Magic Hacker Archive

Chapter 16: get in touch with

Views:

The cabin came to QSBWJY Software Development Co., Ltd. on time the next day.

As soon as I arrived here, I felt that the cabin was really a big company. It was different because it was different. All the employees were so orderly, with a smile on their faces.

There was also a young man named Qu Bin who reported with the hut, and he felt as dark as if he didn't have any popularity.

But the cabin can't control those, as long as you can do it here, this is the world's best and largest software development company, and there are so many talents in this field who want to get in.

Seeing their arrival, Xinyu greeted her at a quick pace and didn't have the boss's arrogance at all.

Xinyu said to them; Qu Bin, I know your specialty, you are a famous computer genius on the campus of Kyungpook University.

Even computer majors sometimes come to ask you for advice, and I will relocate you to the software development department.

I have a new startup project, that is, the transmitter can say that it is not an ordinary fax machine.

It can be said that it is like one can transport items to another city.

"Hey!"

Let's put it this way, where do you go first to have a professional person to work on this development with you, and someone will talk to you in detail about specific matters.

Qu Bin nodded his head and said; good boss, I'm going to report.

Xinyu smiled and said to the cabin; I won't say much, I have reached an agreement with you yesterday, and you will give me a virus defense in the virus group.

"boss!"

Xinyu turned her head, looked at the employee pony who ran over, and asked, "What's the matter?"

"The host is paralyzed!"

"what?"

"The mainframe of the development department is paralyzed,"

The host of the customer department also has an abnormality. The boss is good at it. Let's take a look! All colleagues in the virus group are at a loss now"

Xinyu is furious, this hacker has never died!

Xinyu then turned around and said to the cabin; this is the time to show your professionalism, don't disappoint me! I don't care about this, it's up to you as an expert.

After speaking, I said to Xiao Ma; this is the new leader of the virus group, so take him to have a look, I think he will fix the virus.

The hut quickly walked back to the host room under the leadership of the little horse.

The first feeling of the cabin is that this matter is for the host of the company where he is now, because the other extensions and the extensions of the assembly department are fine!

Open the task manager, there is an additional process, don't ask, there must be a problem here.

So I started to look for the root cause, and after a while I found a process that occupies very little memory, but is definitely a Trojan horse. Click to stop the process!

The hut also knew what was going on. As soon as the host shut down the Trojan horse process, there was a problem.

When the user machine is turned on, the hard disk will be burned and the screen will show up. This is a gift from me. Please accept it!

"Humph!"

Hut and Xinyu are both very angry. If they are not angry, it is false, which means that the opponent's goal is not just to destroy their own security system.

Another point is that the most annoying thing in challenging your company is to let yourself burn all the machines here.

This Trojan is designed as a shutdown process, which will cause the machine under the control of the host to experience the hard disk overload operation, forming an instantaneous high voltage, and then causing the electrical components to catch fire!

However, there is a problem now, that is, under the strict control of its own high-performance hardware and servers.

How can this kind of Trojan succeed? In the hacker world, I have not heard of such a Trojan horse, the effect that can be triggered will be so powerful! The hardware will burn, and subtitles will appear on the screen, even if you turn off the power, it won’t work.

Is this another set of subtitles appearing on the screen, or the word "flame" with flames written on it is "Fluttering". No matter how powerful you are, you still can't get rid of my intrusion. This time I want you to destroy the net.

Xinyu now didn't care about the gloomy face after running over so much, the teeth ringing straight, and the eyes seemed to be on fire.

Already frightened when the computer suddenly caught fire, the employee has unplugged the fluttering mobile phone!

"Said: "Boss lady~"

I snatched the phone before I finished my heart, looked at the employee, and said loudly: All employees are not allowed to call, tell my wife what happened today, and sometimes someone keeps it secret. If I secretly call, then ask him to leave me here as soon as possible.

After Xinyu said the words, he whispered into the microphone as soon as possible; baby! have you woken up? I miss you.

