I am a hacker (2)

xiaoxiao2021-03-06  84

2 . I broke the US Navy website (1)

It is the administrator named Caption Tom into my goal. He is just the BBS administrator, everyone everyone is online, you should know that BBS administrators do not necessarily be responsible. usually

It is the ability of BBS's theme. For example, this BBS is singing, his administrator may be a master of singing. I haven't figured out that CAPTION TOM is responsible.

Administrator, I just care about his password, and his upload authority. It seems that he is definitely not engaged in technology, otherwise it will not be so unhappy, let me drill the empty. I am really true.

It is a bit despicable, I am really sorry. Oh, no way, who told me "hacker", in order to attack this website, you must do not want to ask for a means. Let those "hackers" use *** mobile phones

Can be attacked to the "SB" director of the people's military website to see the ghost, hackers are people, not playing magic!

With the goal, I started to have a spirit, this spirit can definitely don't eat in a few days. First of all, I saw the login name of the Caption Tom, that is, Caption Tom.

Because I will use it when I log in, I will use the name on the BBS. Oh, it seems that this designer may think that this BBS administrator does not have much impact on system security, so

Didn't care. But for me, I actually got his login name. If I design BBS, my administrator account will never use the name you can see in the forum. at least

You can give more obstacles to people who want to decipher the password! But now almost all BBS administrator accounts are used in the login name in the forum. Oh, this old American BBS is no exception,

Who is all who copied it? Therefore, all BBS programs can find the same place. Now, I must have a password. First, I will now Test, the password plus' OR

1 = 1 method, I hope that the chief of the BBS is not a rookie. Of course, the largest navy website in the United States is not a rookie, so when I test, I get the password.

Wrong prompt. This method is not available. I am not disappointed, what is disappointed? If you expect to think about the website of others, is it a hacker? That is not with the "cattle"

"It's almost. Oh, then I watched the source code of the web page of his landing interface, the submission statement he landed was removed. He used the post method. If he did not limit the number of landings

If I basically announce his death penalty. Because the password is below 8 bits, according to my current 10m bandwidth network speed and my AMD1600 machine, it can be deciphered for 2 days.

come out. What are you using 10m and AMD1600 , too unprofessional? Oh, I see you is a movie. You think that hackers are all used as a movie is 10 display.

The computer of the device, is it all you want more to multi-piece network? Don't look at my network number 10M bandwidth, even to the US website, I can have 1M bandwidth, I am very satisfied. In fact, I am now

The speed is still less than 1m. Now see if you qualify the number of landings. I know that the general BBS does not limit the number of landings. why? Not designers don't understand, but to prevent account locks

dead. You think, have many people to take the administrator's account in BBS? If you encounter 3 times, you will lock him, and that administrator still does not work? Every day administrator must

Sending an email to the system administrator, told him to let him unlock the account lock, once it can be, no problem 2 times, if there is a 10 times, 100 times, even thousands of times, the system administrator is not suicide! But people who do this BBS must have considered this issue. This is what I later found later. He didn't lock the account, but you entered 3 times in a row, the password is correct, it means you are positive.

To make you enter, if you exceed 3 times, you will not let you enter, even if you enter the correct password. If you can't, give you a prompt "Invaild Password!" Invalid password! No account

There is a lock. This trick is actually very simple, many people can think, but for those of our password, it is indeed a trouble. But it doesn't matter, these tricks I have to deal with skills.

Surgery, I call out the procedure I wrote, a tool specializing in the page password. Written with Delphi. Oh, don't laugh, not I will write it with compilation or C. Instead, it is not necessary. Those ones

Tool also measures a person's level of people is actually a rookie. Things to do with Delphi for a few hours, use assembly or c to use it for a few days to finish, the effect is the same. I do not need

Delphi is really sick! The interface is very simple, an address box, a password dictionary import box. First use my existing dictionary to start testing. In order to prevent the other party from limited to 3 times. My program

Each try is 2 times, the IP address is automatically modified. I have a C class address that can be changed. Fortunately, the other party did not verify according to the Class C address. Otherwise, I really can't do it.

Many people think that their address want to change what is, in fact, it is wrong. You think, you change the IP address, if it is not inside your subnet, the data sent back to the other party cannot arrive.

Your network. You said that you will be clear in Beijing when you write a letter, you have to leave a Shanghai address, the other party will receive it when you pay back this address? Don't listen to those SB director talk!

The dictionary was finished for 10 minutes, it seems that the other party CAPTION TOM is not a rookie, at least his password is not in my dictionary. Hey, it seems that there is no way. In use

"Vital Dafa". Don't look down on this world's most stupid method, this method is the best way when there is no way. Everyone understands, but no one can prevent this method. unless

Your program is not used. Through the previous analysis, I feel that people of this website will not be a rookie. Therefore, the password will start from 6 digits. It turns out that this intuition is correct. Neither do I

Know why, I feel that his password is definitely more than 6. I have produced my exhaustive password dictionary. There are more than 60 M, which is big.

Opening the machine, starting automatic analysis, starting to jump a number on the screen, and a silence around, quietly, I can hear my heartbeat. I am nothamed, according to my experience, my

AMD1600 It seems that it is destined to work for 1 day or more. . . . . . . Let him jump. I walked to the living room, turned on the TV, now it is 10 o'clock in the evening.

