Black Camp Legend series story six - hatred

xiaoxiao2021-03-06  41

The legend of the black camp is here, but the story in the black cabinet is still continuing. Various love and hate hangers are interlaced with the charm and technology of the network. If the sun will rise from the east, the west is falling. There is no slightest pause, like the scene around you. Hackers also continue their legend in the network ...

Like their life ...

Primer

We cannot completely disappear from this world, although sometimes we expect this. But there are always some traces that will expose our whereabouts, while these traces will slowly have a state in which a state is slowed down over time. They will survive in a corner, faithful records all our behaviors, thoughts and history leaves ...

Recallorative water flow

Lei rails lying in the bathtub, hot hot air whitening his face is blocked, he appreciates the wine glass in his hand, as well as the wine glasses in his hand, and a transparent amber liquid in the wine glass. He drunk himself with such a drink. He knew that there was always constant love and hate in the rivers and lakes, but he didn't think of such a thing happened to happen to his body. This is some let him really don't understand, Like the osmanthus wine in his cup, he can only weave the taste of the first cup, and when he is drunk, he is drunk. ...

Five years ago, the mine is the new master in the new rivers and lakes. At that time, his scenery is unlimited, a network technology that makes a heartbreaking face and a cloud-handed rain. However, the truly beloved of the truth is definitely not attracted by his wealth, the face of the woman's heartbreaking is an additional condition, and the technology in his hand is really attractive.

Five years ago, the mine label is built in the family in his home. In the network, he claims to be invincible. He can make this self-confidence, because he has seen too many famous fishing in the network. Apandaleced. So, this year, the mineral in his own forum, looking for people who can destroy his computer defense in the rivers and lakes. However, after 50 days, countless masters and rookies did not attack the wires of the mines. On the last day of the ring, the mine laughed, this day he became 18 years old, he broke the best of his father's collection, self-drinking celebrated his birthday, celebrating his own technology in the rivers and lakes.

The wine is three-point, the mine is immersed in Italian version of Buon Compleanno (Happy birthday) singing, his incredimail prompts him to have a new email, the minemail, a unfamiliar person's letter, no attachment He safely opened. "Your computer has been broken by me, see the following URL http: //*** www.beian.org/c.gif." The mine laughed and smiled. He wanted to make a small child who thought successfully broke his computer, and the mine launched a trap in his computer, dedicated to the children who intend to "Monge". He likes to make someone seem to break through the secret. The three-foot cat hackers have discovered his computer's "vulnerability", those people did not think that the lights stared at them behind them. The mine is like this to hide the feel behind the secret. However, every time you believe in the mines, he wants to try to figure out the psychology of those people. The mine mark is open, which may be the last message. Suddenly the mineral, the whole person seems to be set, the wine glasses fall on the ground, broken away ...

Thunder tracks believe that you are absolutely not drunken, and the warm wine has not moved. He can confirm that the photos in the screen are the graphic of their own hard drive. At this time, the second seal and the third seal e-mail followed, the pictures in the connection address are the graphics of the Raytable System Disk Windows Directory and the D-disk Program Files Directory, the mine is halter, all of his computer is all The most embossed thing. He stands quickly from the seat, drilling back behind the computer, an unpacking the RJ45 network cable, the system is dead ...

Before the mine returns to the computer, stare at the photos on the screen. You must know that in order to prepare this stage, he even even in the newest software in these fifty days did not go to the Internet. For the prevention of the tricks of others, the mine, even specifically purchased a Cisco's firewall, for the It is necessary to do it. I don't understand the mineral, he really doesn't understand how this person broke through his computer's heavy relationship. The black-causing person is even written in the picture with provocative tone, "but so". This is deeply thoroughly thoroughled to the heart of the mine. The mine becomes step by step to check his computer, and the experience tells him that it is possible to capture the computer screen picture, the mine tribe is confident that the opponent will give yourself a Trojan. What kind of back door program? It is hidden so clever. The Windows 2000 operating system used by mine rails, he skilled click Open the Start menu, entered the regedit this command, this command can call a program called "Registry Editor" in Windows. He found the "HKEY-local-machinesoftware" of "HKEY-local-machinesoft groundrun" directory, which is confident that there is no unfamiliar file item, such as Netbus, Netspy, NetServer, etc. Lei Raid knows that it is usually a stronghold of Trojans. There is no doubtful thing. He began to be nervous. He began a lucidity similarly suspicious and possibly registered.

