Reborn Super Hacker
Chapter 545 Software Competition
Main text [Black World] Chapter 540 Software Competition "The climax is coming, paralyzed, I've been waiting for this moment!" Qingfeng roared.
The software competition is to compare various Internet system application software developed by various companies or individuals. Here, for example, Microsoft can release a new system program, and individuals or organizational teams can also demonstrate their own developed applications. If anyone is interested, it can be auctioned. The premise of the auction is that there are multiple Internet companies or individuals who are interested in it, and the author of the software is also willing to sell it. All software will start at $100, with no upper limit. All the people who come here to participate in the Black Hat Conference are technical emperors (meaning technical masters)!
"Brother Wen, I remember that a piece of software was leaked last time, right?" Jian Xin asked at this time.
Before Yu Wen could speak, Baihu immediately replied: "Yes, it is a tool for elevating rights, called jsp killer, but it can only run jspx sites based on the wap2.0 standard, which is not very interesting. There are many such sites in foreign countries. rare!"
"Yes, jsp killer. Do you still have that tool? I heard that the author plans to update this tool this year to expand the scope of privilege escalation." Jian Xin likes to ask such tricky questions.
"What are you doing with it now?" Yu Wen spoke at this time.
"Let's analyze it. Brother Wen, do you have any?" Jian Xin seemed to have found hope.
"No!" Yu Wen answered so simply that everyone in the chat room was speechless.
After Iverson announced the start of the second session, people immediately prepared to go up. After all, such things can be grasped as opportunities, and those who want to come here to make a fortune are undoubtedly the best opportunities.
Soon, the first person came on the stage. He was a program enthusiast from Hungary, and he was considered a relatively well-known hacker. He was invited because he was a moderator on the Xuanwu Forum.
As soon as he came to the stage, he immediately took out a flash drive with him. There was a computer on the stage. He inserted the flash drive into the computer. At this time, a large screen appeared on the stage. Everything operated on the computer on the stage would be displayed through the screen. Known by everyone, this also allows everyone to understand the specific functions of the software.
I saw the Hungarian man opened a software named "cooker" in the flash drive.
"This is a media processing software, written based on the functions of VideoStudio, it incorporates all the functions of the above, and also adds video subtitle processing, video modification, video adding special effects, and the number of frames played can be changed at any time, more importantly What's more, it also has the function of playing while editing, and automatically backs up the video. No matter how old the machine is, even the system of Windows95 version, the memory of 128m can perfectly set the actual frame number to play high-definition video. Call With the memory buffering technology, you can combine multiple images to make a video, and you can also add your own various elements to the video. The elements support (flv, gif, jpg, mp4, rm, mtk), and the subsequent version will be upgraded! "The Hungarian man demonstrated the functions of the software while running it.
It is true that this "cooker" is very powerful, with many strengths in one, and it is indeed much more powerful than any software on the Internet today. If Microsoft buys the copyright, it may be able to integrate this into their windows system, so that As a result, it is enough to kill all the media players in China in seconds, but it is hard to say, if it is launched, it is a bit difficult to prevent its functions from being "copycat" by those media players in China!
After the introduction, the next step is to count the potential buyers. There are several buttons on the handle of each seat. Click a green one to participate in the bidding for this software. After a minute of discussion, there are finally more than 1 The quota is intended to be purchased, so this software is included in the auction list.
"No, this seems not as powerful as the compressed pixel ex you wrote." Avril whispered to Huang Fei.
Huang Fei smiled, isn't Avril Lavigne talking nonsense?The compressed pixel ex written by him can be said to be the best multimedia editing software ten years later. If you really compare the two, there is no comparison at all.For example, Alto insists on Audi as its competitor.
"Avril, keep watching and don't talk, others are staring at us." Huang Fei said lightly, his eyes still fixed on the stage.
In the end, the software of the first Hungarian on stage successfully entered the auction list and will be auctioned at the end of the second session.
And because the software released in the second link is the first release, and the copyright belongs to the author, no disclosure is absolutely allowed without the author's consent. That's it, everyone only knows that this software is called "cooker" , I don’t know anything else, but the power of yy is terrifying, and someone immediately imagined the specific appearance of the software, but the two cannot be mixed together.