Sorry, let everyone disappoint. A person known as a hacker does not enter the correct password within 1 minute, and make a success, show my style. Look at electricity

Optick, turn on the TV and see if our mentistened TV stations have a look. Oh, it is really a pot that doesn't open, life is really full of dramatic. You love it. At the time

A station, just put a TV series, and just put it in a man, please enter the financial system of people, steal information. At that time, the hacker came, very confident, and he knew that he was definitely able to attack the people's system in a few minutes. If you don't have the expected, his fingers flew up and down on the keyboard, but you will know that it is a never.

If you don't touch your computer, because you know that he only knows your fingers, but your finger is knocked on the keyboard, what button is used, he is a little. Is a two words "chaos

"I was joy. Hahaha. Then it is even more cow, a window that requires landing, ask for the password, between the" master "eyebrows, sweat DC, it seems to be

It is very fluent. Then, after 3 minutes, who is on the screen's voice: "Congratulations, your password is correct, you can enter", then the master is carnival and dismissive, next to it

Individuals make surprise and admire. I laughed at the sofa at the time. Hahaha. . . . . I just want to say to those who don't understand the computer, that is not a hacker, he is definitely a fortune

. He should go to the sports lottery, the sports lottery is only 7, and it can be calculated for him 1 hour. **! ** has rely again!

By the way, I will say a friend who is going to shoot a movie (now I don't say any movie TV, saying it is useless), you don't know if you don't understand. More money is spent, come to casual

Which university finds a student who learns computer professional, makes your consultant, can spend a few more money? Give a few hundred faster, people are not happy. Ensure that you don't make such common sense errors.

I found that our domestic director feels your most cattle, I don't understand the computer clearly. Do you admit that the music does anyone say you? If you don't understand, you will find someone! Old people do good,

When you look at people, those model designers are famous automated control professionals in the industrial community. It can be said that it is a collection of technicians. You see the effect of people.

3. I broke the US Navy website (2)

The numbers on the computer screen are still beating, my luck is always bad, and the biggest award in this life is consolated. So, I have never encountered a few minutes, the password is

Skip sites. I am used to it now. TV is too ugly, the central station is making a program, specializing in innovation in their programs, that is, they let a singer sell newspapers, then

Hiding in the car and taking the jokes in the car, and broadcast the staff laughing with the camera and the camera's lens, they call "major innovation". The disgusting of the horse fart. Ha ha

These means are the means that the Taiwan variety show cannot be used again. It actually "significant innovation", or they are thick, or they do not look at Taiwan's programs, maybe

They think too low. I have never seen Jin Yong, I dare to take Jin Yong, and people really want to be!

Forget it, turn the stage to the animal world, I think the best program is this program, at least the animal does not put it, what is the job?

Bless, the mobile phone is ringing, there is a text message. It is Xiaomin. "Why don't you last QQ, what is your bad things?" The girl is blame, Xiao Min is nothing, she is

I don't directly call me, always send text messages, and I am so strange every day. Sometimes I am willing to die. Remember the last Spring Festival, I am in my parents' home, and I am so far to 12 times in the New Year.

I believe it, it is definitely the words of the New Year, I am not thrilling: Tian Dong Cang, the wild, our cooperation is strong. Tonight to grab bank. Seeing this, I have been puzzling in my heart, who, this is? Continue to see: The adapter is: .... Happy new year! Small sensitivity. Haha, **, this dicker. I was turned on at the time. I have already returned to God for 5 minutes.

After madness, I sent this news to all the people, and then called the dead sibi. She still said that I didn't have to receive her congratulations? I am dizzy, I can't wait to reach out from the phone line.

In the past, I checked her in a white neck, and the sweet feeling is still intoxicated. Ha ha.

Hey, Xiao Min wait for me on QQ. That AMD let her work. I'm too ideal for my IBM notebook. Take my IBM's book, move to a coffee table, and start the Internet. IBM despite

Just of a C500, but write the program on the Internet or notice. IBM's book is really cattle, more than 3 years, this book is not out, the real point is not out, even though I fell

3 times. I don't admire, one to summer. Others don't dare to put a knees, IBM, warm temperature, heat dissipation technology is indeed unique.

Once the QQ, Xiao Min's avatar was frivized, it seems to call me. Her net name is MM, I originally sensitive meaning, I have a nickname for her. But now the understanding of the online is the meaning of my sister.

. She is also happy, saying that this name will know that it is a beautiful woman, and it can be attracted to handsome guys. I almost vomit blood. My name is called GG. I originally called superman, so Yang.

The name is for her, she can't take care.

She always smiled, I should ggw, it is Gege. I turned over, she laughed.

I sent him a message: "What? Can you call?". She said: "Hey, is this not your favorite way?" I said: "嘿". "Can you accompany me to a friend tomorrow?

Friends I have a computer? "I know that it can't be refused. Though tomorrow's computer should still be a password, anyway, boring, with the computer such a small CASE. But I haven't going to the computer city,

Go see too well. "No problem" I answered. "Hey, my friend has a special money, I don't understand the computer, you give him the best, no picture, not to save money, just more people's computer cow

! "Full, it is estimated that this is her friend's original words. Otherwise, I can't say this style. Later, I knew it was a boyfriend of her girlfriend. Why this is the best in the world?

Most people in the computer are people who don't know computers? Lord, give me a silver.

