notebook in my hand. It is ready to go.

"Can you provide that FileLock software?" I opened it.

I saw Lin MM's eyes on the eyes, I can answer "can, of course. We have this software, you can't analyze it. Can you help us analyze?"

"Oh, I don't know very well, it is far more than your criminal police. However, you can help you see it, it is difficult to say. Haha." The Hu captager is here, what can't be said, otherwise, our network days are not good, wait for me to get your router password, huh, I am not afraid of you.

Lin MM has a smile on his face. In fact, she is also a young man. Just just work, deliberately do more serious. Now, I said this, she also relaxed.

"To the right, let our little king touch, maybe it can come out" Hu captain deliberately said that it is very heavy.

I am smirking.

Everyone laughed and walked out of the office.

I saw a bad face on the face of Hu, even though he was laughing. I think the network of our department is definitely a problem. Making his password must hurry.

I slowly walked out of the headquarters. Considering how to engage in the password of Hu captain.

Just out of the door, I heard someone shouted: "Hey ~~"

Let me look, a white Santana police car, inside a female police called me. Isn't that a small forest police officer?

"Call me? I am not surnamed, my surname." I walked over, "You haven't gone yet?"

"Oh, I know. Is this not waiting for you? Where are you, I will send you," Lin MM is a little smile. "

"I will live in the north, not far, 3 stops" I generously opened the door, sitting in front, next to her. "Go".

The police car was started. There are more Santana in this life, but wearing a police lamp is really ahead. It feels a bit weird. The car is started.

"You help us decipher the program, what conditions and tools you need. We can try it as much as possible. She still did not forget her work.

"What professional are you learning? Is it a criminal investigation?" I asked.

She stunned, then said: "Do you guess?"

"I think you are absolutely learning computer."

"why?"

"Not what is, I think it is. Do you say right?" This is not a mess. The people who learn the computer have encountered together, a few words may feel. Really.

She laughed, did not speak. I think I guess it.

She now speaks more. "Can you decipher this program?" Two people who engaged in computer, don't need to say nonsense.

"You tracked that program, how do you feel?"

"It's a bit difficult, he did it, and there was anti-dynamic tracking. I have been following a few weeks, I can't keep up."

"Does see his password algorithm?"

"Oh, there is no."

"In fact, dynamic anti-tracking these, it is also good to do. I am afraid that I will follow up, and the encryption calculation method is the general algorithm of the world. This is troublesome. Can you decipherive, basically

It is lucky. "Probably look at what I said is really inner, now she completely believes me. And began to pin it on me.

"You must help, this case is more important to us."

"This takes time, I will try it slowly."

I quickly arrived in front of my dormitory, I got off.

"I am very glad to meet you, my name is Lin Ziyan. What is your name, can you give an email or qq? I sent the program to you?"

I told her my name and my phone and Email and QQ. The guest venture says: "Do you want to sit?"

"Next, Bye" Her car has been opened.

8. War of Software Development Department and Network Department (4)

When I was internet access at night, I found that someone has requested it to add a friend. Oh, look at it, the net name is like smoke. Maybe Lin police officials. After agreed to add as a friend, ask, it is her.

She can't wait to send the FileLock program.

I received it. The program is small, 100K is not arriving, only one simple window interface. When I chatted with her, I told the Softice to start tracking. Oh, don't dare to say, but following

Tracking, decrypting encryption is also my strength.

In fact, our national encrypted golden era should be when using a DOS operating system. At that time, I can say that encrypted decryption is the synonym of the master. That era, countless

The master put into the battlefield of this encrypted decryption. At that time, no matter whether encryption or decryption, I thought it was really called. Now Windows, the program is big. More

It is difficult, and the idea of ​​anti-theft version has developed from the technical level to the legal level, so encrypting decryption is weakened. Plus the popularity of the network, the masters have almost turned their attention to the network.

The order of attack.

My encrypted solution is the practice of that era. At that time, the keyboard of the KV300 was decrypted, it was my entry course, Debug is my favorite. Later master graduation papers, I

The topic is to discuss the technology of encryption decryption. The universal decryption technology proposed at the time was also the first in China. My mentor is not admired.

However, tracers are still very difficult. Don't believe some people brag, say that I read a few hundred k programs one night. Also crack. It is definitely bragging.

After I followed a paragraph, I was still very smooth, but I was so deadlocked. It seems that this guy uses anti-dynamic tracking technology. I have an end in my heart. For this procedure, not a normal

Order, you must come slowly. Since this guy writes the encryption program, this guy is absolutely nor a rookie. Those tricks of decryption, he will not know? Inverse tracking, first of all is the backstocking assembly. This one

Technologies are required by encryptors. It is the program that makes you disassembled. You can't read it. However, in theory, the program can be decipherous, because no matter how you transform, you must

The computer can do correctly. But let you read, the computer can be executed, which is easy. For example, add a 1000 meaningless loop. The computer can perform. But you can read

Understand? You don't do it, because the following code must be decrypted by this 1000 loops. You are dynamic, he adds some anti-tracking measures, such as whether there is anything in memory.

Debugger, if there is, immediately refuse to execute. Even let your debug crash. Even more, is to see if it is tracking through execution time, if you trace, your time is sure, directly

Continued, you are sure to short. At that time, the experts, I worshiped the idol, now almost all the people of the IT world. And the following procedures are re-executed,

A section, decrypt a paragraph. Basically, you can only see a small clear text in memory, all ciphertext. To deal with the game, it is really difficult!

I followed the program. His encryption method is relatively simple, which is the method of repeated transformation. The first is to pull yourself multiple transformations, that is, what we said.

And he is not using what ARJ now, what ZIP is added. It is an algorithm to add a whole. This program uses a 3-clock change method and adds 3 layers. These mornings

In my expectations, so I will take off his three shells soon. Now there is any original assembly code. But things did not finish, he adopted implicit calls.

That is, when the programs are called, they are not using instructions such as Call or JMP. However, it is desperate to press the data to press the data, pop up the data, most of which is meaningless data, it is paralyzed you. When you have a head of Sun Wukong, he presses the correct address and transfer it with the RET instruction. You can't see a call and a jump instruction.

I saw his code and there was a code of Softice. Just use Softice's tracking, it will crash. Oh, his trick is older, so I have prepared it. My Softice is

I transformed. He found that he could not deal with his transformation tricks, because you can track it, so what implicitly called, what plus the case, all lose the role. Ha ha.

I will send a message to the police officer; "When did you follow when it is?"

"It is the critical code segment of the shell, my Softice is dead."

