Reborn Super Hacker
Chapter 250 The Dragon Is Roaring, 1 Fatal Strike
Main text 【The Matrix】Chapter 250 The dragon is roaring, a fatal blow-
-
At 1:10 a.m. China time, the 30 account registrations for "Growth" that were opened today are still sold out. At this time, the number of online users still reaches more than [-], because many people have to go to work. If you play until this late Otherwise, you will be late for work, and the time in "Growth" will be reduced accordingly. Another reason is that "Growth" stipulates that the game time is only three hours a day. -
If you don't get real rewards, you can't continue the game, so people nowadays have developed a habit of working hard during the day, and starting the game after dinner, until the day's game time is exhausted, now except for Huang Fei The fierce battle value in the game has reached more than 300 points, and No.2 is only 158 points. Go live now and you're sure to see lots of friend requests. -
But this night is destined to be busy. After Huaxia Internet was hit by a frenzy of smart viruses before, although it has been relatively stopped, another problem has been exposed on this seemingly calm Internet. In the eyes of Huaxia netizens, everything is normal. It is normal for them to go online to inquire about information and express their experiences. Behind this normality, there is a tough confrontation. -
The headquarters of the X organization in Los Angeles, M country. -
"No, the previous six common vulnerabilities have all been fixed!" Gypsy said. -
"Come on, I'll use this sa to raise my rights." Meka interjected, but this sentence got the approval of everyone. -
"This server is managed by a sql database. I believe I can try to use the sa account to escalate privileges here." Meka immediately opened a sql analysis tool after speaking. -
The sa account of sql is the system administrator account. If a hacker uses the injection vulnerability of the site, it is easy to obtain the highest authority of the system. Once the hacker obtains the highest authority, he can use nbsi and other injection tools to create a system account and use port 3389 Log in remotely, this piece of skill is the form of sa injection attack. -
In the past few years, most of the online games at home and abroad were hacked by hackers using sa to inject vulnerabilities. -
"No way, the server forbids the establishment of the account with sa authority. It must be 'God' doing something wrong." Meka spread her hands helplessly.After pondering for a while, Meka continued: "I'll try dbowner and public privileges again to see if I can do it!" (The order of sql privileges is sa, dbowner, public. The main form of hacking in dbowner is Differential backup skills, hackers use the backup function of the database to back up some one-sentence Trojan horses to a specified directory through the database, then upload the web Trojan horse through the c/s Trojan horse, and then use the web Trojan horse to elevate rights and obtain system permissions , Finally, this public may also be used by hackers. Hackers can only list databases with this permission, so in this form hackers will list background accounts and passwords, and then use the background to upload web Trojans to achieve the purpose of privilege escalation. Xiaozhi started from I saw it in the book, although I tried it before, but it was in the third year of junior high school!)-
After a while, Meka wiped the sweat from his forehead, "Damn it. The 7th vulnerability sql privilege escalation failed! It's too strict, and several killing vulnerabilities are invalid for this server!" Meka couldn't help sighing . -
Pace shook his head, "If we continue like this, we will definitely not be able to obtain the authority of the server. After all, there is 'God' in the server. Everyone knows his technology. If we want to obtain authority from him, we must To use an alternative method, he must have known our commonly used intrusion methods, and it must be very simple to find a way to resist!!" -
Everyone agrees with Pace's statement, because it is true. -
"Let me come to the eighth loophole! I'll work around the intrusion," Pace said. -
"No problem, we will cooperate with you together." Meka replied, and the others also explained their opinions one after another. -
Huang Fei looked at the feedback data one by one, and sure enough, as he expected, they would definitely use several common vulnerabilities in the windows server system to invade, but how could Huang Fei not know about the vulnerabilities they could find? There can be more than 20 loopholes, and 8 is not enough for him, but then he was a little surprised when he saw that the other party used a bypass method to elevate his rights. -
I saw that Pace opened a tool called sd, which can analyze and scan all open service ports, connection lines and access paths of the other party's server. After 3 minutes of scanning, Pace only saw that there was only one server available. port, that is port 80. -
Port 80 is open for http (hypertexttransportprotocol), which is the hypertext transfer protocol.We can access the website by adding ":80" to the http address (that is, the "URL"), such as www.net.cn:80, because the default port number for browsing web services is 80, so just enter the URL , no need to input ":80". [From Encyclopedia] And this port is enough for Pace to modify and use. -
Pace first visited the website of the Shanghai stock market normally, and added: 80 to the end of the domain name. After accessing, Pace immediately opened a port tool written by himself, and after entering the server’s ip, the software continued to Accept the packets intercepted from port 80, because it is an open service, so the information of many servers is exposed at a glance. -