The time in the computer city is very fast. Xiao Min took my hand and was happy to be like a small rabbit, and I was too small to stay with her. Although in a city, chat with QQ

It is actually the main way of our exchange. She is a doctor, an absolute line of computer. But seeing my confident and the businessman of the computer city bargaining, talking. She is also very happy. I

I want to look very handsome at this time. Her friends and friends of boyfriend, followed by our ass, looking at it. Anyway, there is no matter if it goes back, the password will not be so fast.

come out. So I am also happy. Choose it slowly. In fact, it is more than 1 hour. Configure it to the installation from the configured installation. At that computer, telling the truth, I am envious. It is really a cow

! The speed is much faster than my AMD1600 . It is Intel's chip. To tell the truth, AMD is really not suitable for the computer. With a set of advanced audio and a top sound card. At that time, Xiao Min was tested above.

When I tried CS, I saw it itchy, and I feel very good. Xiao Min, playing computer is stinking, but playing games, I am always not her opponent. She said this shows that my IQ is very low. I said that my major is good. When I go to school, the door is excellent. She said, it is dead, not. She is a doctor, I have always been suspicious, my IQ is really a bit

Low, I am hard to guess the password of others.

Walk away her friend, we have two hip hosses, more intimate. After eating McDonald's, we returned to my house, this is a set of two rooms in the unit. actually, I

I have always thought about it again, how is the password? In the house, rush into my study and see the screen. The screen has entered the protection status, and I am sophisticated to move the mouse. The number did not be jumped.

. The password came out. It is a 12-bit password. I am happy in my heart, I feel a lot. Today is really good, and the romantic of MM has a day, and I went to the computer city to see what I like.

The analysis of a week has finally progressed. What happened today, what is good? Is it touched me?

Xiao Min came in, looking at my eyes. Have a bad laugh, say: "What are you doing?" I smiled: "Nothing, analyze a program." What I am hacker is that I can't give her.

Said, because hackers have been shaped into a back role. She is absolutely unable to take my own GF. Every time we play CS, it is her policeman, I am a bandit.

If there is any other person, she must have to be a policeman with her, absolutely can't make a vision. So, I am going to play CS in the Internet now to choose CT directly. "I want to play games, I want to play games

"If you have no outsiders, Xiao Min is cute. Some small 刁 蛮, but it is very cute. It is rare to be so happy, of course, let her use my good machine. I started playing CS. I know, she

This is playing, not 2 hours. She dare not be interested in other things, but for the game, it is interested in the game, what game is in her hand, can't take a few days, it will not work. Her game

I have taught her, such as a red alert, CS, etc. Now I am far from her opponent. I have always doubt that my IQ doesn't have her high.

She is very happy to play, I opened my IBM, I made my things next to me. On the side of her chat, this feeling is really cool.

Find a password. I already have the right to upload. However, this does not mean that I can enter this machine. Because I can upload the program, the program cannot be executed on the Server. This still

Is it useless? Often see a lot of security check software on the Internet said: Your FTP has write permissions, is a vulnerability. In fact, this is not a vulnerability, even if you have the right to write, you only

Can write those data. For the system, you are still a point. Hope to execute the program you upload on Server. If you are sick, it is the administrator! Let's take a look,

Whether the uploaded directory is in the APAHCE's web directory, if that, I may ask for this program via WWW Server. I have tried me and I have tried me.

I can think of all possible. Didn't succeed. Think about it, the other party's administrator is so powerful, how can this low mistake. It seems that this FTP and WWW are strictly separated. I can only think about it.

He has a way. Continue to visit the administrator's identity on BBS, although a little dangerous, fortunately, the Caption Tom seems to be online today. There is Xiao Min called the little call, she plays CS,

After OVER, the clearance of the underlying opening will come to play with me. I will play my back in a while. I will use my hand card my neck. I suspect that she is a little violent. Otherwise, a girl family, how do you like a violent game like CS? So this makes me paralyzed, I am very embarrassed on the BBS.

But when you don't care, there is often an unexpected harvest. I suddenly found it on BBS, and the administrator can post the upload attachment when you post the post. This attachment is a purpose of putting on WWW

Recorded, and this directory can be accessed by WWW. Oh, this website is written by PHP. Don't I write a PHP code? The script statement is not complicated, I am fine.

Yes, such as reading files, writing files, etc. The most common for hackers. I immediately wrote a download program, and I made down the password file under Unix's Passwd.

A more half. But I tried it, failed. It seems that the administrator has set up the permissions of the Passwd file, and there is no way to read this file with the permissions of the Apache process. miss you

Other ways. . . . . . . .

4. I broke the US Navy website (3)

It should be said that I can make my own program run in that server, I should succeed a half. But although I made it, there is no root privilege, I can't break down.

Bad-plated data, destroying the web pages that destroy each other. These are typical "rookie" practices. I don't care for it. A trouble, people's administrators don't know? In their skills

Horizontal, can you enter in the future? My IQ is not high, but it is absolutely not stupid. Xia Min may play a game to play a little annoying, start playing me. I am more time to play me. I am basically sweet.

With her, I don't know how to make it, my thinking is not on this website. Oh, don't misunderstand, I and Xiao Min have been known for three years, but now we are just staying in Lala.

Small hands, gently doing the programs. Not that I can't, but I have my principle. Of course, it is a normal man, but I am with Xiao Min, I just feel sweet, I have never thought about how?

How is it, no matter what you believe, it is like this. Several times, Xiaomin is impulsive, but I have grasped. Talking about falling in love, it is best not to do things. This is me

the rules. Now I still don't know if I can come together. So, I have to stick to my principles.

"My computer is a little strange these days?" Xiao Min looked at me, she was over in CS.

"How to pull?" Xiaomin's computer is a match, which is more expensive than my computer, use P4 1.6G. LCD monitors. No way, she has money than me.