Oh, it seems that her Softice has not been transformed. Of course, the dead machine, each decrypted key code has an anti-Softice code. And you can't skip, skip, back

It cannot be decrypted. Of course, you will die.

"Where are you tracking?" Lin MM asked.

"I? Oh, the shell is complete."

"Really? Why don't you crash, what do you use?"

"Of course, Softice, what else?"

"Ah, how do you skip his anti-tracking means?"

"I have been with it, I didn't crash." I deliberately put it. Oh, I am afraid that she asked me that program. It's not good to postpone. The real hacker will not easily put your own tools.

Give people. Moreover, the other party is still a policeman.

"Oh, you lie to me." Lin MM of course knows what happened. I didn't continue to ask.

"How long have you doing a policeman?", I continued to track the program that had taken off the shell, trying to find the code of the decryption file.

"More than a year". She replied, "Do you think it is a despite hope?" She always cares about her work.

"Do you graduate from your school", I am bored. At the same time, I use that software and encrypt a file. Then use this software to open her, enter your password, try to find her

The process of checking the password.

"You check the time, I want to check the account. I can help", I followed a playful smile emoticon.

Oh, I got back the symbol of a red face.

At this time I found the password transformation code break of the FileLock program. At the same time, the location of the password in the file is also found. Of course, it is encrypted.

Just read this password transform code, if it is not difficult to algorithm, it will basically solve it. I am happy in my heart.

"I found password transformation entry". I sent a message to Lin MM.

"Great. Really?" I can almost feel her excitement. She is understanding, knowing that the password transform entry is almost successful.

"Don't be happy too early, look at her password transform algorithm. God Bless You. I have to pour cold water. In fact, to tell the truth, it can track this procedure for a few hours.

The password transform section has been greatly unexpected. It can be seen that this program itself is not very strict, after all, it is just an encrypted program on the Internet. Not a business program, say

It is uncertainty that a beginner encrypted person.

I have been preparing for all overnight battles. It seems that it seems very smooth.

I poured a glass of water and started slowly drinking, while I started to read the password transform program code. According to my experience, I really test the perseverance, because this is

Password transformation, you must read each sentence. Unlike dynamic tracking, you can run automatic operation in large sections. Only you understand this encryption process, you can pass the file through the inverse process

The password becomes a plain text. The password transformation used is usually very complicated in order to be deciphered by others. When writing, the author generally does not use standard way to write, simply, how do you read it, how to write procedures. Anyway, let you read it.

Anyone who reads the procedure of others generally knows that the procedure of reading others is not as good as you write. Now I read the procedure that others deliberately let you read, difficult

I would like to know.

"Can you send me the password transformation program?" Lin MM sent a message.

"Of course". I sent him a screen copy of the code.

I started to read the program. After reading more than half. My heart began to sink.

I am very familiar with this code algorithm, and it is far without what I imagine.

But because of this, I feel lost. I know, I want to decrypt this program, I am far away, I am so optimistic.

The guy written in this program, elsewhere is the own algorithm. His knowledge is obviously not high, so it is necessary to decide the algorithm he created, really for me.

Say, not very difficult. His three layers of shells are not clean after a few hours? The key is this most critical password transform, he does not use his own algorithm.

One of the algorithms he uses I am very familiar. But it is because I am very familiar, so I know that the trouble really begins to come.

I sent a long sigh to give Lin.

"The possibility of decipherment is not large, look at our luck."

"This algorithm is familiar ..." It seems that he is still in the quagmire of reading code.

Tonight, I decided to give up. because I know. Don't give up, there will be no progress.

8. War of Software Development Department and Network Department (4)

When I was internet access at night, I found that someone has requested it to add a friend. Oh, look at it, the net name is like smoke. Maybe Lin police officials. After agreed to add as a friend, I asked, really

she was.

She can't wait to send the FileLock program.

I received it. The program is small, 100K is not arriving, only one simple window interface. When I chatted with her, I told the Softice to start tracking. Oh, don't dare to say, but following

Tracking, decrypting encryption is also my strength.

In fact, our national encrypted golden era should be when using a DOS operating system. At that time, I can say that encrypted decryption is the synonym of the master. That era, countless

The master put into the battlefield of this encrypted decryption. At that time, no matter whether encryption or decryption, I thought it was really called. Now Windows, the program is big. More

It is difficult, and the idea of ​​anti-theft version has developed from the technical level to the legal level, so encrypting decryption is weakened. Plus the popularity of the network, the masters have almost turned their attention to the network.

The order of attack.

My encrypted solution is the practice of that era. At that time, the keyboard of the KV300 was decrypted, it was my entry course, Debug is my favorite. Later master graduation papers, I

The topic is to discuss the technology of encryption decryption. The universal decryption technology proposed at the time was also the first in China. My mentor is not admired.

However, tracers are still very difficult. Don't believe some people brag, say that I read a few hundred k programs one night. Also crack. It is definitely bragging.

After I followed a paragraph, I was still very smooth, but I was so deadlocked. It seems that this guy uses anti-dynamic tracking technology. I have an end in my heart. For this procedure, not a normal

Order, you must come slowly. Since this guy writes the encryption program, this guy is absolutely nor a rookie. Those tricks of decryption, he will not know? Inverse tracking, first of all is the backstocking assembly. This one

Technologies are required by encryptors. It is the program that makes you disassembled. You can't read it. However, in theory, the program can be deciphered, because no matter how you transform, you must have a computer to implement correctly. But let you read, the computer can be executed, which is easy. For example, add a 1000 meaningless loop. The computer can perform. But you can read

Understand? You don't do it, because the following code must be decrypted by this 1000 loops. You are dynamic, he adds some anti-tracking measures, such as whether there is anything in memory.

Debugger, if there is, immediately refuse to execute. Even let your debug crash. Even more, is to see if it is tracking through execution time, if you trace, your time is sure, directly

Continued, you are sure to short. At that time, the experts, I worshiped the idol, now almost all the people of the IT world. And the following procedures are re-executed,

A section, decrypt a paragraph. Basically, you can only see a small clear text in memory, all ciphertext. To deal with the game, it is really difficult!

I followed the program. His encryption method is relatively simple, which is the method of repeated transformation. The first is to pull yourself multiple transformations, that is, what we said.

And he is not using what ARJ now, what ZIP is added. It is an algorithm to add a whole. This program uses a 3-clock change method and adds 3 layers. These mornings

In my expectations, so I will take off his three shells soon. Now there is any original assembly code. But things did not finish, he adopted implicit calls.

