Magic Hacker Archive

Chapter 11: The falling angel of the cyber thief is vague (1)

Views:

Miao Miao Archives: I was born to be useful. As long as there is perseverance, nothing is impossible. Isn’t there such an old saying, as long as the skill is deep and the iron rod is ground into a needle.

Miaomiao can be said to be a very lucky and happy little girl, full of fantasy and imagination plus creativity, only from joining Xinyu Group, she has no major contribution, just an assistant.

But in the first contest with the dark specter of the Internet, all the potential that was developed has exploded.

After graduating from Miaomiao High School and having nothing to do at home, Miaomiao's parents stopped spending money for Miaomiao.

But Miao Miao is still an internet fan. It is really uncomfortable if she doesn't go online, but she can't commit crimes and can't steal it.

Especially girls, what if they really commit a crime, mom and dad who love them

If it's really like that, the father who loves himself will say that his mother will be really uncomfortable. What can I do if I don't want to be myself

But I really can't stand it, it's uncomfortable, and Miao Miao also knows that this is the harm of electronic opium.

But I really can't quit, if there is a good way to go online without spending money, Miao Miao is always fantasizing, or it is said that Huangtian is worthy of his heart, and sincere is good.

One day, Miaomiao saw a pamphlet on a street stall that said how to surf the Internet for free in an Internet cafe. Miaomiao laughed when she saw it, and immediately asked the owner of the street stall how much do you want

The stall owner replied casually; duality. Miao Miao hesitated for a while and immediately took out two yuan to buy this booklet.

In fact, Miaomiao's binary money is still the money earned by selling the tattered goods. This is really nowhere to break through the iron shoes, and it takes no effort at all.

When Miaomiao returned home, she began to look through it and saw that it was written that the method of surfing the Internet at an Internet cafe without spending money is as follows: One method Smart ABC is a very popular input method, which is installed by default in all windows as the system. and many more.

Miao Miao was really happy this time, but she still has no money. At night, Miao Miao managed to manage her father asking for ten yuan.

But it's impossible to give her any more money in the past six months. I haven't slept well all night, and I'm always thinking about how to go to the Internet cafe tomorrow.

Miao Miao can be said to be like a fish in the water these days. Not only does it cost nothing to surf the Internet, but it does not even cost money to eat. She can sell several game accounts when she is fine in the Internet cafe. These are all of them. It was stolen by Miaomiao.

Miao Miao got the sweetness in the online world. She was first inspiring to be a hacker and the power developed by a person with convictions, more than 99 people only interested.

Behind every hard work, there must be a double reward. Mankind is able to do it, because they believe they can.

There is only one way that you cannot choose, that is, the way to give up; there is only one way that you cannot refuse, that is, the way to grow up has this ambition.

Miaomiao started to fumble little by little, because this thing really can’t be told to anyone, and you can’t say anything about it. If you don’t believe it, you can go to the street or go online. You can shout loudly that I’m going to be a hacker, you see. Does anyone take you as a monster.

Since you want to be a hacker, you have to know what a hacker is, before trying to be a hacker.

We must first understand what a hacker is. For a hacker, it is necessary to learn how to invade and crack.

But the most important thing is programming. After all, the use of tools reflects the ideas of others, and the program is your own ideas. In a word-programming achieves everything!

The term hacker is usually defined outside the circle or in the media as: a computer expert who specializes in hacking other people's systems and committing illegal acts.

However, in the eyes of hackers, this type of person is a lower-level cracker (hacker).

If hackers are bomb-making experts, then crackers are terrorists. Now, more and more crackers appear on the Internet, they only invade and use scanners to scan everywhere.

Bombing people with IP bombs, invading and destroying purposelessly, they are not conducive to the development of computer technology.

On the contrary, it is harmful to the security of the network and causes the network to be paralyzed, causing huge economic and spiritual losses to people. Miao Miao does not want to be a Cracker, Miao Miao wants to be a computer hacker! ! Since you want to be a qualified hacker, you have to know what IP is.

In fact, IP is an address, no IP is the same on the external network, it is like an ID number.

Give each computer that enters the network an ID number. But for most users.

This number is not fixed. When you reconnect to the Internet, the IP may be reassigned. However, some machines have applied for a fixed IP.

This makes it easy for other computers to find it and provide services. The general IP format is: a center spacing, the format is dotted decimal) such as 218.242.161.231, and the standard form of IP is binary, such as 212.13. The binary system of 123.52 is 110101. The IP starting with 192.168 is the IP of the local area network, and 127.0.0.1 is used to detect the network's own IP.