The second one was the notorious nday organization in the industry. This time they brought two hacking tools named "godlol" and "yolol".
The four nday members took to the stage under the leadership of Alder. Although they were notorious, they were all technical madmen who had nowhere to go. Of course, the things they released should not be underestimated.
"Based on two privilege escalation tools written based on Windows general system vulnerabilities, godlol can ignore the restrictions of SQL passwords to directly obtain the authority of the server database sa, and can directly implant codes. According to our statistics, there are 80 advanced servers around the world that have this vulnerability. " Alder mainly made an introduction, and the demonstration work was handed over to other people. I saw that the interface of the tool was very simple, just a small box and a key value of go. The operator entered a country m in the small box. Click on the website of a famous social networking site, and then a system command prompt pops up. A large number of codes are entered, which are omitted because the speed is too fast. When the code stops moving, it means that the analysis is complete. All the sub-ips bound to that social networking site have been scanned. I found an ip at random, narrowed it down again, entered the ip in the small box, and clicked Go. This greatly narrowed the range. After a while, a prompt window popped up. It shows that the automatic privilege escalation has been successful, and the account password of sa is instantly cracked.
Representatives of some Internet companies on the field panicked, especially the vice president of Microsoft, because most of SQL is installed on Windows/2000 or above server systems, which means that 80 servers will become puppets due to their vulnerability. Thinking about it this way, it’s not as simple as a tool for elevating rights. In short, nday organizes this tool and Microsoft must obtain it, because there is no way, they have no choice, and freedom of speech is allowed at the conference, so even nday The methods were despicable, but no one came out to say anything.
But what worries the president of Microsoft the most is that if an Internet company also wants to buy this rights-enhancing tool and raises the price during the auction, they will have to buy it no matter how high it is. Kerry very much does not want such a phenomenon to happen.
Because there are two pieces of software, after the release demonstration of the first tool is completed, it is time to solicit potential buyers to see if they can meet the requirements and enter the final auction. Microsoft’s deadly rival Google was the first to agree, followed by Apple. , and then Adobe, more and more people are interested in buying, and the number of votes suddenly surpassed the previous multimedia application software. It can be seen that hacking tools and 80 servers are common, which is very attractive. The final results are calculated. Two-thirds of the Internet service companies present were interested in buying it. Microsoft's vice president Paulik originally wanted to try it with a fluke. Every time they come, they are doomed to bleed heavily. Who told Microsoft to have a 95% global market share of PC systems? This amount of money is nothing.
The result can be imagined, Microsoft has to face many competitors, if it can't come up with a reasonable price, there must be no way to get this privilege escalation tool.
The tool "godlol" has successfully entered the final auction, and so many big companies are interested in buying it, which makes the nday organization very excited.
Because there is still a tool, the nday organization continues to stay on the field, Alder has the joy of the last success, passion also came, and the voice of speaking has changed.
"Let's demonstrate the function of 'yolol' for everyone. First, let me introduce that 'yolol' is a virus program written by forjava!" After Alder finished speaking, there was booing all over the field, as if everyone was saying, ' Sure enough, nday sold viruses again this year! Alder was already familiar with it, and he continued to introduce without panic at all: "As we all know, for (based on) java environment libraries generally have the advantage of cross-platform operation, so our 'yolol' virus is the same, Cross-platform is its biggest advantage. Any computer infected with a virus will immediately feed back the hardware information of the owner and scan the data of the sensitive disk area of the computer. The function is far more than one, and this one can also be used as a Trojan horse. It can remotely operate functions such as monitoring and privilege escalation, and the infection is extremely simple. See the demo for details. Currently, all antivirus software is free from killing. This is a tool that our studio spent three months developing." After Alder finished speaking, other Several members of the group are ready to demonstrate again.
When it comes to viruses, the most sensitive ones are those antivirus software vendors, and they are all waiting with their heads held high.
The software competition is to compare various Internet system application software developed by various companies or individuals. Here, for example, Microsoft can release a new system program, and individuals or organizational teams can also demonstrate their own developed applications. If anyone is interested, it can be auctioned. The premise of the auction is that there are multiple Internet companies or individuals who are interested in it, and the author of the software is also willing to sell it. All software will start at $100, with no upper limit. All the people who come here to participate in the Black Hat Conference are technical emperors (meaning technical masters)!