That is, when the programs are called, they are not using instructions such as Call or JMP. However, it is desperate to press the data to press the data, pop up the data, most of which is meaningless data, it is paralyzed you. Wait

Even when Sun Wukong's head is also fainted, he presses the correct address and transfer it with the RET instruction. You can't see a call and a jump instruction.

I saw his code and there was a code of Softice. Just use Softice's tracking, it will crash. Oh, his trick is older, so I have prepared it. My Softice is

I transformed. He found that he could not deal with his transformation tricks, because you can track it, so what implicitly called, what plus the case, all lose the role. Ha ha.

I will send a message to the police officer; "When did you follow when it is?"

"It is the critical code segment of the shell, my Softice is dead."

Oh, it seems that her Softice has not been transformed. Of course, the dead machine, each decrypted key code has an anti-Softice code. And you can't skip, skip, back

It cannot be decrypted. Of course, you will die.

"Where are you tracking?" Lin MM asked.

"I? Oh, the shell is complete."

"Really? Why don't you crash, what do you use?"

"Of course, Softice, what else?"

"Ah, how do you skip his anti-tracking means?"

"I have been with it, I didn't crash." I deliberately put it. Oh, I am afraid that she asked me that program. It's not good to postpone. The real hacker will not easily put your own tools.

Give people. Moreover, the other party is still a policeman.

"Oh, you lie to me." Lin MM of course knows what happened. I didn't continue to ask.

"How long have you doing a policeman?", I continued to track the program that had taken off the shell, trying to find the code of the decryption file.

"More than a year". She replied, "Do you think it is a despite hope?" She always cares about her work.

"Do you graduate from your school", I am bored. At the same time, I use that software and encrypt a file. Then use this software to open her, enter the password, try to find the process of checking the password.

"You check the time, I want to check the account. I can help", I followed a playful smile emoticon.

Oh, I got back the symbol of a red face.

At this time I found the password transformation code break of the FileLock program. At the same time, the location of the password in the file is also found. Of course, it is encrypted.

Just read this password transform code, if it is not difficult to algorithm, it will basically solve it. I am happy in my heart.

"I found password transformation entry". I sent a message to Lin MM.

"Great. Really?" I can almost feel her excitement. She is understanding, knowing that the password transform entry is almost successful.

"Don't be happy too early, look at her password transform algorithm. God Bless You. I have to pour cold water. In fact, to tell the truth, it can track this procedure for a few hours.

The password transform section has been greatly unexpected. It can be seen that this program itself is not very strict, after all, it is just an encrypted program on the Internet. Not a business program, say

It is uncertainty that a beginner encrypted person.

I have been preparing for all overnight battles. It seems that it seems very smooth.

I poured a glass of water and started slowly drinking, while I started to read the password transform program code. According to my experience, I really test the perseverance, because this is

Password transformation, you must read each sentence. Unlike dynamic tracking, you can run automatic operation in large sections. Only you understand this encryption process, you can pass the file through the inverse process

The password becomes a plain text. The password transformation used is usually very complicated in order to be deciphered by others. When writing, the author generally does not use standard way to write, simply, how to read

I don't understand, how to write the program. Anyway, let you read it.

Anyone who reads the procedure of others generally knows that the procedure of reading others is not as good as you write. Now I read the procedure that others deliberately let you read, difficult

I would like to know.

"Can you send me the password transformation program?" Lin MM sent a message.

"Of course". I sent him a screen copy of the code.

I started to read the program. After reading more than half. My heart began to sink.

I am very familiar with this code algorithm, and it is far without what I imagine.

But because of this, I feel lost. I know, I want to decrypt this program, I am far away, I am so optimistic.

The guy written in this program, elsewhere is the own algorithm. His knowledge is obviously not high, so it is necessary to decide the algorithm he created, really for me.

Say, not very difficult. His three layers of shells are not clean after a few hours? The key is this most critical password transform, he does not use his own algorithm.

One of the algorithms he uses I am very familiar. But it is because I am very familiar, so I know that the trouble really begins to come.

I sent a long sigh to give Lin.

"The possibility of decipherment is not large, look at our luck."

"This algorithm is familiar ..." It seems that he is still in the quagmire of reading code.

Tonight, I decided to give up. because I know. Don't give up, there will be no progress.

9. Software Development Department and the War of the Network (4)

"It seems that there is a hard process. Do you have enough patience?" I sent a message to Lin police officer.

"Ah, why?" Took a crying face.

"His password calculation is the DES algorithm."

"....." has not responded for a long time. After a long time, I came back. "I can't think so familiar. ~~~, trouble." This person writes FileLock, it seems to be a line, and more professional, his password algorithm is actually used by a popular password algorithm. But this

The general understanding is basically unbearable.

Anyone who has been encrypted, I don't know this algorithm. This algorithm is also visible everywhere in textbooks. The DES algorithm was promulgated in 1977. Almost 30 now

Year time. But it is still useful everywhere. It can be seen that the security and encryption strength of this algorithm are worthy of praise. He uses 56-bit encryption. For ordinary people, decipherment is almost very

difficult.

It is necessary to say that the readers who do not understand the plus algorithm are said. In fact, an encryption algorithm in the world's true encryption intensity is basically public, except for some special places (

For example, the army). That is, the algorithm everyone knows. However, these algorithms one of the most basic features is irreversible! In other words, I know that you know the text, and this algorithm, anyone

You can calculate your password ciphertext. But knowing ciphertext, is unable to launch your plain text. That is, even if you know the algorithm, you don't know the password, you can't repose it.

. This is the wisdom of humanity, this is the charm of mathematics. I don't admire. Why is this, according to my current mathematical knowledge, it is just a known half solution. But I know that these are mathematics home certificates.

Clear. If you want to rebuild your password, it is ridiculous. If you have been pushed, you are basically a mathematician.

Of course, the only way is exhausted. That is, you have a password a one, calculate it, whether it is the same as the secret, if the same is the correct password. But in the net

Inline, if you give you a limit. You can say that there is no way. Fortunately, it is now on standing. Fortunately, I have figured out his algorithm. Fortunately, I can solve his number of times

.

Therefore, it is not completely desperate. But whether it is successful, you will see the strength of the password entered by the encrypse. That is to watch luck.

Since the computer speed is now getting faster and faster, many poor elements cannot succeed, and now there is also possible. So now have a longer password algorithm to replace DES, ratio

The MARS algorithm such as IBM is one of them. If you encounter these algorithms, I will definitely give up immediately.

"What should I do now?" Xiaolin MM is obviously a bit anxious. I think she is sure that she has solved it, and now I am actually encountered such a powerful obstacle.