What Pace wants to collect is not how to hack into this server, but to seize the account of the administrator, because his software sends normal traffic, the server will not reject it, and then he can monitor port 80, as long as the member logs in, he will immediately You can intercept the member's account password, although the password is encrypted with md5, but x organization has the world's largest rainbow table, and cracking the password md5 is the easiest! (Rainbow table is a huge collection of pre-calculated hash values for various possible letter combinations, not necessarily for the md5 algorithm, but for various algorithms. With it, various passwords can be quickly cracked The more complex the password, the larger the rainbow table is needed. Now the mainstream rainbow table is more than 100g. The mainstream md5 cracking website is www.cmd5.com. If you need to crack the md5 password, you can contact Xiaozhi. Xiaozhi has Member account!)-
But after 5 minutes, Pace saw that the incoming traffic hadn't changed at all, and felt a little impatient.And now on the other side, Huang Fei is typing the code quickly, and a cross-century attack tool is about to be born. -
After another 5 minutes, "Boss, it failed! The 8th exploit failed, there is no other way, the damn 'God' is too powerful!" Gypsy looked at Pace's screen and said. -
Iverson's face was very gloomy. It has been nearly two hours since the confrontation, and the x organization has not made any progress, and it has been deflated again and again. This makes Iverson, who has always been conceited, a little unacceptable. "Now that things have happened, we can only use traffic to attack , Such a server needs at least 50tb of traffic to take it down! The number of broilers we control is only so much, I want to see how this 'God' resists this simplest method!!" Iverson laughed. -
"Boss, do you really want to use ddos? Doesn't this mean that we have failed in the confrontation with 'God' alone in front of everyone?" Meka was a little reluctant. . -
"Meka, there is no other way. Time is running out. For the development of the organization, we must prevent Huaxia's stock market from opening online tomorrow!" Iverson explained. -
When Meka saw that Iverson was so determined, he was too embarrassed to persuade him, so he nodded. -
"Boss, AT&T transferred us 50TB of traffic, are you sure you want to attack their server?" Gypsy asked. -
"50tb is nothing to the world's largest telecommunications company. After all, we have no choice but to use it!!" Iverson said. -
Ten minutes later, just as Iverson was about to call the shots and start the attack, something surprising happened. -
The first is Pace's computer, because he is still connected to the data interception software at this time, a broken phantom first appeared on his computer screen, and then began to flicker, and then four large characters appeared on the screen, "Game Finish!"-
Afterwards, Pace's computer hard disk began to be quickly formatted, and now Huang Fei was constantly sending the formatted decomposition program to that ip. When the tool showed success, Huang Fei pointed the ip to the next one. -
"Oh, oh, oh!!" Pace kept making noises, but he was speechless. He was stunned when he saw his computer hard disk was formatted in an instant. -
Then, in just one minute, all the computer hard drives of all members of the x organization were formatted one after another. . -
Iverson watched this scene and stayed where he was. He didn't take any action, just stared at the screen, watched the error messages popped up by the computer, watched the computer system be deleted, and watched the computer be shut down. Because he knew that this time the shutdown would never start again. -
"Ah!!!!" Meka grabbed the monitor on the table and slammed it on the ground. The 24-inch monitor was cracked instantly, and the screen was completely shattered. -
But this is just one of them. The other members of the x organization can't believe this fact. Some hands are still on the keyboard, but they can't move if they want to. They have already been paralyzed. -
"Ah, ah, ah!!" With tears in his eyes, Meka desperately picked up everything on the table and smashed it against the wall. No one came out to stop it, because everyone thought it was just an illusion, and it couldn't happen like this things. -
Iverson suddenly vomited a mouthful of blood, then covered his heart with his hands, fell to the ground, trembling all over, he had a heart attack. . -
Pace stood up from the chair blankly, looked at the others blankly, and then jumped back to his computer. Then, he yelled, and suddenly grabbed the monitor with both hands, hitting it like Meka on the ground. . -
Although Meka's palm was scratched, he didn't feel it, and he still smashed things desperately. . -
The entire x organization changed from a harmonious atmosphere at the beginning to chaos. 20 minutes later, when the ambulance personnel came here, they were stunned to see the broken computer parts on the ground, but they still carried Iverson onto the stretcher. . -
"It's over." Pace said lightly after watching the ambulance drive away downstairs. -
"It's over, we can't beat him!" Meka also walked to the window and said with a smile.Then he handed Pace a cigarette, and the latter took the cigarette very bluntly and held it in his mouth. -
"I want to go to Huaxia! Are you going?" Meka continued. -
Pace turned his head to look at Meka, and the two exchanged glances, "I don't want to go! Let me know if you have any news, I like a free life." Pace patted Meka on the shoulder. -
When Meka heard it, he suddenly picked up a computer accessory on the ground and threw it out of the window vigorously. Then, there was a clear sound of glass breaking. -
"Haha." "Haha!" Meka and Pais put their shoulders together and laughed out of the window. When the members of the X organization looked at them and laughed, they also laughed. . -
Huaxia Network Information Department's entire network monitoring room. -.