"Brother Wen, I remember that a piece of software was leaked last time, right?" Jian Xin asked at this time.
Before Yu Wen could speak, Baihu immediately replied: "Yes, it is a tool for elevating rights, called jsp killer, but it can only run jspx sites based on the wap2.0 standard, which is not very interesting. There are many such sites in foreign countries. rare!"
"Yes, jsp killer. Do you still have that tool? I heard that the author plans to update this tool this year to expand the scope of privilege escalation." Jian Xin likes to ask such tricky questions.
"What are you doing with it now?" Yu Wen spoke at this time.
"Let's analyze it. Brother Wen, do you have any?" Jian Xin seemed to have found hope.
"No!" Yu Wen answered so simply that everyone in the chat room was speechless.
After Iverson announced the start of the second session, people immediately prepared to go up. After all, such things can be grasped as opportunities, and those who want to come here to make a fortune are undoubtedly the best opportunities.
Soon, the first person came on the stage. He was a program enthusiast from Hungary, and he was considered a relatively well-known hacker. He was invited because he was a moderator on the Xuanwu Forum.
As soon as he came to the stage, he immediately took out a flash drive with him. There was a computer on the stage. He inserted the flash drive into the computer. At this time, a large screen appeared on the stage. Everything operated on the computer on the stage would be displayed through the screen. Known by everyone, this also allows everyone to understand the specific functions of the software.
I saw the Hungarian man opened a software named "cooker" in the flash drive.
"This is a media processing software, written based on the functions of VideoStudio, it incorporates all the functions of the above, and also adds video subtitle processing, video modification, video adding special effects, and the number of frames played can be changed at any time, more importantly What's more, it also has the function of playing while editing, and automatically backs up the video. No matter how old the machine is, even the system of Windows95 version, the memory of 128m can perfectly set the actual frame number to play high-definition video. Call With the memory buffering technology, you can combine multiple images to make a video, and you can also add your own various elements to the video. The elements support (flv, gif, jpg, mp4, rm, mtk), and the subsequent version will be upgraded! "The Hungarian man demonstrated the functions of the software while running it.
It is true that this "cooker" is very powerful, with many strengths in one, and it is indeed much more powerful than any software on the Internet today. If Microsoft buys the copyright, it may be able to integrate this into their windows system, so that As a result, it is enough to kill all the media players in China in seconds, but it is hard to say, if it is launched, it is a bit difficult to prevent its functions from being "copycat" by those media players in China!
After the introduction, the next step is to count the potential buyers. There are several buttons on the handle of each seat. Click a green one to participate in the bidding for this software. After a minute of discussion, there are finally more than 1 The quota is intended to be purchased, so this software is included in the auction list.
"No, this seems not as powerful as the compressed pixel ex you wrote." Avril whispered to Huang Fei.
Huang Fei smiled, isn't Avril Lavigne talking nonsense?The compressed pixel ex written by him can be said to be the best multimedia editing software ten years later. If you really compare the two, there is no comparison at all.For example, Alto insists on Audi as its competitor.
"Avril, keep watching and don't talk, others are staring at us." Huang Fei said lightly, his eyes still fixed on the stage.
In the end, the software of the first Hungarian on stage successfully entered the auction list and will be auctioned at the end of the second session.
And because the software released in the second link is the first release, and the copyright belongs to the author, no disclosure is absolutely allowed without the author's consent. That's it, everyone only knows that this software is called "cooker" , I don’t know anything else, but the power of yy is terrifying, and someone immediately imagined the specific appearance of the software, but the two cannot be mixed together.
The second one was the notorious nday organization in the industry. This time they brought two hacking tools named "godlol" and "yolol".
The four nday members took to the stage under the leadership of Alder. Although they were notorious, they were all technical madmen who had nowhere to go. Of course, the things they released should not be underestimated.