I found that a woman is a woman, don't look at Xiaolin wear a very prestigious look, but now, it is clearly reflected in the side of the woman's weakness. In fact, the police are also people, they have

A strong shell, but the heart is still the same as ordinary people. Ha ha. The best match between two computer masters should be a man, because men generally don't jealousy women, and women feel male

People feel natural than her own. So, this is nothing to do so, and I like this, I like this. I most hate my fake.

"What is the computer level of the encrypted file?" I sent him a message.

"According to our information, he is learning financial management, using a computer, but it should not be a professional."

I have a number in my heart. This guy knows how to go abroad to Down encryption software, indicating that his computer knows still a certain basis. But after all, it is not a professional computer. general

Said, the depth should be limited.

"You have analyzed his computer, such as his Email password, his password on the online regular place, such as his length of Windows password, and the characteristics is not analyzed." I sent a message to the past.

"Of course, the password he is in the evening is generally characters and numbers, and the length is generally 6. His WINDOW's password is only 5."

I understand that it seems that this encrypted person is not particularly concerned about cyber security. Otherwise, his password will not be set short. In this case, the password should be exhausted.

Not completely no hope.

"OK, wait for me to write a program, you find a good computer to run a run, maybe you can run the password."

"Well, when will the program give me?", This forest mm is definitely an acute child in this area. Ha ha.

"When I will get off work tomorrow."

"OK, tomorrow, I will come to you."

"Your police make things, good fake?" I started to tease her.

"How do I fake?" She responded very quickly.

"Not saying you, I just saw a bank's anti-robbery exercise on TV, a robber and security guards were not afraid, and no matter the death of the hostages, they directly puff them directly.

Go up, play the group, directly pressing the gangster. Haha, if you really gangster, are they not afraid of death? Even if there is, is this stupid? ".

"Oh" see what I said is not her, she may be relaxed.

"The exercise is like this, do you want everyone to really use the live, really kill people." She began explaining.

"In this case, there is no need to perform on TV, this is the image of your police."

"Oh" she didn't explain again. Say "I want to sleep, bye". After a while, she disappeared from QQ.

I haven't slept yet, I am hot, and I write that decrypted program. Using standard C syntax, use the character interface, this program does not require interface friendship. The password policy is then set

, 6, 5, 4, then 7, 8, 12, then 3, then continue 13-. In this way, according to the characteristics of the encrypted person, it should be large.

I have written many times before this program, so I changed some of the previous procedures, and OK. Save to my FTP. At that time, Down gives her, let her use a computer, I

The task is completed. It is not enough to see how many passwords added by the encrypted person. I am not a god. I can't solve it.

It's almost 2 o'clock when I sleep. I often sleep so late. In the dream, I actually dream of got the password of the Router of Hu captain, and Hu Chenju only changed, I will know it.

Dao. How do you know, don't know, dream is not reasonable, isn't it? Ha ha.

Hu captain, you are coming. I don't want to get you, I am not willing.

10. Software Development Department and the War of the Network (5)

John Doo's getting up, hurried to work.

Just arrived in the office, the head called me in.

"I just called, I want you to help the police will do things well, don't lose our face. The work in the hand can be put down." Head smiled and looked at me. I estimate him.

I know what happened.

"What is the problem, there is still a police?" It seems that he doesn't know the details.

"In fact, there is nothing, it is to solve a DES password." And the inner line is simple. I will understand it.

"Solve DES, this East, Hu captager knows a fart. How is it? How much is it? Our machine speed may be too slow." "Yes, I don't care, write a procedure to let them find the machine to decompose. Don't do it, look at luck."

"Oh, now the speed of the machine, DES should be a problem later." Head is indeed inner line.

"Okay, your current task is to give the criminal police to solve this problem." Head finished his papers and went.

From the head office, everyone is complaining that today's network speed is slow. I opened a flash Get, but not, I used to download the speed of more than 100 KK before, now

In actually less than 10K, browse the web basically can't feel, but we download the software feels very obvious. I suspect that it is also the Hu Director in the ghost. However, the network is slow.

normal. So I dare not determine. Run to the finance department next door, saying that it is a bit slower when the network speed is? The financial office said, fast, faster than yesterday. I personally download the same software,

Sure enough, it is about 120K. Soon, relying on, Hu captain strikes to be poisonous. Let you browse the web, but download is slow. We slowly so much, no wonder the financial office said that it is faster than yesterday.

It seems that you can't let go of Hu captain, don't get his password, our network seems to be never yet.

To get the password of Hu captan, you must have to attack his computer so that you can install the back door software, no matter how his router password is transformed, but flee my master. But this

Guys are not rookie. His personal computer protection is very good, did not open any service, and the empty connection was banned. I want to attack directly from the Internet, obviously unlikely.

What should I do, I am thinking. Suddenly I saw a female police entered our office.

After the female police asked Li MM sitting at the door, I came to my desk. Other buddies include Li MM standing up. Everyone is so stupid to see this female police step by step.

We follow.

Everyone is confused with each other, and there is a buddy, I can't help but. Just asked Li MM: "Xiao Wang, what is the case?" Li MM shook his head, although he deliberately lowered the sound, but I still

It was heard.

Rely, this black pot can be made back.

"Dear, this is the police officer, looking for me to help them write the program." I said loudly. I finished, everyone "cut", haha, laugh, then shrink to his desk

went.

Xiaolin police officer heard that I said that I would like to see it, she tried to turn to everyone, but she didn't see it when she turned back. Her mouth is moving, smiling, swallowing

.

"Oh, isn't it said that after get off work in the afternoon, how can I come so early." I hurriedly greet her.

"Don't wait for the case, the sooner, the better, we have already greeted you, your current work is helping us." Xiaolin said with a smile, now she obviously talks about me casually.

. If it is completely suspicuous at the last time, then it is basically the attitude of trust.

The face of the criminal police team is big, it is no wonder that I just said to me. No wonder, she now comes directly to me. It seems that the relationship between them and our ministers is not general.

The minister has spoke, what else does I say? This work is relaxed, it is a good difference. Ha ha.

"Your program is not written?"

"OK, I will give you now?" My hand touched the computer keyboard to start tapping.

"No, or you will take me with me"

Halo, when I am a prison, I will take a look at you. I almost laugh.

Seeing that I am laughing with a smile. Lin police officer immediately understood. Don't mean it.

"Sorry, professional habits. I mean, you and me go to our computer room to install debug, save trouble. Ok?" The minister said, what can I say, go out to see the machine room of their criminal police? I am also curious. The people of the criminal police team wearing a police uniforms, and they are really very good. Ha ha

.

Let's go, don't talk. I am going fast, surpassing her little, she is anxious.