"These days have a slow speed, and some advertising boxes will pop up with a browser, turn it out, annoying,"

"I doubt that I am a hacker" Xia Min adds a sentence.

I glance, huh, I don't dare to laugh at her. This is some malicious web page modified her IE settings and registry. It is not a little annoying. I know, this and

Hackers have nothing to do. I just wondered how she would suspect that there is a relationship with hackers.

"How do you know that it is hacked?" I deliberately asked.

"Oh, don't think I don't understand anything. Our unit has worked on computer training, I am a good job. Our last chapter is network security, our teacher said, now black

The guest is everywhere, they are particularly powerful, I want to enter your machine, I want to control your machine, I can enter your machine. When Iraq, Iraq is a hacker, Iraq's control system.

Failing. The hacker can unify the world. "Xiaomin's eyes started to release glory, seeing it out of the unlimited direction. I started laughing, but I didn't dare to laugh, I halo, I am a hacker, you bf is hacker, why not See me in unify the world. I bought instant noodles or gave money, I went to the automatic payment machine.

Take 100 pieces, he will not give me 200 pieces. I dare not laugh, I don't want to be repaired by Xiao Min. Moreover, I see her to hacker, I am also beautiful, if one day I am

She said: In fact, I am a hacker. Will she fainted? The heart is beautiful, the smile on the face has also overflow.

"What do you say, hey, if you have been hacked, I don't have a way." Small sensitivity is self-speaking. Xia Min just knows that I am a computer worker, she doesn't understand the computer, so very

I haven't given him more things. I am in her eyes, and there is no difference between the administrator of the microcomputer in their unit. This is not good, in front of MM, can't lose your face. Men's good strength

I woke up immediately.

"I will send you a program to your mailbox, go back to open the execution, just ok" talk room, I have sent this program to her mailbox. In fact, this app is not written. I am online

Uploaded, don't think I understand anything, but I have to write this procedure, I have to check a lot of information, such as the key value of the registry, wait, trouble. Not as good as

It is convenient to use people.

"Can you travel? Our teacher said that hacker is anti-fighting." I saw her unlimited worship for their teachers. I was a bit jealous. I don't have to ask, their teachers must be a man, maybe still

What is handsome guy. The computer training is generally young. This everyone knows.

"Oh, your teacher will say empty talk, where hackers are so powerful, hackers are not so much, people are full, what is your computer? What is your top?

Your hacker is not a guest, it is a web page that has visited the malicious code, modifying your settings, not big deal. There is also no relationship between Iraq's failure and hackers, don't listen to them.

Say. "I finish it, I feel that my heart is alive. But I said that the word is really back, this word does have a lot of black pots, like a virus. Many people

When he can explain, he will pull the hacker and virus out of the back. This is a very reasonable explanation for those who don't understand. And you can have steps. Just like some of our country

When he encounters the disease that cannot be solved, he will not admit himself. He will also give you a prescription. As a result, what is it, what is the first drop of a mountain, a certain

Early first sprouted root, etc. Rely, do you say that you can find these ghosts? N't you find? Sorry, not what I can't do, you can't find medicine. In fact, this is a lie. Now online

I don't know who is the first to say that the Gulf War is an American hacker to the control system of people to implant the virus. Now everyone is actually believed. This is totally long. You think, you will put themselves

Is the army of the army connected to the Internet? Especially during the war. Iraq has not eaten * meat, I haven't seen it yet? It is definitely not along with the civil network. Even if you don't connect, your hacker has

any solution? Even the internal servers in our unit are not connected to the Internet. Not to mention the army during war. Even if you send spy into the internal network of people, I have made it destroyed, people

The home must have a recovery plan. Is it now that the ordinary network management can be recovered within 24 hours, not to mention the army? There are at least 2 sets of emergency programs. What, you continue

spy? I really thought that people were * heads, I have been in time, I will be born for the second time. After the first time, their security departments are looking for you everywhere? You also collapsed to engage in the second time, don't want to live? Everyone puts the United States myth, I am dealing with their administrators every day, and they are also ordinary people.

]: "Will you be a hacker?" Xiao Min asked. I am shocked, I saw that Xiaomin had already exited CS and was playing bomb superman. This is a simple game, she chats while playing with me.

"You will not ..." Xiao Min added another sentence.

"I ..." I hesitated, what should I say? I told her that I am trying to enter the US Navy website now? I don't know how her attitude towards this matter, I don't dare to return.

answer.

"How to pull, how about it will, what?" I decided to test it.

"I will show me, you are also engaged in computer, people will, how can you not?" Xiaomin continued to play bomb superman, and that game did not need too much attention. Just need to machine

The movement and the bomb is OK.

"Hey, is your teacher?" I laughed.

"Of course, I will pull, our teacher gives us online security, can you still?" Xia Min was very sure.

"Have you seen his website of the black people?"

"No, our teacher said, black and other websites are crime"

Hey, in fact, I know that their teachers are not afraid of breaking the law, this is an excuse, and their teachers may really don't. I think, if you let you see the computer decoding all night, you will also think this is a table.

Do you play? In fact, there are many meat chickens, there is no problem for MM performance, and very smooth and fast, it will definitely make her surprised mouth can't be closed. But can I?

"Hey, will you won't you?" Xiao Min asked.

"You are not afraid that I am breaking?"

"Oh, just show it, as long as you don't make it destroy, what should you do?" Xiao Min smiled.

