Cyber ​​Heroes

Chapter 365 Hartman

Chapter 365 Hartman

"Hello." Xiang Shan folded his arms and greeted Hartman in a friendly manner.

Hartmann had been distracted.But this time he reacted.Immediately he stood up and said loudly, "Yes, sir."

"That... I'm not your officer..."

"The leader of Hanuman's working group, Xiang Shan. You are right. You are my chief at the moment."

Xiang Shan didn't expect this hacker to have such a strict personality.Instead, he was a little embarrassed and just asked, "What are you doing now?"

"Are you asking about work progress, sir?"

Hartman's voice was quite loud, and several people from the security department heard it not far away.They took a look and found that it was Xiang Shan, so they ignored it.

After all, Xiang Shan is indeed the boss now.And this boss has been trying to "exchange academics with those hackers" these days. Now that Hartman is here, it is only natural for the boss to ask.

After all, there was really nothing he couldn't ask.

"I'm scanning these electronic devices to infer the transmission of electronic viruses, sir."

It was only then that Xiang Shan noticed that there were indeed quite a few personal devices piled up on the table.

"Have you found anything?"

"It's still being scanned, sir. I just screened out the 'white list' files. The remaining suspicious objects are being analyzed with the toolkit." Hartman said, "Actually, I can probably guess the method, but I'm not going to pass judgment until I'm sure."

Xiang Shan asked, "Can you tell me?"

"I speculate that it should be a Trojan horse. It knows the common characteristics of research materials, searches the entire computer for data that matches the characteristics, and then sends it to a designated location when there is a public network. After all this is done, the Trojan horse is It will be automatically deleted to prevent itself from being retrieved. Therefore, checking those scholars who have already leaked secrets will definitely not find the virus. But it will leave traces anyway.”

Human immunity is divided into "non-specific immunity" and "specific immunity".Non-specific immunity will clear up the "things that are not me" in the whole person.And specific immunity is only against specific pathogens.Generally speaking, after pathogens enter the human body, they will be attacked by non-specific immunity.A piece of malicious RNA can't get itself into a cell directly, so it needs a protein shell—this is a virus.

Pathogens such as viruses will disguise themselves, activate receptors on the surface of human cells, pretend that they are some kind of substance that cells need, and enter cells.The virus that reproduces in large numbers will activate the resistance of the specific immune system.Helper T cells recognize antigens, read the records encoded in memory T cells, and then produce antigens.

This set of logic can also be roughly presented on computers and computer viruses.Computer systems are defined by engineers as "legal operations" and "illegal operations", and some operations are inherently difficult to execute.It is difficult for pure malicious code to take effect directly.So hackers will "shell" malicious code.The virus either extracts permissions, or uses loopholes to disguise its own modification as a "legitimate operation".Anti-virus software and analysis software can retrieve the codes of these "shells", and compare them with the virus database to perform scanning and killing.Security software and virus databases represent helper T cells and memory T cells.

However, the viruses written by humans are the product of intelligent design, so they often have "spoof operations" that are unimaginable in natural evolution—such as self-deletion.

The virus destroys its own "shell", preventing the immune system from recognizing it.

The spread of computer viruses also follows the epidemiology.However, a virus that "disappears without producing antibodies" will definitely make it difficult to determine "patient zero".

But "Agni" seems to be able to find "traces of virus modifications"—or "records of symptoms" in other words, and then deduce the transmission trajectory based on the "records".

Speaking of this, Hartman was a little proud: "Actually, I know a little about 'Zhu Rong'."

Xiang Shan felt a little strange: "Are you friends? Or do you have hatred?"

"I don't know." Hartman shrugged: "But I have studied him."

"You have studied him? Then why didn't you catch him?" Xiang Shan felt very strange: "You should have caught this guy earlier, wouldn't there be so many troubles?"

"I'm not a policeman or IRS (United States Taxation Service)." Hartman was also very strange: "If there is no order, why arrest this economic criminal?"

"Economic criminal..." Xiang Shan was completely confused.In the eyes of this hacker, can the behavior of "Zhu Rong" be summed up as an economic crime...

No... it does seem to fit the definition of an economic criminal, but...

Xiang Shan asked, "Then why are you studying it?"