When the door was out, the guard actually looked at me. It is exactly to look at us. I actually didn't ask me to enter the certificate. To know that the SARS period, our access is that the ministers are going to be certified.

What's more?

But today, the guy did not ask me, he saw a policeman followed, of course he also saw the police car outside the door.

When I saw a police car, I got the eyes of the door to see the eyes, I immediately understood it, and the grandson really thought that I made something, this police is to catch me?

by! I licked your eye, I invited me to the police. I almost laughed out. Haha.

I got a car, I said the first sentence is: "When you come to me, don't you wear police?"

Xiaolin MM stunned for about 10 seconds, then laughed. Laugh on the steering wheel.

I first saw that Xiaolin police officer was so laugh, I feel that this is a girl, I feel that she is not a policeman. I am so happy to see her laugh, I also laughed. She laughs and more powerful

.

On the way to the Public Security Bureau, Xiaolin MM will look at me again. I am deliberately, she looked at the front of it.

The Availability of the Office Building of the Public Security Bureau is a passish. I used to see it outside, I have no friends of the Public Security Bureau, so I have never come in. Now come in, see all the police

Service. Just a casual. It's really not yours. I got on the elevator and I went directly.

The elevator is two people, or I am orphan, I am more uncomfortable.

The scribbled words "" You live so high, really happiness ".

She laughed. Why didn't I find out how this Lin police officer smirk. Is it a particularly funny person?

I have come to their office soon. Seeing a university 30 years old, it looks like a police, like a university teacher. Warm and greet us.

"This is our kind introduction of the enthusiasm of Xiaolin police officers.

"This is a master of a certain computer, Xiao Wang" she deliberately said that the two words of the master when I introduced me.

I glanced at her, she laughed.

I quickly shake hands with Li Kemist.

Li Kezi is very enthusiastic.

"Xiaolin, you take Xiao Wang to our computer room to decrypt. Need any equipment, you tune it. We fully support."

Then we came out, I saw the signature of the office: Information Safety.

I am most afraid of dealing with people. Although the people of Man Li look very well, and it feels more embarrassed. But I am not comfortable.

On the corridor, I am free.

"Hey, I don't have to introduce me in the future." I am innocent.

"Oh, what are you introducing you? Are you not a computer master?" Xiaolin was spent.

"I am not anything. I am Xiao Wang .ok?"

Xiaolin still laughs.

"You are Li Ke, it looks like a police." I started to transfer the topic.

"Oh, he is the highest credit of our public security bureau, a doctor of a certain university. Engage network information security."

Day, there is a fight with our head. It seems that the Public Security Bureau still has talent. I spit tongue.

To be honest, the Public Security Bureau in my heart may be in many people. It is considered that they are all "crude people". Most of them are team military people, and the graduates of police schools. So, I didn't expect it.

I actually encountered a Ph.D. in a famous university. No wonder I think he is not like a police. Because he is not like the police in my heart. However, everything is changing, the country is also changing, the Public Security Bureau is also changing. Later I learned that the Public Security Bureau is also a place to hide the tiger.

Already reached their room. The door is hung 1 information security department's brand, and there is a warning next to: the machine room is heavy, free people are excessive.

Go in and see, see a slippery desktop machine, see an IBM notebook on the table. There is also a skilled person sitting in front of your desk. I have seen it, some people are online.

Some people are analyzing the program, some people are writing procedures, and some people are debuging viruses. These I am very familiar, I will see it. The person who debug the virus keeps talking over

Track, one side shows the effect.

After Xiaolin entered, some male policemen were only loaded with shirts, and their coats were hanging on the back chair. Everyone hits her. joke. This is normal, the girl is affected in the office.

welcome. Especially when men and women are seriously imbalanced.

Xiaolin and they laughed after a while, pointed at me whispered: "This is the decryption master I invited to the computer, we are to solve the password of that file."

I glanced at her, but it was late, a few big masters' eyes were flourishing like a knife.

Everyone should know that the peers are the truth of the family. These people are specializing in computer. And it is in the Public Security Bureau. Originally, the bull's choice. Now someone is open to the board

And when you are in the face of MM, can you say that they can be good? Uncomfortable in my heart, can you friendly?

"Oh, don't listen to Lin police officers, I just came to learn. No way, leaders let me learn, don't listen, I am far more than you." I smirked.

Everyone's eyes are good. Everyone started to play haha.

I took the time I won the little forest. But she did not see it. I am looking at other places. We started working. I quickly put my program Down through their network.

Down.

"Need a machine to run password" I said.

"What kind of machine?"

"Of course, the faster, the better," I said.

A man-like person thinks about thinking, saying: "Our Coang has arrived in an IBM's latest server, and has not been put into use. Do you want to use him first?"

Xiaolin said, good.

One thing IBM machine was hugged.

I look at it, rely on! The Public Security Bureau is really rich, hey, the country's money is not painful. This is a server for IBM's latest XSeries 440. We have never used it. I am only only

It is a photo. Don't look at where the black housings are placed, it is not eye-catching, but the performance is absolutely not said. I am looking at the configuration, squat, double CPU 2.G to strong MP, 2G memory.

The administrator also asked me if it was used? This is used for database servers.

"It's enough, enough" Halo, this machine is not enough, what is the machine enough.

Pack the machine and look at it, dizzy, actually straighten it yourselfself is a Windows XP Datacenter version. Ok, Window XP operation is almost. So I will not be ugly. its

I am also the first time I use the Data Center version of XP. Fortunately, several police brothers who estimate around them are also used. Because they are behind me, don't say a word.

My self-confidence in front of the computer is absolutely.

In fact, for this program, using XP is completely wasted, using Data Center is more wasteful.

But now I don't care so much. I can't give them a new operating system.

I decrypt the console to decrypt the program down in Windows2000, Copy to this IBM. Then Xiaolin took the documents they need to decrypt to Copy. I open the console, enter my program name, follow the file he want to decrypted as a parameter, a car, the program starts to run. Start flashing a string of numbers on the screen.

Hey, it is a top Server of IBM. You can also see the numbers displayed on the screen when you run on my machine. But now, the screen is a white, I can't see it.

Number, because the display is too fast. It's really fast.

I really had the urge to move this server home.

I love to leave the computer, stand up. The ancients said that the sword sent a hero. I am a computer worker, but I am even more excited than seeing a good computer.

"Okay, let the machine have been driving, don't stop. When I won't flash, it is the day of the password."

I saw that several police brothers had obviously impressed the meaning. Because this program they have been working for a long time and have not succeeded.

The police who just tracked the virus said: "What is the algorithm used by him encryption."