If you are any other person, according to my character, I will say "no" in the first sentence, break his thought. It is estimated that only Xiao Min knows that I can black and some people, in the unit and friends.

In the eyes, I am also a "computer master". However, this person is a bit stronger in front of people who like. Do you not say that human nature is multi-face?

"Of course, I will pull, small carated" Since I admit, I will say something to the words.

"Really?" Xiao Min stopped the bomb superman, immediately by the other party bomb behind the butt, the attack, he was sacrificed, and the other party made a laugh. Xiaomin did not care, she stared in her eyes.

My face. I saw her achievement over more than 300 points higher than the other party. "Come, give me a performance".

I have never seen Xiao Min is so diligent. She got up from the chair, pulled me, and I was on the chair. Then, her self-polite is on my leg. One hand holds my neck, see as screen, wait for me

Performance. Xiaomin is not short, 1.65 head, 48 kg, a little bit thin, the body is absolute, and it is a person who is not fat. So, her friends and colleagues are the most envious of her.

of. She is a short hair, the skin is very white, long is very like the Ouyang Lanlan in the "never-ignorant", Yuan Li. I only 1.70, now it is absolutely not high in men. A bit slight

fat. She never dare to wear high heels. I am afraid that I have an idea. In fact, I don't care, I think the woman wears high root shoes to show the softness of women. Now she is this Pose, let me have a bit of Yuan Yi Ma. Her faint fragrance is smoked under my nose, I am a bit confused. I have a hand to cover her waist, one hand grabbed the mouse.

How to perform? I start thinking. If I pick up my broilers directly (I have a computer that I have overcrowded), those are servers, basically the characters, enter commands, in small

Sensitive, you have no magic, you said that you are an administrator, he doesn't understand, for these foreign lines, must use the way of performing the way of performance can be emotion.

I started to operate. I started to start the scanner and started to sweep our internal network. There are more than 10 people in the subnet segment where my computer is located. So I can

Use, I said before, I have a Class C address because of this. Of course, I moved his hands on our exit router. Oh, but I won't get any damage. The rabbit still does not eat the woven grass,

I am stronger than the rabbit? According to my experience, there are many rookies in our internal network. And all of the Windows systems. My scanner I opened is the streamer that everyone knows. This thing deals with vegetables

Machine is very useful. Sure enough, after a while, 3 network sections were swept, found a dozen machines with vulnerabilities. Xiao Min looked at it, although it was awkward, it was still looking forward to it.

"Found", I see a computer name called ZCW, 2000 professional version. His password is actually the name of the computer. Oh, don't laugh, many people make this mistake

.

Of course, I have now a 100% grasp. Now is the uploader, start his Telnet Service. Then the remote connection, put a screen monitoring software. Then start the client

The other side screen appears on my machine.

"Getting" I confidently answer, MM eyes really shine.

"Wow, you are really powerful" she pinches my face.

Hey, I am this MM, according to this, you should give me a sweet kiss now. But she just likes to express her appreciation with her mouth. Oh, in fact, this low-level gating is most effective for MM.

In her eyes, I just brought to the US Navy website, I didn't see the other side of the screen so that she was excited. In her eyes, I saw the other's screen definitely with the US Navy website.

There are many root rights. Her tube, now the best method is not to explain, explain that she doesn't understand.

Then the MM starts to make a small call and start participating. First of all, she saw the other party's QQ number, the other's QQ is open. The head of this dead Nizi is absolutely easy to use, and it does not admit it. She actually hits

Open QQ, like the other party to ask for chat. The other party may see that she is a MM, I accept it, then they start chatting. I am watching MM next to it, enjoying it. MM excited, while chatting

laugh.

The other party asked: "Who are you?

MM back: "Don't worry, anyway, I know you"

The other party asked: "How do you know me?"

MM back: "I know you are a certain unit"

The other party was apparently surprised, and immediately said a string of him thinks that it may be MM's name.

MM is back: Not. Then just laughed.

MM also said: "You are now playing the tank war to" on the screen, the other party is playing the tank war.

The other party is more surprised, and it has been half a day, "is wrong"

At this time, we saw that the other party had closed tanks, playing playing cards.

I can't laugh at MM, I have trembled with her.

MM said: "You are now playing playing cards."

The other party is obviously too amazed, and the screen is not moving, I don't know what to do. MM laughed, saying, he affirmed to see if he went to the room to see if there is a monitor. Oh, MM said that it is really true.

For a while, the other mouse started, and the time was returned: "You are really guess!"

Then he launched anti-virus software, it seems that he doubted his virus. I saw him using Jinshan Taxi. The file is fast flashing, MM asks me: "If he is anti-virus, will it find us?"

"MM is not laughing

.

"Reassure, this gripping software is special. Generally, anti-virus software can't find it." In fact, this thing is my own. I don't know if others know that anti-virus is not found.

Sure enough, for a while, the other party stopped anti-virus. He didn't find anything. MM started happy again.

MM continues to make a joke with the guy. It is a feeling that a cat is playing with a mouse. The MM is chatting with that person, while the other party is turned on. These operations MM are very skilled, after all, she also

It is the computer training course. Moreover, it has passed the computer level 2, although the test is FoxPro. I am also watching. I also want to know who this guy is. Because he is not me

Web segment. Thousands of people in our unit, I can't know who is. MM turned, found a photo directory, it is some photos, I saw it, a bit like the cortit of our finance department.