"Team leader, 'God' has exited the server! He left a sentence inside." A technician from Huaxia Network Information Department said to Li Hua. -
Li Hua was still in a daze, but the technician's words woke him up, he smiled and asked in surprise: "What did 'God' say?"-
"The dragon is roaring, one blow kills!" replied the technician. . -
In an ordinary house in Huaxia M City. -
Huang Fei looked at the tool code-named "x" on the screen, and shook his head helplessly, "Organization X, your era is over!" Huang Fei showed a wry smile, then closed the notebook heavily, and threw himself on the bed . . -
【Volume [-]】End-
ps: To be honest, when Xiaozhi wrote these chapters, he really thought that he was about to reach a bottleneck, and it was extremely difficult to write, so he finally wrote it down!The first volume has also been written according to the route I requested, but I will ask, why is it finished, isn’t there still the European Black Alliance and other hacker organizations, ha ha!Those will continue to appear in the following!Xiaozhi affirms to everyone that the book will definitely be even more exciting when it comes to the second volume!I also want to tell everyone a good news, this book will officially be listed on the book recommendation list on the homepage at 17:30 tomorrow, for a week!Everyone's VIP tickets, recommendation tickets, don't forget to drop them on me!Hee hee, here is another group number: 115082178, which is a group of lovely book friends, we look forward to joining you who love Xiao Zhi's book!
-
At 1:10 a.m. China time, the 30 account registrations for "Growth" that were opened today are still sold out. At this time, the number of online users still reaches more than [-], because many people have to go to work. If you play until this late Otherwise, you will be late for work, and the time in "Growth" will be reduced accordingly. Another reason is that "Growth" stipulates that the game time is only three hours a day. -
If you don't get real rewards, you can't continue the game, so people nowadays have developed a habit of working hard during the day, and starting the game after dinner, until the day's game time is exhausted, now except for Huang Fei The fierce battle value in the game has reached more than 300 points, and No.2 is only 158 points. Go live now and you're sure to see lots of friend requests. -
But this night is destined to be busy. After Huaxia Internet was hit by a frenzy of smart viruses before, although it has been relatively stopped, another problem has been exposed on this seemingly calm Internet. In the eyes of Huaxia netizens, everything is normal. It is normal for them to go online to inquire about information and express their experiences. Behind this normality, there is a tough confrontation. -
The headquarters of the X organization in Los Angeles, M country. -
"No, the previous six common vulnerabilities have all been fixed!" Gypsy said. -
"Come on, I'll use this sa to raise my rights." Meka interjected, but this sentence got the approval of everyone. -
"This server is managed by a sql database. I believe I can try to use the sa account to escalate privileges here." Meka immediately opened a sql analysis tool after speaking. -
The sa account of sql is the system administrator account. If a hacker uses the injection vulnerability of the site, it is easy to obtain the highest authority of the system. Once the hacker obtains the highest authority, he can use nbsi and other injection tools to create a system account and use port 3389 Log in remotely, this piece of skill is the form of sa injection attack. -
In the past few years, most of the online games at home and abroad were hacked by hackers using sa to inject vulnerabilities. -
"No way, the server forbids the establishment of the account with sa authority. It must be 'God' doing something wrong." Meka spread her hands helplessly.After pondering for a while, Meka continued: "I'll try dbowner and public privileges again to see if I can do it!" (The order of sql privileges is sa, dbowner, public. The main form of hacking in dbowner is Differential backup skills, hackers use the backup function of the database to back up some one-sentence Trojan horses to a specified directory through the database, then upload the web Trojan horse through the c/s Trojan horse, and then use the web Trojan horse to elevate rights and obtain system permissions , Finally, this public may also be used by hackers. Hackers can only list databases with this permission, so in this form hackers will list background accounts and passwords, and then use the background to upload web Trojans to achieve the purpose of privilege escalation. Xiaozhi started from I saw it in the book, although I tried it before, but it was in the third year of junior high school!)-
After a while, Meka wiped the sweat from his forehead, "Damn it. The 7th vulnerability sql privilege escalation failed! It's too strict, and several killing vulnerabilities are invalid for this server!" Meka couldn't help sighing . -