And when there was a dead ghost over the microphone, you missed me again when you left. Tell me what's wrong with you? Did you fall in love with that little vixen

Xinyu said immediately; no, I really missed you all of a sudden, I will go back now. After speaking, hung up the phone and handed it to the employee to say; don't make random calls.

Xinyu patted the hut and said; I'll leave it to you first, I have to go back and be with my baby. I want to accompany her more.

I'll give you three hours to handle it well. You will be in my company **** and give you a deputy general manager. If you can't handle it in three hours, then you can leave. After speaking your heartfelt words, turn around and leave. .

With such a big incident in the company, his heart words can be calm, which shows that this is the boss' demeanor.

The hut knows that if it can’t be solved in time, it will be unthinkable if you don’t find out the clues in the first time. But now, there is a computer burning in less than half an hour. This loss is really too great. It was really bad for him to encounter this kind of thing on the first day.

What kind of trojan horse is this cow? Even your magic star Internet cafe can't support it. Burning all these machines? 'Also, whether you turn off the power or take the machine outside, it will burn within half an hour, and the screen will display subtitles even if it is separated from the main unit, which is really incredible.

Suddenly the hut remembered a programming that I didn't even dare to think about. You are network programming. "Backdoor" and "Trojan Horse". This "backdoor" is a general term for hacker tools. In fact, most Trojan horse clients have been made into GUI The form, after all, the graphical interface is much better than the dark console, and much better.

But these so-called benefits are only for customers. Considering a large amount of graphics code is quite a time-consuming and laborious thing. Moreover, with the cooperation of VC+C/C++ (or added as a functional circuit), writing interface programs is compared with VB. , Do database documents and other high-level languages.

Thinking of these huts, I started to solve this tricky Trojan horse.

Shut down and restart the computer, control the system audio, give a command to your computer client, open the client port and wait for the connection request. The whole process is paused in the window as the system, and the program loop will be executed recently; the server sends help information to the customer service , Prompt the command used by this program, and then wait for the client to send the command to accept (c.mi, 1024, 0). After getting the command.

Enter the limit switch statement to judge the command, and then the specific function implementation code for different commands. After executing a command, jump out of the switch statement, loop again, send a prompt, wait for the command instruction, execute the instruction... ... There is also a creation structure interspersed in the middle, which is used to deal with the connection problem and create a loop And the purpose of the search results is to keep the Trojan in working condition and to protect it from opening to the outside world. Although there is an'endless loop', because of the existence of acceptance, the program has the opportunity to suspend.

Therefore, the Trojan horse program will not preempt the computer with high intensity. These are easy to say, but they are not that simple to do. The hut is already sweating after doing this.

Now the computer is no longer burning and you can continue to work. Amidst the applause of everyone, the cabin walked into his own office, and he was busy for nearly two hours.

The hut has found the hacker’s p address. Since he works here, he still specializes in anti-virus and anti-virus. The most annoying thing is that the hacker dared to give himself a blindfold on his first day of reporting. Really Is too unsure that the hut is in the eye.

So the hut has now made a latent intruder ~ a web Trojan. The hut in the hut can generate different net horses for different vulnerabilities. These vulnerabilities are not only system vulnerabilities, but also third-party vulnerabilities.

The hut is so happy in my heart. I don’t believe you are not in the middle of the horse. In less than three minutes, the computer I am currently using suddenly appeared on the display with three big characters, “Who are you?” 'The cabin goes back; then who are you

Then I restarted my computer immediately, the hut immediately checked whether my computer was poisoned, and there was no sign of poisoning yet. This is the five big characters "I am a blue screen" on the display. The hut immediately replied that you are very tough, but I I will catch you.

Lan Ping'er was very funny seeing the words on his screen at this time, and he wanted to fight against you backward groups.

I am outstanding in my world. If you decipher my Trojan horse today, I will give you the next third eye. I will take a good look at whether you are legal. Don’t be sad and divine.

At this time, the hut is thinking that the third eye of a remote Trojan horse I just studied is not useful yet, just use it on you to see how effective it is.

This third eye is not so powerful. It can remotely control any computer and can also automatically search for information on all computers, which is tens of thousands of times more powerful than broiler software.