. Then I have an annual report of a financial department. Yes, that is the person. Nothing is there. But I know him. Hay serious one. The next thing is awkward. Mm

Actually turned to a directory. I didn't care, and MM opened one of the photos. God, actually came out of a SEX photo. Very clear and exposed, in fact, I am also old online,

I have seen a photo. it's nothing. But now and MM is so close, and suddenly the picture is such a photo, do you say how embarrassment? At that time, I was stupid and MM, and MM didn't know how to do it.

It's so stopped. Time is stopped. I saw MM's blush, I think he should also see my blush. Everyone is so staring for a long time. Don't talk. In fact, MM is a medical doctor, and

It is surgical. This kind of thing should be nothing to her. If in us, I don't think she will be red. The key is that she is now on my leg, then suddenly comes out, you said

, Change you, what should you do? MM did not dare to look at my eyes. Then we start laughing, mm is an embarrassed laugh, I am a bad laugh. Then MM will turn that file. even

See the courage to see other information on the other party.

MM is: "There are these things in this guy computer, not a good person!"

I said: "What is this, you are doing medicine, you should know this is normal."

In fact, I am thinking, I haven't seen it, this guy is so serious, and there is this hobby. Ha ha.

"Is there such a thing in your computer,", MM started to look at my disk file.

"Don't guarantee, is I doing?" I am not unanual. I am not afraid. MM often turns my computer. I don't put it on that machine even if I have those things. even if

To put it, I will use some means, except for me, you can't see it.

Of course, MM did not find any crime. So a lot, MM lost interest. I also flew out all the things I uploaded on the other computer.

"Do you like to see those things?" Asked Xiao Min asked.

"I don't like" I don't hesitate to answer.

"Do you like this?" Xiaomin asked.

"Others may, anyway, I don't like" I know that I may say me, but I don't want to be. " Ha ha

"What do you like?" Xiaomin looked at my eyes and said low. I am awkward in my heart, my heart is unlimited, Xiao Min is really gentle, like only kittens on me. Xiao Min, my favorite is you. I am talking about the old truth, Xiao Min

Is my first girlfriend, I hope it is the last one. I looked at her eyes and said that a word: "you".

Xiao Min did started hooking my neck, and her lips hit me. I have a blank in my mind. . . . . . . . . . . . . . . . . . . . . . .

5. I broke the US Navy website (4)

Take away Xiaomin, the time is already 10 o'clock in the evening. Xiao Min is a local person. I'm not. Her family is said to be in the city, and I live in the north. So I just sent him a taxi, I have not been to her.

Home, I don't know about her family. I only know her unit, the best hospital in this city. She is in surgery. Their units are also in the north, so I went to her unit to wait for her. Be

She often comes here. Today, it is very warm, because there is a small Min. Now returning to my cool and simple study. It seems to be a bit lost. But I don't know what to lose, anyway people

Sometimes sometimes weird.

Close the window that is just Xiaomi opened, there is a small sensitivity and a faint fragrance on the mouse. I am not awkward. Tomorrow, I'm very easy to get rid of this evening, don't have to force yourself

sleep earlier. Whoever has a mouse in a unhappy point, my heart gradually calmed down, Xiao Min gradually left my mind.

I returned to my goal. I carefully entered that website, the Terminal of the US Navy website. On the one side of his BBS, I want to further enhance my permissions while I want to further improve my permissions.

. Just now I can upload some PHP programs. But I won his password file failed. How to do? I walked around and thought. I can now upload files and download his WWW

Any file under Server. It is no problem with his homepage. But this is not what I want, I need ROOT permissions. In order not to be discovered by their administrators, I immediately wrote it.

The PHP program has traversed the directory and files that can be accessed under his WWW. Soon, I found the Log file of that bbs, a file called Access.log. Let's read a few times

When I came back, I read it back, it's too slow, because there is 200M! It seems that the administrator of this BBS is also lazy, I haven't been cleared for a long time. As soon as look, it immediately determined that it is the Log file of BBS.

Write the code all deleted all the records with my IP address, huh, huh, the file is a lot. Do you think I have a test password a day, and the thing recorded is a computer that does not understand the computer.

People should also understand what is going on, let alone those "old birds"? After deleting my account detection record, I am in a matter of my heart. I know the upload of the Caption Tom.

account number. Suddenly, the light flashed, I don't know if his VSFTP is a virtual account, or the system account? If it is a system account, huh, you will trouble. Between the brain, there is already

Move the SSH connection client. Enter IP, type the FTP account of CAPTION TOM, enter the bus ...

Haha, I almost laughed, and I have a beautiful $ symbol in front of me. It seems that his VSFTP is using the system account. This is not blame administrator, because the administrator's FTP is outside

Opened anonymous, and the anonymous FTP account has been set to log in from remote, so you are gods and there is no way. This BBS administrator is obviously the system administrator to him.

Special care, so I have a private account that specializes in it. For remote management, it can be remotely logged in. With the SSH protocol, there should be possible possible to be eavesdropped. But he dreams

Nor did you think that I will connect BBS and this system's account, and I declapted the person's account. Not we are not enough, it is the enemy too embarrassing. I am a bit proud. . . . .

The following question is to turn yourself into root, which Unix is ​​absolutely a loss. As long as UNIX gets his ordinary account and can upload files. Can perform files. That encounters a master,

This Unix is ​​hiped. I have two conditions, immediately see if the program can be executed. Write a simple Hello World program with C. Compile with GCC. Haha, no

There is an error, GCC is available, I have all permissions under this CAPTION TOM account. My mood is much easier, I have already felt that it is in front of you. . . . . . Below is

With overflow Dafa, you can see the ## as long as you overflow. Oh, in fact, the web page is the most loopholes. From him, you can usually find the gap. Now start directly from the system

It is not very easy to use.