"DES" does not have to be nonsense.

"This program is the anti-tracking means is powerful. I can't walk with it."

I smiled and didn't speak.

And Xiaolin police officer out the door of the machine room. I said: "You are really money, such a good machine is used."

"Oh, this is all superior."

"Nothing, I will go back, wait for the password, inform me, let me also satisfy the vanity."

Xiaolin laughs. Oh, laugh. Then look at the table and say: "No, go to lunch time. I invite you to eat, thank you."

"Don't come here, I am innocent."

"Oh, what is it, just eat a dinner in our cafeteria, not in the restaurant"

"Waiting for the password, I officially invite you." Xiaolin MM said with a smile.

To be honest, I want to leave. But Xiaolin has already pulled me to get went to the food hall. I don't want to find an excuse.

Now Xiaolin and I have already mixed it. She doesn't work with my guests at all.

Hey, look at how the public security bureau is, it is good. I thought, wait back, talk to the bodies, in fact, the public security bureau is not as good as us. Ha ha.

11. War of the Software Development Department and the Network (6)

I swear, next time I kill me. I will not go to the Canatus of the Public Security Bureau to eat. Especially when wearing casual. I still have uniforms? Ha ha.

Anyway, just don't go.

You can imagine a cafeteria to come to the hundred people, gray, black police uniforms. Is it a feeling of being in a casual?

Usually, there is also a casual, I think. But that day, I did not see one, except for the master inside the kitchen. I will wear it alone.

And most of them are a male policeman. Everyone eats me as a taste. I think.

I and a female policeman faced. The male policeman saw me. The face is a bit hostile. The female policeman crowded with Lin police officer. I don't know what it means.

I know that it is like this, I will not come.

However, it will come. I buried my head, I want to finish the rice soon, so get rid. This taste is really uncomfortable.

However, I will realize that I can't do this. You think, you get up in the cafeteria of Shanghainese, walk out of the door, pass many tables. Then accept the baptism of everyone, more

Miserable. The only way is to let them go first, I have time, I am not moving. Ha ha. So, I will have a little eating immediately, and I have to show more than the college girl.

In fact, these are all my own thinking, people may not take me seriously. Anyway, I am not comfortable. By the way, what to eat tomorrow? Rely, I really didn't pay attention. It seems to be a powder steam, there is a egg soup, and a fish-flavored meat. I really didn't impress it.

The taste is, halo, there is no product at all.

I don't remember what I have said with Xiaolin. Anyway, there is no sentence.

Xiaolin has been eaten very early. Look at me to eat.

I think I am very laughing at the time. Almost there is almost the same side while eating.

I just remember that I asked a very funny words.

I said: "The Public Security Bureau does not have a casual clothes? How do you wear uniforms today?"

At that time, Xiaolin laughed.

"Here is a office building, generally not attendance. Of course, we will not wear clothes."

I have been waiting until people walk. I made my eyes on the eyes of Xiaolin's eyes, and immediately said, I ran out of the garlant.

When I went to the gate of the Public Security Bureau, I was easily. Suddenly I feel that freedom is good. Halo, it is not a prison, what freedom is coming out.

Oh, anyway, the feeling is good.

Under the "escort" of Xiaolin police officers, I returned to the unit. The police car, walked to the gate. Really looked up with chest.

That guard apparently recognized me, because the police car should evoke his memories, the grandson is surprised to watch me, there is no saying, but I still didn't ask me to enter the certificate.

.

Later, all the security papers have never asked me to have an entry. I do not know why. Just don't ask me.

Go back to the office, naturally, you can't have a trial of your buddy. Even Li Yuanyuan, who our office, come together.

I said: "The beautiful woman of the Public Security Bureau is much, the public security bureau is really fucking, the public security bureau's equipment is really grandma." In fact, in addition to the truth I said, others are teasing.

They play.

Several buddies said that they were flowing out. I said, give me how to introduce one.

Li Yuanyuan said directly to the other buddy clouds.

Everyone played, and then began to make their own things.

I have always been a router password that I have a long router. Now calm down. See the download speed of the network is still around 10K. My gas is not playing. You are not benevolent, don't blame me.

. Less less, you must make some meaning of the point.

In fact, hackers are not in the performance of many works. A machine that is not open, even the prohibited machines are prohibited, that is, you have a big thing, how do you? network

黑 黑, you will be more powerful, you must also abide by the Network Communications Agreement, you must also communicate with the other machine. Remember a company in order to show your server security, actually hacked hackers

attack. But everyone scans it. It's not working at all, and the connection cannot be established. The service is not open, do you say this is not a lie?

Attack a server and attacked a well-known personal machine. I think the latter is more difficult. Many people don't want it. it's actually really easy. Server, he must be more perfect, he must

Consider the user's use. For example, the user's ability to use, the user's efficiency, etc. He must have a port to allow connection. Otherwise, how to provide. As long as there is a service,

Allow foreign communications and connections, there must be a vulnerability. The operating system is not, the service program is. Anyway, someone will find a vulnerability sooner or later. But the personal computer is different, he only considers him to visit

Ask others, he does not consider accessing others at all. Therefore, do not open the service, prohibit external connections. Almost do not open an excess port. It is really difficult to break this machine. Of course, the kind of secret

Personal computers that don't set up are no longer discussed.

The computer of Hu captain is a strict personal computer. Although Hu captain did not understand the principle in terms of the network, you told him to compose a more complex web program, he definitely not play, but network operation, network configuration and protection, he is absolutely not a rookie. And it can be said to be a master.

Our unit's computer scanning is not me alone on his computer and network department. It is the buddies in their network, usually often take a test of his computer.

At the beginning, Hu captain will respond to the strict protection of its computer protection. I remember that I first swept his machine, he found out. Improving the letter of WINDOWS

I sent a message: "Don't attack my machine, I don't like it!" I returned "I just checked the security. I didn't attack." Later, there may be more people to scan him. That guy

Numb. It may also feel more secure. I will never pass what the messenger service will send a message.

Sentence truth, many people think that Windows is not safe. I have my own opinion. In fact, the security of Windows is not good in the ghost IIS, and it is the default configuration.

Safe. Windows is really configured, nor is it so unsafe for everyone. I strongly recommend that you don't need it. He is often the maximum generator of security issues. and also

It is a Windows IPC $ empty connection. It is also a hacker's breakthrough line. There is also the information leakage problem of Windows. In fact, these are all solutions. But the default setting of MS does let me

Despise. His default settings, the security issues mentioned above exist all. Haha, attack a Windows computer that is default settings, all people who know a little computer, almost no attack

broken. This is fine in our UNIX and Linux. The default setting for the Linux system is basically very strict. Basically, you can't make you have a chance. Window's biggest failure and maximum

Work is: Hide too much about it.