"Based on two privilege escalation tools written based on Windows general system vulnerabilities, godlol can ignore the restrictions of SQL passwords to directly obtain the authority of the server database sa, and can directly implant codes. According to our statistics, there are 80 advanced servers around the world that have this vulnerability. " Alder mainly made an introduction, and the demonstration work was handed over to other people. I saw that the interface of the tool was very simple, just a small box and a key value of go. The operator entered a country m in the small box. Click on the website of a famous social networking site, and then a system command prompt pops up. A large number of codes are entered, which are omitted because the speed is too fast. When the code stops moving, it means that the analysis is complete. All the sub-ips bound to that social networking site have been scanned. I found an ip at random, narrowed it down again, entered the ip in the small box, and clicked Go. This greatly narrowed the range. After a while, a prompt window popped up. It shows that the automatic privilege escalation has been successful, and the account password of sa is instantly cracked.
Representatives of some Internet companies on the field panicked, especially the vice president of Microsoft, because most of SQL is installed on Windows/2000 or above server systems, which means that 80 servers will become puppets due to their vulnerability. Thinking about it this way, it’s not as simple as a tool for elevating rights. In short, nday organizes this tool and Microsoft must obtain it, because there is no way, they have no choice, and freedom of speech is allowed at the conference, so even nday The methods were despicable, but no one came out to say anything.
But what worries the president of Microsoft the most is that if an Internet company also wants to buy this rights-enhancing tool and raises the price during the auction, they will have to buy it no matter how high it is. Kerry very much does not want such a phenomenon to happen.
Because there are two pieces of software, after the release demonstration of the first tool is completed, it is time to solicit potential buyers to see if they can meet the requirements and enter the final auction. Microsoft’s deadly rival Google was the first to agree, followed by Apple. , and then Adobe, more and more people are interested in buying, and the number of votes suddenly surpassed the previous multimedia application software. It can be seen that hacking tools and 80 servers are common, which is very attractive. The final results are calculated. Two-thirds of the Internet service companies present were interested in buying it. Microsoft's vice president Paulik originally wanted to try it with a fluke. Every time they come, they are doomed to bleed heavily. Who told Microsoft to have a 95% global market share of PC systems? This amount of money is nothing.
The result can be imagined, Microsoft has to face many competitors, if it can't come up with a reasonable price, there must be no way to get this privilege escalation tool.
The tool "godlol" has successfully entered the final auction, and so many big companies are interested in buying it, which makes the nday organization very excited.
Because there is still a tool, the nday organization continues to stay on the field, Alder has the joy of the last success, passion also came, and the voice of speaking has changed.
"Let's demonstrate the function of 'yolol' for everyone. First, let me introduce that 'yolol' is a virus program written by forjava!" After Alder finished speaking, there was booing all over the field, as if everyone was saying, ' Sure enough, nday sold viruses again this year! Alder was already familiar with it, and he continued to introduce without panic at all: "As we all know, for (based on) java environment libraries generally have the advantage of cross-platform operation, so our 'yolol' virus is the same, Cross-platform is its biggest advantage. Any computer infected with a virus will immediately feed back the hardware information of the owner and scan the data of the sensitive disk area of the computer. The function is far more than one, and this one can also be used as a Trojan horse. It can remotely operate functions such as monitoring and privilege escalation, and the infection is extremely simple. See the demo for details. Currently, all antivirus software is free from killing. This is a tool that our studio spent three months developing." After Alder finished speaking, other Several members of the group are ready to demonstrate again.
When it comes to viruses, the most sensitive ones are those antivirus software vendors, and they are all waiting with their heads held high.
You'll Also Like
-
Panlong: Use the lower main gods to defeat the master
Chapter 40 16 hours ago -
Divine Seal: Reborn Taotie, adopted by the Devil of Love
Chapter 119 16 hours ago -
Versatile Mage: One Spirit a Day! The Strongest Forbidden Spell
Chapter 117 16 hours ago -
Covering the sky: Huo Lin flying template, breaking the life forbidden zone
Chapter 90 16 hours ago -
People in the chat group became the golden finger of the Emperor of Heaven
Chapter 67 16 hours ago -
Simultaneous travel: The group is about to be wiped out
Chapter 97 16 hours ago -
After rebirth, they all want to monopolize me
Chapter 144 16 hours ago -
The God of Heavens
Chapter 139 16 hours ago -
Douluo: The little girl I raised became Qian Renxue
Chapter 94 16 hours ago -
Humans in Type-Moon, Path of the Heroic Spirit
Chapter 89 16 hours ago