Pace shook his head, "If we continue like this, we will definitely not be able to obtain the authority of the server. After all, there is 'God' in the server. Everyone knows his technology. If we want to obtain authority from him, we must To use an alternative method, he must have known our commonly used intrusion methods, and it must be very simple to find a way to resist!!" -
Everyone agrees with Pace's statement, because it is true. -
"Let me come to the eighth loophole! I'll work around the intrusion," Pace said. -
"No problem, we will cooperate with you together." Meka replied, and the others also explained their opinions one after another. -
Huang Fei looked at the feedback data one by one, and sure enough, as he expected, they would definitely use several common vulnerabilities in the windows server system to invade, but how could Huang Fei not know about the vulnerabilities they could find? There can be more than 20 loopholes, and 8 is not enough for him, but then he was a little surprised when he saw that the other party used a bypass method to elevate his rights. -
I saw that Pace opened a tool called sd, which can analyze and scan all open service ports, connection lines and access paths of the other party's server. After 3 minutes of scanning, Pace only saw that there was only one server available. port, that is port 80. -
Port 80 is open for http (hypertexttransportprotocol), which is the hypertext transfer protocol.We can access the website by adding ":80" to the http address (that is, the "URL"), such as www.net.cn:80, because the default port number for browsing web services is 80, so just enter the URL , no need to input ":80". [From Encyclopedia] And this port is enough for Pace to modify and use. -
Pace first visited the website of the Shanghai stock market normally, and added: 80 to the end of the domain name. After accessing, Pace immediately opened a port tool written by himself, and after entering the server’s ip, the software continued to Accept the packets intercepted from port 80, because it is an open service, so the information of many servers is exposed at a glance. -
What Pace wants to collect is not how to hack into this server, but to seize the account of the administrator, because his software sends normal traffic, the server will not reject it, and then he can monitor port 80, as long as the member logs in, he will immediately You can intercept the member's account password, although the password is encrypted with md5, but x organization has the world's largest rainbow table, and cracking the password md5 is the easiest! (Rainbow table is a huge collection of pre-calculated hash values for various possible letter combinations, not necessarily for the md5 algorithm, but for various algorithms. With it, various passwords can be quickly cracked The more complex the password, the larger the rainbow table is needed. Now the mainstream rainbow table is more than 100g. The mainstream md5 cracking website is www.cmd5.com. If you need to crack the md5 password, you can contact Xiaozhi. Xiaozhi has Member account!)-
But after 5 minutes, Pace saw that the incoming traffic hadn't changed at all, and felt a little impatient.And now on the other side, Huang Fei is typing the code quickly, and a cross-century attack tool is about to be born. -
After another 5 minutes, "Boss, it failed! The 8th exploit failed, there is no other way, the damn 'God' is too powerful!" Gypsy looked at Pace's screen and said. -
Iverson's face was very gloomy. It has been nearly two hours since the confrontation, and the x organization has not made any progress, and it has been deflated again and again. This makes Iverson, who has always been conceited, a little unacceptable. "Now that things have happened, we can only use traffic to attack , Such a server needs at least 50tb of traffic to take it down! The number of broilers we control is only so much, I want to see how this 'God' resists this simplest method!!" Iverson laughed. -
"Boss, do you really want to use ddos? Doesn't this mean that we have failed in the confrontation with 'God' alone in front of everyone?" Meka was a little reluctant. . -
"Meka, there is no other way. Time is running out. For the development of the organization, we must prevent Huaxia's stock market from opening online tomorrow!" Iverson explained. -
When Meka saw that Iverson was so determined, he was too embarrassed to persuade him, so he nodded. -
"Boss, AT&T transferred us 50TB of traffic, are you sure you want to attack their server?" Gypsy asked. -
"50tb is nothing to the world's largest telecommunications company. After all, we have no choice but to use it!!" Iverson said. -
Ten minutes later, just as Iverson was about to call the shots and start the attack, something surprising happened. -
The first is Pace's computer, because he is still connected to the data interception software at this time, a broken phantom first appeared on his computer screen, and then began to flicker, and then four large characters appeared on the screen, "Game Finish!"-
Afterwards, Pace's computer hard disk began to be quickly formatted, and now Huang Fei was constantly sending the formatted decomposition program to that ip. When the tool showed success, Huang Fei pointed the ip to the next one. -