For professional users, hidden things, professionals can't know how the computer has opened those ports, what is the role of these. This is the root cause of professionals despise MS.

For ordinary users, this hidden is very popular, but his default settings have buried too many vulnerabilities.

Unix and Linux are good. You have opened WWW. If you scan, you will find that only 80 ports are basically. Clear clear, clear. The administrator has the bottom of the heart. So, on the server

I think UNIX and Linux are essentially better than Windows. One of my buddies and classmates said. He said: "Microsoft is easy to use and function first, and then consider safe. And UNIX and

Liunx is to consider safe and stable first, and then consider easy to use. "I thought it was a needle.

Of course, in the personal calculation of the operating system, I think Windows is the most successful. This is not unknown. MS has today, it is absolutely not blown out. Still relying on strength and market strategy

The Huali's computer is a machine that has been carefully modified with Windows2000. And the virus firewall and network firewall are also installed. Sentence truth, I can't access it. Really. he

All the machines all make up, and no service is opened. Empty connections are also prohibited. So, I want to make a machine basket screen, I think maybe it. But want to enter his computer security

Set up a back door. I can't do it.

The hacker is like a magician, and the outsiders look very magical, but tell you the answer, you will find that its practical is some principles. Nothing is magical. Hacker and magic

The techniques are people, they are not God.

As for the network, the swing is swayed, and the captain of Hu Hu is not there, and give him the back door. It is not impossible. But that, it will be discovered soon. I was found. There is no meaning

Righteous. He is not a fool, he reloaded the system, I see what you do? Moreover, this way, I am a little bit no, you are not as good as directing his head with a gun, told him to hand over the password, I think he will not pay, huh, huh.

I am particularly annoying some obciator and idiot director to establish a hacker image in many people. They can always want to enter where they can enter. I want to get information.

That is, their thinking is: understanding, there is network = can enter = can control everything. Of course there is more idiot. No matter whether there is a network = can enter = can control everything

. Even the other computer smoke and explodes. Oh, I have only laughed. These idiot's imagination is not blown. What to turn people on others on others' accounts. what

Stealing the latest information to pull the military. and many more. Even Iraq is a hacker's credit, etc. All *** fart!

In fact, do you know which hacker in this world has made a fortune through hacker? Anyway, I know not.

I just know that a lot of hacking is actually a bad. I just know that the good hacker is the safety adviser or security expert as their home.

Said wearing, the computer is a bubble, he does not directly create wealth. In the case of fighting, he is absolutely nothing to eat when you eat. He is a bunch of waste

iron.

There are many restrictions on the Internet actually. Not what do you want, how is it. Even if you teach you yourself to install and debug a network, there will be a lot of trouble. What is more than authorized?

In the case of, what do you want to do?

You really thought that the network designers, you really thought that the network administrator was idiot? If you think so, I tell you that you are an idiot.

You really think that the bank's maintenance personnel, the design person of the bank system program is idiot, you want to transfer, you want to wipe the data? Do you want people to be paralyzed? These designers

Is an expert in that field. The problem of studying people in a lifetime, letting you say that it is a drill point vulnerability, the most is a debugging expert, the hacker is so easy to break?

Even if you have successful transfer. Even if you delete the data is successful. I said even if I said. What's the matter, can the money come in your hand? The backup system of people, the wrong check system of people. People's review department

Do you think it is true? Do you think that billions of telling you to turn? Joke. A big joke.

It is to retreat 10,000, you have succeeded. There is still the last trick, people give you the network cable. People don't give you a service. You are amazing, you can fight.

Home owner?

In fact, the vast majority of hackers in the world is a drill fly, and it is "secretly enter, don't shoot." But it was found to be late and later.

You have seen the banking system because of this bankrupt, stop business. Obviously not?

Because the banking system is all unified solutions, almost no hairs can drill. Even if you come in. There are still many measures waiting for you. It will be discovered soon, very fast

It will be corrected. You have no chance at all. As long as you pay attention to you, you are not there. Many hackers have successful because the other party does not pay attention, and the measures are impossible. Of course these places are general

It is also some unimportant computers.

So, I have no way to the computer of Hu captain. No, no. Not afraid of you joke.

However, the computer of Hu captain is strict, and other computers are not necessarily strict. It can be said that the computer of our department, in addition to the network, all the SERVER of other sectors is basically controlled

. Because they are not professionals. Later, the people in the network talked patch and changed. Oh, but for me, it is late. I have already paid behind the door. So even if it is like this

I can enter it.

My back door is written by yourself. Small and delicate. It is directly inserted into the code to other process space. So, you have nothing to do at all through the process. In fact, it is a virus. However, this virus is not destroyed, not infected. But you can do my internal should. Since Windows is protected by storage, that is, your other processes or process permissions are not enough, you are

Method Access to other spaces. So the general people will leave a process. But my program is a modified Windows kernel, so the one is 0-level rights, which is one of the operating system.

section. The general people find it all. Especially the Windows system is so complicated. Many people don't understand what this is what should be. It is impossible to find it.

. But to communicate with other system, port is definitely necessary. This experienced person scans a sweep with ports, which can generally see more ports. Or the system has not been opened

How did you open?

Due to this technology, I have been abolished for a very brain.

But in the end, I still came up with a way. Successfully solved this problem.

In fact, port scans are to establish a connection with the other party. If the connection is successful, the port development is indicated, otherwise it is not developed.

Due to ordinary network programs, they are all TCP / IP standards, so of course you open a port, and the program can be connected.

But my back door, I intercept the connection function. And intercept the packet. If the packet is not my special data. I know that it is a normal scanning software. I will not respond. then

The other party thinks not to develop this port.

If it is my program, I have a special data identification. My program will respond. In fact, these truths are all known.

So, I installed the latter program, even if the buddies of the network, Hu captain used the eighteen weapons to check, still did not find any abnormalities. But the machine of the network,

Blocking the vulnerability at the beginning. So I have never had a chance to go in the back door.

Now you can only pass the other machines, see if it is a bit progressive.

I went shopping online and enter the equipment.

A window will pop up and say: Please contact the responsible person to download the device report generation program at the device office and submit the device report as soon as possible. At the date of see, it was just issued.

My mind is a flash, hurry, and Hu captain must also download it. Must dare to do it in front of him.

Thinking of this, my hand began to skilled the keyboard and launch my connection. I want to connect the server at the device.