HKEY-local-MachinesoftwareMicrosoftWindowsCurrentVersionRunOnce

No suspicious procedure

HKEY-local-MachinesoftwareMicrosoftWindowsCurrentVersionRunonnex

No suspicious procedure

HKEY-local-MachinesoftwareMicrosoftWindowsCurrentVersionRunServices

No suspicious procedure

HKEY-local-MachinesoftwareMicrosoftWindowsCurrentVersionRunservicesonce

No suspicious procedure

The sweat began to slip down on the face of the mine, he began to be nervous, and there is no trace of Trojans in common zones. Is this master to hide Trojans through other ways? The mine began to suspect that there is something in the launch group, and he is crazy to find every corner, nothing. Finally, the mine decision failed to disconnect the external fiber on the router, connect the intranet of the computer, he wants to see if there is any abnormality through the intranet port test, he opened the command prompt window in the attachment, be careful and cautious :

C: /> netstat -an

Active Connections

Proto Local Address Foreign Address State

TCP 0.0.0.0:135 0.0.0.0:0 Listening

TCP 0.0.0.0:1025 0.0.0.0:0 Listening

UDP 192.168.1.100:137 *: *

UDP 192.168.1.100:138 *: *

UDP 192.168.1.100:500 *: *

UDP 192.168.1.100:4500 *: *

The returned information tells the mine, it seems that there is no information can be utilized, the opposite port and Trojans, this is more likely to be tight, because in this case, the opponent is likely to use the system's own vulnerability enters However, he filled all Windows patches. Is it possible to use the new loophole it finds, but if it is a simple vulnerability, how did he complete the screen? Where is the Trojan hidden? A question begins to wind in the mind of the mineral, the brain of the mine is fried, and his hand has begun to shake, he even felt the kind of pain in the finger joint. Thunder Rail finally decided to give up the last dignity. He decided to surrender to this master. He connects to the network cable, open his own ICQ, requests the other party's addition, according to the ICQ number of the letter, during this period, he still uses SpyNet Sniffer this year from time to time. Names the best listener in the network monitors all network activities, he hopes that he can save some faces in the last moment, after all, even the other means to kill yourself, there is no knowledge, and this kind of self-think of the mine It is a master of a master of a great shame. However, at this moment, he had to accept it. From the case of listening, he did nothing, even the opponent's trace did not find that all the external contacts were normal.

"Is it?"

"How did you enter my computer? I have listened to all ports, and there is no value for a variety of valuable information."

"Of course, you will not find it."

"Can you tell me how to do it?"

"You have to worship me as a teacher ..."

.........

The illusion is also true

At dusk, the mine launched a set of Logitech's mouse keyboard, he was anxiously waiting for the arrival of the master, he was too eager to uncover this secret. A girl wearing a white dress has come to his face,

"Are you a mine?"

"you are?"

"I am your master." The girl smiled and said.

I didn't think that I didn't think of it, I was turned off by this girl who was still small than my own age, and the girl took the keyboard from his arms. I nodded. "Yes, you talk about it, This is a black you, we contact us on ICQ. "The girl said to him two A4 copy paper turned and turned, and the mine failed to see the girl's face. Smile. He returned to his home, turned to open this "笈", how is it? How to return to HTML code? Is that in the email? The mine began to read this code carefully. After reading this code, the mineral felt is good and funny. This mine worships a half-day girl's girl actually played a deceived mine, and the principle is similar to using Ieiframe. Vulnerability.

In this vulnerability, all TXT, JPG, GIF, PNG, even non-extended files, as long as the file contains a complete HTML statement format, you can use the IE browser to read it, the HTML code inside can run.

After reading the code, I feel funny and good, the mine is played by this girl. This code is just the function of HTML itself, so that the lights themselves have seen their own disks. As for the format of the picture, I use IE to interpret HTML a small loophole, click function of the Java blockade mouse, let the mine I think this is a picture.

