Riding the wind of rebirth

Chapter 2071 There is nothing new under the sun

"Yes, the system will also collect and verify the user's account and password through the login command. If a login with a root privilege backdoor password is used to replace the system login, the attacker can not only easily enter the system by entering the set password, but also send other users' login information to himself."

"Even if the system administrator changes the root password or clears the root password, the attacker can still log in to the system as the root user."

"Will anti-sniffer programs not work at this time?" Zhou Zhi asked, "For example, ifconfig."

After entering the UNIX system, attackers usually perform a series of attack actions. The most common defense method is to install a sniffer to collect important data from the local machine or other servers in the network. By default, there are also some system files in the system that monitor the actions of system tools, such as the ifconfig command mentioned by Zhou Zhi.

"Therefore, in order to avoid being discovered and to facilitate their sniffing, attackers will try every means to replace ifconfig, and even common commands such as ls, ps, ifconfig, du, find, and netstat," said Mai Xiaomiao. "If all these files are replaced, it will be difficult to find that rootcat is already running in the system at the system level."

"Lady, you're really ruthless." Zhou Zhi clinked his cup with Mai Xiaomiao's: "You're still talking about attacking, we're talking about how to defend and counterattack."

"Now that we know the means of attack, we also know how to defend and counterattack." Mai Xiaomiao said, "The means of defense are to plug the loopholes, set up integrity checks on important files, check at any time whether they have been modified or damaged, and regularly replace the system command program with the backup command program. In this way, even if the system has been invaded by rootcat, it can be wiped out at any time."

"I have already written the defense software, and the group has already arranged these measures. As for the counterattack..."

"Yes, what we just talked about was defense. We haven't seen any counterattack measures yet."

"There are two ways to fight back. One is passive." Mai Xiaomiao said with a smile: "Why would someone invade our system? They must want to steal something..."

"How can you say that about yourself? 'Steal' is such an ugly word, just say you took it out." Zhou Zhi teased Mai Xiaomiao.

Mai Xiaomiao hit him and said, "If they have an intention, we can just design some mines and send them to them."

"Of course, we won't attack immediately, but we will leave backdoors and evidence. Fighting hackers is a long process. We won't reveal that we have already countered them until a special moment comes. At most, we will let the other side see that we are busy plugging loopholes, so that they can feel proud first."

"This is even using military tactics." Zhou Zhi felt that there was really nothing new under the sun. Although this type of offensive and defensive battle was posted online, it was still human nature that was at stake: "We just let them steal some stuff, but then install a virus or backdoor in the stuff to kill them?"

"Well, that's roughly it. The other type is the real attack." Mai Xiaomiao said, "As long as it's an attack from the Internet, there will be a path to follow. Then we just need to find the other party's address to launch a reverse attack." "Of course, the methods are actually the same. It just depends on who finds more system vulnerabilities."

"That's a bit heartless..." Zhou Zhi said with a smile, "Clover has developed to the point where its familiarity with the two core systems of Microsoft and UNIX is almost top-notch, and it has even gone deep into the chip level. It's just that many things are not made public and are only used as content libraries for antivirus software. Don't think I don't know."

Mai Xiaomiao also laughed. The research and development of antivirus software is also a relatively large profit point for Clover. A good doctor is often also an expert in using poisons. The researchers of antivirus software themselves are also very interested in the iterative upgrade and classification research and development of virus programs. Taking advantage of the opportunity to help Microsoft develop VC, Clover has already thoroughly studied all kinds of protocols and controls of the system, and has mastered many bugs that Microsoft has not even known about until now. These bugs can become weapons that the Clover Group can use to deal with attackers at any time.

Clover has gone even deeper into the research of UNIX, and even has the ability to develop an operating system with independent intellectual property rights based on its kernel, and can also develop corresponding computing chips and computing cards based on its own system instruction set. It can be said that it is already a big name in the industry.

In the process of developing its own operating system and computing power cards, Clover also formed its own defensive barriers. Its familiarity with several major external operating systems other than Apple is far greater than the outside world's familiarity with the Clover operating system. This is also where it can gain a natural advantage in network attack and defense.

Although such an offensive and defensive battle has not yet begun, after all, the current Internet is not very developed, and many behaviors that destroy the system are not particularly targeted, and are mainly "indiscriminate attacks" through viruses. However, Zhou Zhi feels that just like in later generations, such an era will come sooner or later.

The two chatted for a while while looking at the beautiful scenery of lakes and mountains, and the topic turned back to the wedding of Wu Renzhong and Shama Ricong.

As very important guests, Zhou Zhi and Mai Xiaomiao have lost the qualifications to be best man and bridesmaid. This time Wu Renzhong and Shama Ricong are going to hold an Yi ethnic wedding, and there is no such thing as best man and bridesmaid. Instead, they are called welcoming team and seeing-off team. Zhou Zhi got a job as a photographer, and Mai Xiaomiao was just there to watch the fun. In order to keep her by his side, Zhou Zhi asked her to be a lighting technician.

The Yi people also have to choose a wedding date when getting married. The date is selected by the Bimo according to the zodiac signs of both parties' birth years and months. It is usually held during the golden farming season after the autumn harvest every year, from November of the lunar calendar to February of the following year.

Lao Chi Ri had already chosen a date for them. The third day of the first lunar month was the best date. On that day, six stars would be in a parallel line with the moon. It was a solar term called "Ta Bo" in the Yi language, and it was the best date for the wedding.

The date for the engagement was also combined with an engagement ceremony, also known as "taking omens for a marriage". Neither Wu Renzhong nor Shama Ricong could raise pigs, so they picked two pigs from the farm as one for the man and one for the woman. After the pigs were killed, their gallbladders and pancreases were taken for inspection. If the gallbladder was clear yellow and the pancreas was large, straight and fat, it was auspicious. If the pancreas was curled, it was inauspicious, indicating that they were not compatible.

Before slaughtering the pigs, Wu Renzhong was quite worried that the pigs would ruin his plans, which made Zhou Zhi laugh so hard that he fell down. In the past, pigs were raised in a free-range manner and there was a lack of scientific methods such as vaccines. It was entirely possible that the pigs would be sick or carry parasites. However, the pigs in the farm are managed scientifically and are all very healthy, so such a situation would not occur.

Sure enough, the two big fat pigs were killed and they were all very lucky. Now they were dragged to the courtyard of their beach villa for use. (End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like