That is to say, for any computer, whether it is connected to the Internet or not, 127.0.0.1 is itself to itself. In other words, each computer is composed of a 4-digit 256 hexadecimal number or a 32-digit binary hexadecimal number. Composed of numbers. This is IP. Now that you know the IP, you have to know what a network protocol is. The data packet is a set of communication protocols agreed upon by both parties. Just like the secret code, there are specific agreements to reach a connection. The data packets are one by one. There is another hacker that is a Trojan horse. What is a Trojan horse

The Trojan horse is the Trojan horse (hereinafter referred to as the Trojan horse), called "Trojanhouse" in English, and its name is taken from the Greek mythology of the Trojan horse.

It is a hacking tool based on remote control, with the characteristics of concealment and unauthorized.

The so-called concealment means that in order to prevent the Trojan horse from being discovered, the designer of the Trojan horse will use a variety of methods to hide the Trojan horse.

In this way, even if the server is found to be infected with a Trojan horse, since it cannot determine its specific location, it often can only look at the "horse" and sigh.

The so-called non-authorization means that once the control terminal is connected to the server, the control terminal will enjoy most of the server's authority.

Including modify files, modify the registry, control the mouse, keyboard, etc., and these powers are not given by the server, but stolen through Trojan horse programs.

From the perspective of the development of Trojan horses, it can basically be divided into two stages. At first, the network was still in the period when the UNIX platform was the mainstay.

Trojan horses came into being. The functions of Trojan horse programs at that time were relatively simple, often embedding a section of the program into system files.

Use jump instructions to perform the functions of some Trojan horses. In this period, most of the designers and users of Trojan horses were technicians.

Must have considerable network and programming knowledge.

Then with the increasing popularity of the window operating system platform, some graphics-based Trojan horse programs appeared.

The improvement of the user interface allows users to be proficient in Trojan horses without knowing too much professional knowledge.

Corresponding Trojan horse intrusions also frequently occur, and the functions of Trojan horses have been improved day by day due to this period.

Therefore, the damage to the server is even greater. Therefore, all Trojan horses have been developed to this day, and they have used everything. Once controlled by Trojan horses, your computer will have no secrets at all.

Miao Miao has really been nibbling on books very hard these days. After her parents went to work during the day, she secretly went to the Internet cafe to practice on the Internet.

Running home one hour before Mom and Dad are about to leave work, it really feels like a good girl.

After dinner, Miaomiao went into her room and read computer-related books while studying.

Huang Tian paid off, and he really called Miao Miao himself to research out a variant of the Trojan horse.

Miao Miao really didn't want to be too happy, she didn't sleep well for a while, always thinking about hurrying till dawn.

Mom and Dad secretly went to the Internet cafe to try the Trojan horse they studied after they went to work.

By the way, I should give this Trojan a name. What name should I name

When Miaomiao wants to have it, he will call it Mengsa. If there is, then there must be a Trojan horse configuration

From the specific configuration content, it is mainly to achieve the following two functions: Trojan horse camouflage: In order to hide the Trojan horse as much as possible on the server side, the Trojan horse configuration program will use a variety of camouflage methods.

Such as modifying icons, binding documents, customizing ports, self-destruction, etc.

Information feedback: The Trojan horse configuration program will configure the information feedback method or address.

Miaomiao is really troublesome to think about it.

But there is no way to have a saddle since there is spicy. So this night Miaomiao can say that she really didn't sleep well and she really asked her to come up with a set of feasible methods.

The next day, Miaomiao ran to the Internet cafe at a speed of one hundred and twenty veins less than half an hour after her parents left for work.

As soon as the network administrator of the Internet cafe saw Miao Miao, he felt that he couldn't say it. Anyway, he just didn't like to see him. Normally, someone coming to the Internet cafe should be welcome with raised hands.

But when Miaomiao came to the Internet, she never saw her paying. The account of Miaomiao's member really couldn't be faulted by anyone. There was always so much money in it.

Miaomiao is a real person, can't you not just enter a pit and change another one? Is there a grudge against others

Later, Miao Miao said that the most important thing in her heart is that this internet cafe is the closest to her home and it is convenient to go home.

Miaomiao came to the Internet cafe and sat in front of the machine she used to make. Open the web browser.

Miao Miao called a website to Lezha, I saw the name of this website is QSBWJY Software Development Co., Ltd.

It should not be said that all companies on the earth are limited companies and this one is indeed an unlimited company.

It is really interesting to be a little-known software development company.

Miao Miao thinks that since this is the case, I will challenge myself to try if this Trojan horse can pass theirs.