"A hacker is a person who finds holes in the system. Some people are good at finding holes left by construction workers, and some people like to drill holes by themselves." Hartman said: "Follow the footsteps of other hackers, it is easy to find" Holes'. I have studied other hackers' methods. But I rarely take the initiative. Generally, I just follow them and look for things to exploit."

Xiang Shandao had indeed heard of such a thing.Some little black hats, the bottom of the rivers and lakes like peddlers, will only learn some very basic technologies from some big hackers. [It may even only use scripts written by big hackers, known as "script kiddies" (script kiddies)] After they use certain scripts to hack into innocent websites, the Trojan horse files and passwords generated by those scripts in the websites Probably all the same.

These script kiddies are more like the furnace and puppets of the script master.They will invade some innocent websites, slightly modify the materials on the homepage and other materials to prove themselves, and then triumphantly put their "records" in the anonymous community to accept the worship of others.But all of this is to provide convenience for the hidden actions of the big hacker behind the scenes.For big hackers, this is "casting a wide net".Maybe when such a little resource will be used?

But Xiang Shan really didn't know that hackers at the level of "Agni" also do this kind of thing...

In other words, a hacker at the level of "Zhu Rong" can be treated like a script kiddie...

"For me, reversing Trojan horses written by other hackers is actually a little more interesting than breaking into a complex system." Hartman said: "I'm not saying that I'm not good at the latter. In fact, I'm also very good at finding loopholes. Good, but compared with other hackers, it can't close the qualitative gap. But I like to think about the little tricks that other people have played, sir. Those things that mediocre 'Vulcan' left on the Internet, I cracked seven Seven or eight. I knew that he still has several things that he hasn't confessed... Many famous hackers, you think they have confessed all their crimes. Have you seen "Harry Potter"? It says, those Wizards like to tease Muggles very much, so they put a fireproof spell on themselves during the witch hunt, and then stand in the fire and yell twice to play. Those hackers may not be so leisurely when they stand in court, but they must be suppressed "That's all you know". I'm different..."

Only then did Hartman realize something, and stood up straight again: "I'm sorry, sir. I may be a little wordy."

Xiang Shan didn't really dislike this kind of person.He felt that this guy had a similar taste of "technical house".He waved his hand: "So you know the evidence of many big hackers? You can send them to jail at any time?"

"It's not that exaggerated, sir. At best, I can only confirm 'what did this ID do online', or 'which IP did this ID use to log in'. Many times, if you want to convict those criminals, you still have to dig out Their identities in the real world can only be obtained by snatching their equipment when they operate their own accounts." Hartman is very honest: "The FBI is very professional in this regard."

When he said this, he glanced at the former FBI monitor beside him.The former FBI monitor actually nodded proudly.

Xiang Shan scratched his head: "You can't lock the position of 'Zhu Rong' quickly either?"

Hartman was rather surprised: "Don't you know, sir, my main job is to investigate computer virus infections and assess the extent of information leaks. As for catching 'Zhu Rong', I have to wait until this is done. "

Xiang Shan nodded: "I thought I could find that person directly through you."

"Well, maybe I'll be there for the final arrest, to keep her online with provocation or something. But most of the time, social engineering is the best attack."

Xiang Shan nodded: "You are still very transparent. I thought you were very proud of your skills."

"No, I'm really proud." Hartman said: "My technology can maximize the power of social engineering methods. The correct order can use my power correctly."

Xiang Shan said, "That's why you want...to join the army?"

Hartman nodded.

"Then why did you sign up to join the army abnormally?"

"I have a technical advantage, but I don't have a physical advantage, sir," Hartman said. And progressing so fast, I might not be the best hacker in the world if I let my studies loose due to my daily military training."

Xiang Shan probably understood why those United States soldiers didn't like this man at all.

It's strange to like it.

And this guy didn't seem to hide his intentions at all, and he actually told himself, the "foreign chief", on this occasion.

Xiang Shan even noticed the expression on the face of the former FBI monitor.I'm afraid he also thinks this colleague is ridiculous.But he didn't seem to be allowed to speak, so he kept silent.

Hartman even said happily: "I will become the deputy director of the FBI one day. As long as my technology is combined with the power of the FBI, I will definitely eradicate cybercrime in the United States!"

Hearing this, the former FBI officer showed a smile, but quickly restrained himself.

——This poor child, he still doesn't know why he is isolated...

However, Xiang Shan couldn't hate this kind of technical geek.

He chatted with this "Agni" for a while.

 ticket!

  
 
(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like