First use me upload a UNIX overflow program, compile, execute, and laugh, waiting for that # 好, however, my smile is solidified. #No no appearance, and my SSH is also suspended

!

Shit! It seems that it is an overflow program. Reconnect it immediately, oxi is stable, still not dead. everything is normal. Look at it with W command, it is ok, the administrator is not there. Now

The goal is to find a way to overflow. Invention, this method is definitely a genius, which can be said to be anti-fighting, unix has been so many years, still did not solve this

A problem. Now in the case of almost no way, almost overflow is killing technology, but there is not much hacker that truly mastering this technology in the world. Who called this world's operating system

It is also written by C / C ! I don't say C / C is not good, in my eyes, C / C is definitely the most beautiful senior language in the world. In the past, it is now, in the future! Because C is too flexible

He does not check your border for your data, which means that when you enter the data, if you don't stop, he will have a down. What consequences he will generate, he has been going down

Irrigation, unless you stop. But now many people don't know that this is the root of overflow. They are not to judge the boundary. Some functions including C. I am still thinking about it.

People who use overflow methods to attack can't admire. How did he think of it? by. The cerebon melon is really easy. However, I am sure that person is definitely a debugger master, definitely

Summary test master. Because of the overflow program, even if it is a bad byte, the consequence is not the execution you think so. Just because this overflower and this Unix version is a bit

The same, so the overflow failed. It doesn't matter, I'm going to pick up this bones, afraid of this? Oh, I started to increase overflow data, let the overflow address to top. A little trial. Boring

The work started again, and the time is a bit. I have no such thing, but perseverance is absolutely, this is very confident. So my hand flying quickly tap the keyboard, failing again and again,

Reconnect it again. But did not affect my emotions. Oh, it is so bitter when hacker is doing this. no way. Those who write articles are written very chic, or they

Chic, either it doesn't have anything you really decipherous. In fact, it is not so much. I don't know how many times I tried, and I have seen it at 3 am. I poured a cup

Water, drink a bite, continue to tap the keyboard. Suddenly, when I was preparing to carry out the next trial. The connection is not interrupted, the # symbol is out. I stopped that I have all inertial fingers. Long lost a breath, concealed the ecstasy in my heart, and overflow the address in the notebook. Next time, if you encounter such a system, it is not so hard. There is no sound around, I am really

I want to find someone to talk, I successfully entered the US Navy Station! Hahaha. Take a look at the administrator? No. I lost a breath, I have enough time to work after work. Seems to

The administrator is also a night owner, come upon. I was just him when I was sleeping. Haha.

Grab the guitar next to me, I sing songs like the nerves, the first, the blue sky, the blue sky is on the red sun, and the smile is still can't change today.

Some things are smart, if you can't pre-. I am relatively light. I don't want to knock my water pipe neighbor. I gently sang, I suddenly thought of Xiaomin, I thought of our campus

good time. . . I have a sweet in my heart. This song is also Xiaomin like it.

6. I broke the US Navy website (5)

I don't have other hobbies. I saw crazy smoking in the TV to express a hard work. I don't smoke, don't drink, except for a small amount of beer and grapes.

liqueur. Whenever I get a substantive breakthrough, I want to sing, I am still a famous campus guitar singer when school. The guitar is still the original, the string has been changed many times

The Qin face is also full of sturdy. But the sound is still the same, there is no change. Gently caress it, just like a well, my youth. I don't need the audience, I will sing again with my heart.

. At the beginning, Xiaome is hosted by my song. She said, although my song is written by others, but I feel that I am singing yourself. Sometimes I will record my own east and west, when I don't want to sing.

I will listen. In fact, I am a person who is ingeusive. Who said that hacker is not too good?

When you put down your piano, it has been 4 o'clock, my thinking is still clear, there is no sleep. Long-term staying up late, let me live at night, I am not good at work during the day. from me

In the eyes of their heads, I can imagine that he may doubt what I have nothing, maybe I suspect that I am absorbed. Ha ha.

The rest of the work is better, install the back door, remove traces. This is the basic skill of hackers. These for me, basically don't need to think. Because I have the back door of the UNIX system.

Using I have a unique way, so I haven't found it yet. Moreover, once I brought a computer, I usually not change his system. That is, there may be 1 year

Will not log in again to this server, the opportunity to be discovered is almost equal to 0, unless he reloads the system. However, a professional Server, not that it is so simple to reload, so this problem

It is basically not worried. Carefully analyze this system and found that their administrators are really powerful, and are traps and monitoring everywhere. For example, the system program in his bin directory is all being

If you move these procedures, you can find it immediately. The general hacker installation latte is replacing these files. So I want to change his way, you will be discovered sooner or later.

. As for the rookie practice to built a root accounting account, it is not seen in the death.

However, these are useless to me. Because I will not use the file to install the back door. I am using the way to write the disk sector installed my code. Through the system

The motion code is activated. This is the same as the principle of guided viruses. Since I didn't move any file, I can't find me through the monitoring file system. I use a small one written by compilation.

Connection program. Equivalent to a Telnet service program, saved on the disk using a binary. The function is very single, that is, an execution system command function. For me, this is enough, the smaller the hidden hiddenness.

It is installed soon, but to activate must wait until the system is restarted. These professional Server is very normal for a year. So, in order to verify and activate him now.

