Need for pretty police flower

257. Breaching the browser

257. Breaching the browser

(Disclaimer: The plot in this section is purely fabricated, and may not be true in reality. Please do not take the relevant parties seriously.) When all the voices finally calmed down a little, the host finally came to his senses, and she bit her head hard. He licked his lips, sighed and smiled: "I can't think of it, I really can't think of it! Not only I can't think of it, I'm afraid everyone here can't think of it too! It can be said that a junior sister from the special police team in the freshman team can win the hacker contest programming prize." No.1, this should be said to have created a miracle in the history of our Anda Hacking Competition!"

The well-responsive host said passionately: "This is a miracle that makes us Mr. An proud and proud! It is a miracle that makes us expect more. I hope that such a miracle will happen again in the next game." , let us wait and see, and eagerly wait for the next miracle to happen as soon as possible! The next thing will be the second competition - conquering the computer browser!"

<e和safari,平台是在安装安全更新的windowsp操作系统下运行,safari浏览器将在安装苹果macosx10.6雪豹操作系统下运作。比赛时间为10分钟,在规定时间内,攻破浏览器多者为胜出者,如果攻破浏览器个数相同,则按照时间由少到多的顺序排列名次。

The operation of this competition is very simple. No matter how many players participate, everyone will fight on their own, using various methods and tricks to attack those browsers until they are broken.

The competition started, and the contestants stared at their computer screens. After choosing a browser, they went all out to attack.Encore thinks that the competition does not prohibit the use of third-party plug-ins such as adobe flash. These third-party plug-ins have always been security weaknesses in the operating system. It is easier to break through the protection of browsers through these weaknesses.

After making up his mind, Encore started to use the Adobe Flash plug-in. After going through a series of steps, it bypassed the ASLR protection, and then bypassed the DEP, and successfully broke through the IE8 browser.An hour and a half later, Niels used a similar strategy to bypass these protection strategies and break through the Firefox 3.6 browser.

Looking at the time has passed more than seven minutes, Encore aimed at ASLR by loading the position of the key storage area at any time, making it difficult for hackers to predict whether their attack code can run. A .e browser in storage.When she was about to go on to attack the safari browser, the time was up.

The results of this competition were announced soon. A total of 31 players broke through one browser within the specified time, twelve players broke through two browsers, and three players broke through three browsers.Among the three players who broke through the three browsers, besides Bo Haoyang from the 09 computer department and Sun Yaqi from the 09 class, the other one was Encore.According to the rules of the competition, Sun Yaqi won No.1, Bo Haoyang won No.2, and Anke won No.3.

Even a layman can see that the phones selected above are some of the most popular in the market, and represent the strongest defense systems in the phone, and it is not easy to break any of them.

Anke sat in front of the computer with a very calm heart. The good results in front made her full of confidence and made her calmer.She moved her wrists a few times, closed her eyes slightly and rested for a while, then her brain started to run at high speed, thinking about how to break through the system.When the host announced Kashgar, Encore already had a clear idea of ​​attack in his mind.

The two competitions of breaking the browser and the mobile phone system are not as hot and beautiful as ordinary competitions, and there are even some silences. The judges only monitor each player's competition during the whole competition, and there is no general competition process in the middle The comments and so on, only when the results of the competition are announced, there will be applause and applause.

In this competition of hacking mobile phones, after the judges checked whether each contestant had hacked the mobile phones they were attacking, the results came out soon.The host walked to the stage again, smiled at the judges and contestants, and said, "Today's hacker competition, we are very honored to have invited many representatives of browsers and mobile phone manufacturers who were attacked just now, and we are very grateful to them for coming." Come to our game site!"

After a burst of applause, the host said: "The final result of the hacker contest is about to come out. Before the final result comes out, let's invite one of the judges of the hacker contest, a senior technical consultant from Apple, to come out." Mr. McKenna speaks a few words for us on behalf of the judges and the IT community!"

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like