Magic Hacker Archive

Chapter 4: Never give up my heart (1)

Views:

Xinyu Archives: A child who always has illusions does not want to live in obscurity. No matter how difficult it is, he will face it bravely, even if it is death.

He wanted to change his own destiny, to realize his illusions and ideals and ambitions, he finally changed his own destiny.

The internet strongman's heartfelt words have since changed his own destiny, from scratch, he finally became a strongman in the network world, and he himself has become a legend, is it a man? is God? Is it a demon or a ghost

In the first, second, and third battle with the dark ghosts of the Internet, miracles were created.

Hello everyone, I want to click through and I want a monthly pass. I hope you will support and give me some valuable comments. Thank you for the future articles will be more exciting. Thank you for your support.

Xinyu is a humble person, short and chubby, and also very easy-going, smiling at people, not laughing or talking.

It seems that there is still a bit of an idiot, as long as he thinks it is his friend, no matter who has something to do or begs him.

Xinyu will help to the end, and his so-called friends are all using him, using his money and his stupidity.

Because he is the wallet that the big guy's wallet can never be emptied.

"No one really has a heart with him, and he will always be so carefree, don't think he has only elementary school education."

"For his so-called friend, he entered the juvenile management office and stayed there for a year, but his family still begged his grandfather to dig out the relationship and spent a lot of money to export him."

Since then, no school has dared to ask for him. It is hard to spend money, but I can't just give up on myself like this. I must live out a person and show it to those who despise myself.

But it is really difficult to change all of this, but Xinyu has his own set of principles for being a human being, that is to be a true self.

"Constrain yourself at all times, don't let yourself let it go, just do what you should do, don't let the world trouble you, you can have nothing, but you can't have a conscience."

Be a happy person, a true man, and never be a man of affection. The happiest person is the happiest person.

Whatever you choose, you have to finish walking on your knees. Whatever you choose, you have to finish walking on your knees. Everyone has their own position, their own hobbies, and their own choices.

People should choose for their own positions and hobbies, pay for their choices, and be responsible for their actions.

At the same time, don't hesitate because there are too many choices around, or even go too far to pursue choosing a certain substance, and miss many things that shouldn't be missed around you.

Don't let yourself be blinded by having a choice. Sometimes, it is better to have no choice than to have a choice!

If there is no choice, life is a series of isolated moments. Relying on memories and fantasies, many meanings emerged.

Obtain liberation and comfort in the constant repetition of disappearance and emergence.

So cherish the people and things around you! Don't confuse yourself because of choices.

Cherish your choice, work hard for your choice, and persevere for your choice!

I believe that with choice, there will be motivation, life with choice will have a taste, and life with choice will have struggle.

At the same time, don't let yourself be buried in the confusion of choice, have ideas in the choice, choose the right one, and don't regret the choice.

It was one night ten years ago when Xinyu was surfing the Internet and was watching online news. The computer screen showed a piece of news. The latest hacker Trojan attack method was unfortunately, the loophole was discovered by the hackers.

And hackers have successfully used this vulnerability to carry out many attacks.

This new attack method is called a distributed denial of service attack, or bug attack for short.

Some domestic and foreign high-performance commercial networks and educational networks have all suffered such attacks. A bug attack is a special form of a denial of service attack.

The principle of the bug attack method and the basic principle of realizing this attack is to use the host that the attacker has invaded and controlled.

Launch an attack on a single machine. In the contrast of power disparity in bandwidth, the host being attacked will quickly lose response.

This type of attack proved to be very effective and very difficult to resist. But the realization of this attack method has certain difficulties.

It is more difficult for ordinary people to implement smoothly, because the attacker must be familiar with some intrusion techniques.

But what is disturbing is that there are tools that have been written by hackers to help realize this kind of attack. The two known ones are indexes and the installation and use process of a large number of source code packages is more complicated.

Because the compiler first finds some vulnerable hosts on the Internet, through some typical and effective remote overflow vulnerability attack programs.

Obtain control of its system, and then install and run the distributed attack daemon on these machines.

Using tool software to implement bug attacks to understand this new attack method is very useful for us to prevent such attacks.

Here is a brief introduction to the structure of the index and the general method of using this tool to achieve a bug attack. The index consists of three parts: 1. The client client can be commonly used connection software such as remote login, and the role of the client is to send commands to the master (control).

It connects to the controlled port 27665, and then sends an attack request to the target host to the network management 2. The main control end (control) The main control end listens to two ports, of which 27655 is to receive the attack command.