In this camouflage code, just use the src command as a framework as a framework, and its core method is to load a picture of a program interface, then embed an IFRAME in a specific place (inline frame ), This iframe content is your C disk. Therefore, no matter who, when you see this page, you will see the contents of your C disk. Of course, this is what Windows users can see.

The truth knows that this is actually simple. It is easy to enter the address in the IE address bar. It is the IE itself is to send a access request to the web server. After receiving this request, Web Server determines its operation according to its restriction name (such as IIS encountered .asp suffix, call the VBScript interpreter to execute the code, then send the result back to the client (IE), When you encounter a normal file, you encode the file itself and give it to the client). And pictures and web files such as JPG, GIF are the same for the server, and the operation method is exactly the same (send the file itself to the client), so even if you send a .jpg request to the server, it is just simple. Send it back to you after encoding the file, but doesn't care about the format of the file. Thunder tracks have also been done this experiment. He will modify a picture of a JPG suffix into txt text. TXT is still interpreted when the network requests visit. The client is the opposite, because the IE is accepting data in a data stream (this is why the webpage is not fully downloaded, and the reason can be displayed.) So the client does not care about the file name, it only cares about The data format of the data. If it is an HTML text, then use the HTML parser to resolve, if it is an image, then decode the image decoder. So, because the client doesn't care about the file name, you can use the .jpg file to hide the program code.

This interesting girl has caused interest to the interest, and she is different from all the girls encountered before the mine track. The mine knows that I like this girl ...

Those days of wind and snow

Snow I didn't know what kind of dinner. She saw the nervous face across the table, and the lights were staring at the eyes of the big sister, the sky was staring in the sky. The smell, she did not dare to face these eyes. Although she came out from the expression of listening to the rain, he did not seem to be a scene like this, but the snow now still hate the rain, whether it is because of the reason, listening to the rain should not be like this, QQ on two people The date has turned into a five-person negotiation of an air. Suddenly the snowy body was slammed on the seat, and a blood flowed out of her mouth, then it was a blood ...

I feel that the pain in the stomach is the same, it is indeed the same pain. I clearly feel that a metal is in my stomach. I reached out and touched it. It was a screwdriver. I can feel a slightly savory thing in my throat, I want to swallow back, I will fight back, but it seems that I can't control it, I can feel the pain caused by my throat. . I want to talk, this is what I saw that four pairs of different eyes were staring at me. They seemed to see the fear that never seen, is it really me? I slowly low, I saw it, my chest is like a blue flower, I know is probably my blood, I used to think that blood is red, but when I saw my hands and After the flowers on the body, I would like to tell them that I saw red blood blue blood. My blood is warm, I block the wound with my hand, I don't want to block the wound, I just want to make my hand warm, my hand, my hand is cold ...

I didn't think of listening to the rain, I was like this, my big sister, listening to rain, snow, there is a strange man I don't know, I am just the private dating between me and listening to the rain, I I thought I listened to the rain and explained, I was eager to explain to me if he explained to me I will forgive him, even if those lies. But the scenes seen, but I don't know what it is, is this? Is this a listening to the rain to achieve arrangement? Why is the big sister here? Who is the strange man? More than 40 minutes have passed, I always don't know what they are saying, I can't calm down, my thoughts are chaotic. Suddenly, I noticed that the snowy face revealed that it was very painful. In her mouth, there was a kind of thing as blood, red, and red, blood! It is indeed blood! what's happening? When the snow was covered with blood, it seems to be extended to me, but it seems to reach it to the glass of water around her, and the water is touched by her on the table, slowly left to my leg, I It can feel that it seems to be quiet, and time seems to be stationary. I saw the feelings listening to the rain, he held the other hand of the snow, crazy, pressing the phone. The snow is weak, I feel on my shoulder, I feel that the blood like my arm is flowing down, I heard the snow and short and nervous breathing, she wants to say "I'm sorry", if I There is no mistake ... they will never think I will use QQ fraud technology to meet them here, this must be what they have not thought. I saw her, she sat there, I know that I didn't regret my decision. I took a hacker technology for many years. I walked silently for a few years of hatred, I didn't hesitate to stab ...

转载请注明原文地址:https://www.9cbs.com/read-75464.html

New Post(0)