That is to say, this idea is that Miao Miao finally became the network elite of this company after the Central Plains Network War.

Even she herself didn't think that this was something to follow. So Miao Miao began to spread the Trojan.

Transmission methods of Trojan horses: There are two main methods of transmission of Trojan horses: one is to send the Trojan horse program as an attachment in the email by the control terminal, and the recipient will infect the Trojan horse as long as the recipient opens the attachment system; the other is One is software download.

Some informal websites bind Trojan horses to software installation programs in the name of providing software downloads.

After downloading, the Trojan will be installed automatically as soon as you run these programs.

Camouflage: In view of the harmfulness of Trojan horses, many people still have a certain understanding of Trojan horse knowledge, which has a certain inhibitory effect on the spread of Trojan horses, which is undesirable for the designers of Trojan horses.

Therefore, they have developed a variety of functions to disguise Trojan horses in order to reduce user awareness and deceive users.

There are mainly the following 6 aspects: Modify the icon: When you see this icon in the attachment of E-MAIL, do you think it is a text document? But I have to tell you.

This may also be a Trojan horse program. There are now Trojan horses that can change the icon of the Trojan horse server program to the icons of various documents such as hypertext records, text files, and mailboxes.

This is quite confusing, but Trojan horses that provide this kind of function are rare now, and this kind of camouflage is not invulnerable, so there is no need to be afraid and suspicious all day long.

Bundled documents: This disguise method is to bind the Trojan horse to an installation program. When the installation program is running, the Trojan horse sneaks into the system without the user noticing it.

As for the bundled documents, they are generally executable documents.

Error display: Anyone with a certain amount of Trojan horse knowledge knows that if there is no response when opening a document, it is probably a Trojan horse program. The designer of the Trojan horse is also aware of this defect.

So there is a Trojan horse that provides a function called error display. When the server user opens the Trojan horse program.

An error message box will pop up, and the content of the error can be freely defined. Most of them will be customized to some messages such as "document is corrupted and cannot be opened!". When the server user believes it is true, the Trojan horse quietly invades the system.

Custom port: Many old Trojan horse ports are fixed, which brings convenience to judging whether the Trojan horse is infected.

The specific port knows what Trojan horse is infected, so many new Trojan horses now have added the function of customizing the port. The control end user can choose a port between 1024 and 65535 as the Trojan horse port (generally, the port below 1024 is not selected) Port), which brings trouble to determine the type of Trojan infected.

Self-destruction: This function is to make up for a defect of the Trojan. We know that when the server user opens the document containing the Trojan horse.

Copy it to the system file folder of the window operating system (C: window operating system or C: system directory). Generally speaking, the size of the original Trojan horse file and the Trojan horse file in the system file folder are the same (except for the Trojan horse with bundled files) ).

Friends of the Trojan horse only need to find the original Trojan horse document in the letters and downloaded software recently received.

For the size of the original Trojan, go to the system file folder to find a document of the same size and determine which is the Trojan.

The self-destruction function means that after the Trojan is installed, the original Trojan file will be automatically destroyed, so that it is difficult for server users to find the source of the Trojan, and it is difficult to delete the Trojan without the help of tools to detect and kill the Trojan.

Trojan horse rename: the file name of the Trojan horse installed in the system file folder is generally fixed, so just look for a specific file in the system file folder according to some articles about anti-trojan horses.

What kind of Trojan horse was hit. Therefore, there are many Trojan horses that allow console users to freely customize the file name of the Trojan horse after installation.

Run Trojan Horse: After the server user runs the Trojan horse or the program bundled with the Trojan horse.

After Miaomiao started the Trojan horse, she casually went off the Internet and went home. Fortunately, she went home and walked quickly or something really happened.

Less than ten minutes after Miaomiao arrived home, that is, the Internet cafe where Miaomiao went online, all computers suddenly went black.

It is not good to restart or shut down and wait for a while to paralyze the entire Internet cafe. It took another half an hour for this Internet cafe.

The brain was fully braked and turned on without anyone's control. The computer screen showed such a few large characters. The website gave me a Trojan horse. This is just for pediatrics. I want you to know what there is, and there are people outside of people.

You may want to learn from others who want to be a hacker, right? Then I will let you know what a hacker is.

I will tell all your computers to be automatically paralyzed once within three minutes, but your Trojan is really good. Even I was cheated.

After reading these no more, no less, it was exactly three minutes. All the computers went blank again all of a sudden.

All the people in the Internet cafe, including the owner and the network administrator of the Internet cafe, are all stupid. Just now, I worked as a Trojan horse, and after finishing the Trojan horse, then let go of the horse. Who would it be