"Oh, oh, oh!!" Pace kept making noises, but he was speechless. He was stunned when he saw his computer hard disk was formatted in an instant. -
Then, in just one minute, all the computer hard drives of all members of the x organization were formatted one after another. . -
Iverson watched this scene and stayed where he was. He didn't take any action, just stared at the screen, watched the error messages popped up by the computer, watched the computer system be deleted, and watched the computer be shut down. Because he knew that this time the shutdown would never start again. -
"Ah!!!!" Meka grabbed the monitor on the table and slammed it on the ground. The 24-inch monitor was cracked instantly, and the screen was completely shattered. -
But this is just one of them. The other members of the x organization can't believe this fact. Some hands are still on the keyboard, but they can't move if they want to. They have already been paralyzed. -
"Ah, ah, ah!!" With tears in his eyes, Meka desperately picked up everything on the table and smashed it against the wall. No one came out to stop it, because everyone thought it was just an illusion, and it couldn't happen like this things. -
Iverson suddenly vomited a mouthful of blood, then covered his heart with his hands, fell to the ground, trembling all over, he had a heart attack. . -
Pace stood up from the chair blankly, looked at the others blankly, and then jumped back to his computer. Then, he yelled, and suddenly grabbed the monitor with both hands, hitting it like Meka on the ground. . -
Although Meka's palm was scratched, he didn't feel it, and he still smashed things desperately. . -
The entire x organization changed from a harmonious atmosphere at the beginning to chaos. 20 minutes later, when the ambulance personnel came here, they were stunned to see the broken computer parts on the ground, but they still carried Iverson onto the stretcher. . -
"It's over." Pace said lightly after watching the ambulance drive away downstairs. -
"It's over, we can't beat him!" Meka also walked to the window and said with a smile.Then he handed Pace a cigarette, and the latter took the cigarette very bluntly and held it in his mouth. -
"I want to go to Huaxia! Are you going?" Meka continued. -
Pace turned his head to look at Meka, and the two exchanged glances, "I don't want to go! Let me know if you have any news, I like a free life." Pace patted Meka on the shoulder. -
When Meka heard it, he suddenly picked up a computer accessory on the ground and threw it out of the window vigorously. Then, there was a clear sound of glass breaking. -
"Haha." "Haha!" Meka and Pais put their shoulders together and laughed out of the window. When the members of the X organization looked at them and laughed, they also laughed. . -
Huaxia Network Information Department's entire network monitoring room. -.
"Team leader, 'God' has exited the server! He left a sentence inside." A technician from Huaxia Network Information Department said to Li Hua. -
Li Hua was still in a daze, but the technician's words woke him up, he smiled and asked in surprise: "What did 'God' say?"-
"The dragon is roaring, one blow kills!" replied the technician. . -
In an ordinary house in Huaxia M City. -
Huang Fei looked at the tool code-named "x" on the screen, and shook his head helplessly, "Organization X, your era is over!" Huang Fei showed a wry smile, then closed the notebook heavily, and threw himself on the bed . . -
【Volume [-]】End-
ps: To be honest, when Xiaozhi wrote these chapters, he really thought that he was about to reach a bottleneck, and it was extremely difficult to write, so he finally wrote it down!The first volume has also been written according to the route I requested, but I will ask, why is it finished, isn’t there still the European Black Alliance and other hacker organizations, ha ha!Those will continue to appear in the following!Xiaozhi affirms to everyone that the book will definitely be even more exciting when it comes to the second volume!I also want to tell everyone a good news, this book will officially be listed on the book recommendation list on the homepage at 17:30 tomorrow, for a week!Everyone's VIP tickets, recommendation tickets, don't forget to drop them on me!Hee hee, here is another group number: 115082178, which is a group of lovely book friends, we look forward to joining you who love Xiao Zhi's book!
You'll Also Like
-
Douluo Jue Shi: Ghost Rider, Heavenly Sword Burning Soul!
Chapter 93 17 minute ago -
Douluo: Wuhun World Tree, I am an evil soul master
Chapter 95 18 minute ago -
Zombie King: Picking up two babies turned out to be the reincarnation of the Empress
Chapter 104 18 minute ago -
Versatile Mage: One evolution point per second
Chapter 119 18 minute ago -
Fights Break Sphere: Huolin Flying Template, Three Days Appointment!
Chapter 113 18 minute ago -
Zhu Xian: The way of heaven collapses, and I only have one sword!
Chapter 96 18 minute ago -
Douluo: Thundergod descends to the world, Wuhun Lei Yi
Chapter 92 18 minute ago -
Jackie Chan Adventures: I have everything I need now
Chapter 112 18 minute ago -
Douluo: This soul master has a little bit of luck
Chapter 83 18 minute ago -
Goddess Atlas, Starting from the Queen
Chapter 99 18 minute ago