I immediately wrote a program and activated him in memory. Use my special client to verify, OK, success.

Clean traces and exit. I put all my record files all about it. But I know that these for experts will still see traces, their file monitoring system

But not to eat dry rice. As long as I move the file, I will definitely find it. But there is no relationship, at least they don't know who is moving, they can only investigate which account, but can't be traced to me

IP, this is enough. The articles that are not left in the so-called cleaning marks are lie, this is impossible, unless the other is a rookie. However, it doesn't matter, I have already quit, no

The signs of destruction, it is estimated that although their administrators will suspect that you change your password, but now I don't need their password. I have my own entrance.

Many people, after entering others's Server, they can not be in the world, for fear of the world, I don't know, what is also given to the Sniffer, and I want to get more by the machine's machine.

password. Haha, I want to say, this is a typical rookie practice. Do you really think that people's administrators eat dry rice? Do you really think that you are the world? Slightly a little better website, which administrator is not

Those guys who wrote a hacker tutorial is rich? Those administrators are all black and otherwise, you are a childish trick, people can't see it, then he really should go down. that

Most of the tutorials are the obsolete tricks. Don't think that people's administrators are fool, in fact they are quite powerful. Hackers are like a enemy's special forces, you are exposed,

set. Don't listen to what is the lonely hero, that is blowing! The less you left, the better. The less it is, the less it is not easy to expose. And it's okay, try not to return to this website, enter it in ordinary

People come in. I have a habit, once I overcome a Server, I usually won't go back to the second time within 1 month. Even half a year will not go second time. fact

Prove that this is absolutely correct. I haven't been found yet. Of course, when I go to school, it is still the stage of the rookie, and it is not counted. Ha ha.

You think, those administrators are all powerful characters. They will soon find anything wrong. Therefore, in the last week, even one month will fully monitor, try to find what is going on

. At this time, you log in again, are you not looking for death? You are amazing, you will be very powerful, you can take advantage of people in front of SERVER, what rights do you have any rights?

Sort? Will you write the program? People delete the compiler to delete you your compilation? So, Strong Dragon, you also fight the land snake. So the best way I will not come, you monitor, nothing

Have. I see how long you can monitor. People will be ill, no one is no exception, time is long, there is no movement, it will be relaxed. I am also a SERVER administrator, I have this problem.

. When I found it wrong, I will immediately monitor the rights for a few weeks or even months. But the time is long, I see that there is nothing, it is loose. It is a problem with this problem.

In fact, a master, you will know it with him. I am often on the Internet, and now the cattle is very very. I went to a voice chat website to disperse. Just entered a room for 3 minutes. A cow rushed in, grabbed MIC, the cow said: "People in the room, listened, you immediately gave me it, otherwise I immediately kicked you out. And seal up your IP, let you

We will never go online, hurry! ".

Oh, don't say, I really have an exit. I can see from his position that he is not a homeowner, so I am not afraid. Ignore him. Is the homeowner, he also can't blocked my IP.

I didn't care about him, there were two people left in the room. The cattle continued to call, and continued to threaten IP to be sealed. I am really annoying, giving him a word: "Roll! Rookie!"

Haha, his guy may have never thought of meeting the cattle than him, it really gone. I laughed at the time.

Real masters, he will never give you technical issues. Unless it encounters people in the same way, and it is true if it is necessary. I usually not talk about hacker issues online. Even

The computer is too lazy to talk, I put it on the Internet to a singer, I prefer to sing, listen to songs, chat. Life is a multi-face, isn't it?

Exited Server, I started to take a look at some casual websites. That goal became my history. Maybe many people say it, is it? Yes, it is over, I have already achieved his

What is the right to control? No, this is the US Navy website, why don't you do something information, what aircraft carrier's design map, or missile design, or Iraq war dense

What is the text? Is this not very easy?

Hahaha, or how can I? The director is TMD SB? That's the problem. Everyone is too deep by the poison of those people. If you don't say that lie, you will become truth.

? The summary of the former people is really brilliant! Please, this is the website of the US military. They are all written. How can the things that are really military data may open outside? you said,

Will our confidential information in our country will put them in the Beijing Library? Even if there is strict regulations, it is not allowed to borrow. But you said that you may come to Beijing Library? Show

It is impossible. Similarly, do you say that the US military in the information level may connect your own network and civil network? Those things that use civilian networks into people's military extensive

light! How can it possible, people have not been connected to you, your ability is high, can you enter? Is the big house not thinking that there is no hacker in the United States, or if you don't know what hackers can do.

thing? Halo, they are hackers' old ancestors, is it good? They don't stupid to their confidential databases to put it on the Internet, just have an account to access the point?

Hackers are not God, that is, ordinary people. Often see some people say how hackers enter a certain bank. These are all kind, unless it is internal person, and is a computer administrator.

Then I can't make any account, how much is it, and so on. I am a hacker is interested. I still have to go to work every day, I still want to make a fortune. I am as envious as

People have money. Have you seen the moisturizing of a hacker? No. The best is to go to the security personnel and network administrators.

With the US Navy Server, I decided not to visit him at least one month. It has been 5 o'clock now, you must sleep, even though I am more excited. Hefront, lying down my single bed, I will enter my dreams for a while. It is this good day to stay up late, I don't worry, I haven't slept. Lying in bed no more than 10 minutes, immediately sleeping and dead * one.

Various dreams. . . . I seem to see Xiao Min laugh at me.

转载请注明原文地址:https://www.9cbs.com/read-105735.html

New Post(0)