The latter door is still there, the gangs are more dishes, and they don't have the server to play.

Use my client to connect. Command.

In fact, the character interface is absolutely the fastest. I always think so.

My finger keeps flying, familiar with the directory of the device report generating program.

Then download to my machine and put my back door program with an EXE bundle to put him together. Soon the server will be replaced with me. The file size is 100K left

right.

However, it is impossible to discover abnormal file size in the level of devices.

I took a breath, and I stopped my client to start scanning. I hope Hu captain didn't download before I did it.

Obviously the departments have seen this notice and download and run. Because my client shows more and more display.

I am very familiar with IP distribution in our department. I saw the Finance Department, I saw the logistics, I also saw the IP of many departments and departments. However, the IP of the network has not yet appeared.

Is it so fast?

I am thinking, a familiar IP jumps out.

Hu captain's IP, I almost laughed.

The head of the dog day, you are smart, today I also have my care, now I am afraid of you, your computer is in my control.

Oh, as long as you log in to the router through this computer, huh, your password is still running? I know that Hu captain is absolutely only on his own machine. His security awareness is still there. Ha ha.

12. Software Development Department and the War of the Network (7)

I saw that Hu captain's IP appeared in my monitor program, I know that Hu captain has run the report generation program with my back door program. My program is already in his program

Take a root.

I sent a test signal in the past and I got a response. Haha, it's right. My program has begun to have an effect.

When I first packed the report generated program, I have already played in the super terminal shell program. This shell is actually a record keyboard tapping information.

WEAT. very small. There is also a program that the other party's firewall is to be destroyed by the WINSOCK function. Otherwise, I will intercepted by the other party's firewall. In fact, firewall

In fact, it is a hook of a Winsock2 function, which is equivalent to interrupt interception under DOS. However, there is no concept under Window. Change the function.

This is not difficult for me. It is very difficult to break through the firewall from the outside, but it is not difficult to work from the inside to the firewall. No matter what firewall, I will let you

If the interception of the Winsock function is invalid, you basically.

As for the virus firewall, it will not have any influence on communication, so you can no matter what him. These things I wrote, and those virus firewalls are not used.

I open the monitors of the other party's super terminal. There is no response. Needless to say, the other party is not used.

It must now be used to use it.

It's ok. He always uses it one day. My program will record his keyboard to the file. I just wait, it will be.

But I can't wait. If he doesn't move the router for a month, do we endure this 10K download speed in a month?

In fact, I want a speed, I can make a proxy through the SERVER of the Finance Department. But always think, the result is the same. But the nature is different. I just want to control myself, I also said

Unclear is a hate Hu captain, or in fact, I want to confirm my strength. In fact, some people say that hackers are essentially self-satisfaction. I have some agree. Overall

The division is a hacker for hackers. They have never thought about the matter after entering your computer, and they enjoy the black process. It is the challenge to own technology and wisdom. Real hacker

In fact, it is for technical challenges.

I can't call this time. Because this time I called, plus the last time, Hu captager will definitely doubt it to my head. Moreover, these days, he should also know that I will decrypt the public security bureau.

thing. Basically, we know that our computer people know this matter. I have seen me now, and my eyes are not right. I can't say anything about it. Anyway, I seem to be abnormal.

kind.

There is also a rear, diligent buddy called, and told me to help him activate the pirated XP. I am dizzy, activating XP patch is everywhere, put me as a million oil? I said, I won't. That brother

They also said: "Rely, even the public security bureaus is looking for you, solving XP is not a small dish?" I can't laugh. " XP I also got, but I am caught. I could break the time and activation at the time.

limited. But I can't let him activate online. Unable to activate will not be upgraded. Now that the online crack is very perfect, I am too lazy. I am this temper, there is online

, You can meet yourself, I will never write it yourself. Can save the province.

Who is looking for? Looking for his head, obviously he will not care about me. Not good. I want to think, I think that Li Yuanyuan, the Ministry of Development, is the most appropriate. Because Hu captain knows her program design again

The Ministry of Development is the weakest. She was originally a document. Should not doubt that she can enter the router.

I thought here, I took the documentation to Li Yuanyuan's table.

I asked a document question. She explained. In fact, I deliberately asked. This is natural. Ha ha. "Yuanyuan, how is your FlashGet download speed" I deliberately asked.

"Oh, don't mention it, it is slow. Talented 10K."

"Take a call to the network to ask. You have not called, everyone is hit, it is to give them pressure."

"Oh, this network is annoyed. I can't read my series."

"Just, call" I keep ignite ignite.

"Well, how to say"

"You said, our network will download the speed of 90K, and then 10K's speed, ask what happened? Hehe"

"Oh" Li Yuanyuan is happy. "Is this not ignorant?"

"It is to ignore them, they are too much." I am also happy.

"Good" Yuanyuan smiled and grabbed the phone.

Seeing her pick up the phone. I quickly returned to my seat. Take my monitor. If you don't expect it, Hu captle should come back to the router soon.

Seeing that Yuanyuan said again, then put down the phone.

Sure enough, less than 5 minutes, the monitor has begun to appear instructions. Because this time is directly monitored his keyboard, there is basically no useless data. Basically, he will re-ended

Enter the command. It's really an eye.

After seeing him into the enable command, I am essain. This is a command to enter the privilege. Behind the router password. Ha ha.

Out. His password is longer, I want to guess it is impossible. I will write a password. Continue to look at his operational order.

I saw him showing the firewall settings and routing tables. After he went out, I immediately changed my backward program into document recording. Then quit the client program to

After that, as long as he change the router password, my program will automatically record into the file, I can pass the file back to see when I need it. Each file will overwrite the last record, so no

Will produce an excessive problem.

I am very relaxed. So many days is finally solved today. In the future, huh, huh, the router is in my control. Ha ha.

I am going to the router to cancel the limit speed. Our FlashGet rushed immediately.

Li Yuanyuan called. Said: It seems that there is no power, I have a phone call, the network will pass.

We all said: Or is the charm of Yuanyuan, and later this glorious task is given to you.

Although Yuanyuan turned over to us, it was still beautiful in his heart.

Only I know what is going on. I am so funny. It is not afraid that the Hu captler changes the password. Haha.

Just is beautiful, the mobile phone text message is coming, and it is Xiao Min. Ask me how much? Say to come to me on weekends, a little thing.

I will have an OK. I am comfortable today. Put on the headset, point the nerve of Yang Jiasong, the song floated.

This time is definitely not a dream, you make me an inexplicable impulse. . . . . . . .

转载请注明原文地址:https://www.9cbs.com/read-105734.html

New Post(0)