This session requires a password. The default password is "A prompt will be displayed when moving: "? ? ", waiting for the password. The password is "gOrave" and the other port is 31335, waiting for the UDP message from the distribution end.

The distributed end (gater) attacks the daemon. The distributed end is the role of executing the attack. The distribution terminal is installed on a machine already controlled by the attacker, and the IP address of the control terminal is implanted before compilation.

Which contains the byte data of HELLO. The main control end sends the target host's information to the distribution end through the 27444 UDP port, and the distribution end initiates a "tide" attack. The flow of the attack is as follows: "Attacker -> Control -> Distributed side -> Target host".

The bugs sent from the distribution end to the victim's target host are all user data packets, each containing 4 null bytes. These packets are sent from one port, but randomly attack different ports on the target host.

The target host replies an unreachable and non-final message to each message. These flood-like messages sent by a large number of different hosts continue, and the target host will quickly slow down until the remaining bandwidth becomes zero.

There are several ways to deal with stinky attacks to detect this kind of attack.

However, since the main purpose of this attack is to consume the bandwidth of the host, it is difficult to resist.

Some dynamic intrusion detection system products must be developed to help deal with this kind of attack.

The detection method of the intrusion detection system is to analyze a series of user data packets and find those that are aimed at different target ports.

But user data packets from the same source port. Or take about 10 user data packets and analyze those packets from the same IP, the same destination IP, the same source port, but different destination ports.

In this way, the source of the attack can be identified one by one. Another method is to look for information about the same source address and the same destination address.

Xinyu wonders if hackers are so powerful and they have not prevented them from being able to crack everything.

I want to challenge them. I must research a self-powered anti-virus and anti-virus software to see them. Then, what can I do if I make up my mind and make up my mind. But because of the lack of culture, especially the development of software.

It's not as simple as doing other things. The first thing you need to do is to have professional knowledge and talents. It's not a job for one person, not a game.

The second is to have a lot of money to develop software is to burn money, and the third is to have a considerable team and be an elite among the elite.

These three are indispensable. It's a pity that these three heart words only account for one, that is, the second one, money is not a problem.

He didn't think so much because Xinyu had a fever in his brain, and it was this fever that had built a software empire for him.

Xinyu told his parents what he thought.

Xinyu's parents were private entrepreneurs in this city at the time, with a family wealth of hundreds of millions, which is not counted as overseas assets.

When his parents think about it, it’s okay. Since the child wants to do it, they will make him a big deal and lose some money.

What can be and what can't be, it's better than just messing around with some gangsters outside.

For this reason, his parents set aside a million for Xinyu.

His parents didn't take this matter seriously, and Xinyu didn't ask for money before.

Isn't it all that he didn't do in the end, and he didn't expect him to make money because they knew too well, their own precious son.

Just tell him to toss it, as long as he doesn't cause trouble, he can do whatever he wants.

His father patted his son and said; As long as you don't go out to make trouble, father and mother will always support you.

Don't worry about it, don't worry about it. It doesn't matter whether you pay it or not, isn't it just a piece of money.

Mom and Dad don't care about this small amount of money. Your pocket money for a year is more than this.

If you say something, just do your heartfelt words and first register the company's name as QSB Software Unlimited Development Company, which means unlimited development and grand ambition.

So I went to the talent market to invite professionals and recent college students, but when people hear that such a company is still developing infinitely, it feels weird that other companies have limited development.

But he has come to an infinite development. He is really an idiot. Xinyu has not recruited anyone for four days, he is not anxious, as if it has nothing to do with him, and his so-called friends are laughing at him.

So it seems that you are just a bad luck and infinite development. You are a big-headed ghost. It's better to put the money out for everyone to be happy and happy.

If in the past, Xinyu must have gone with them, but this time Xinyu did not go with them.

Because of his heart words, he swears in his heart that I will do it well this time.

I can no longer ask all people to read my jokes, or tell everyone to say that I am useless, say that I am an idiot, say that I have a good mom and dad, I am not an idiot, I am a genius, the greatest genius in the world.

"Really, this really confirms Xinyu's words in the future, no one in the world will laugh at him anymore, he is the legend of the Internet, the god of the Internet...".

Even those so-called friends in the past never dared to laugh at him anymore, he didn't have time yet.

Otherwise, there is an old saying that sea water can’t be measured, and people can’t look at themselves. It’s like a dream where gold shines, and life is like a dream.”