The system takes me for surgery
Chapter 492: The Maker of the System
Ouyang Pingan said: "That's almost what it means, but this local area network is a very large local area network. I guess, it is probably smaller than the current Internet, and it communicates with the Internet in one direction."
Liang Yi asked without shame: "What does one-way circulation mean?"
"One-way circulation means that things on the Internet can come to this AND LAN after being strictly filtered, and the information on the LAN is protected by various security walls, so it is difficult for outsiders to enter and obtain the information inside."
Liang Yi used analogy to understand, saying: "This Tesla valve is a bit like it. The Tesla valve is also perfectly designed to achieve one-way flow of fluid, and when it flows in the opposite direction, there will be very large resistance."
"Brother Yi, that's a big deal, that's what it means by analogy."
"Isn't there no way to get in like this?"
Ouyang Pingan frowned and said, "It's very difficult to get in. The protection system is so good that there are basically no loopholes."
"Does it mean that the maker of this system is very powerful?"
"Yes, it should be a world-class security technology expert to make such an impenetrable security wall."
It can make Ouyang Pingan admire so much, which shows how terrifying the computer technology of the creator of this system is, Liang Yi sighed inwardly.
Liang Yi asked: "You often talk about hackers invading, how did the hackers intrude?"
Ouyang Pingan said: "In fact, hacking is the same as your surgery, and there are similar steps."
Liang Yi said: "Talk about it... I'm trying to understand it with surgical thinking..."
Ouyang Pingan said: "The first step is to determine the target of the attack."
Liang Yi thinks: Surgical tumor resection is the same as tumor resection, and the location of the tumor is determined.
"Yes, the second step is to collect relevant information about the attacked object. Usually, after the hacker obtains the type of the target machine and the network it is in, he needs to obtain further relevant information, such as the IP address of the target machine, the type and version of the operating system, The email address of the system administrator, etc., can be analyzed based on this information, and the possible vulnerabilities in the system of the attacked party can be obtained.”
Liang Yi thought: Judge the size and nature of the tumor.
"The third step is to scan with appropriate tools. Collect or write appropriate tools, and evaluate the tools based on the analysis of the operating system to determine which vulnerabilities and areas are not covered. Then, in the shortest possible time The target is scanned within the system. After the scan is completed, the obtained data can be analyzed to find security holes.”
Liang Yixiang: Design the surgical approach and specific treatment plan.
"The fourth step is to establish a simulated environment and conduct a simulated attack. Based on the information obtained before, establish a simulated environment, and then conduct a series of attacks on the simulated target machine to test the possible reaction of the other party. By checking the logs of the attacked party, you can understand the attack The "traces" left by the process. This allows the attacker to know which files need to be deleted to destroy evidence of their intrusion."
Liang Yi thought: It is equivalent to simulating surgery in the system, simulating various possible problems during the operation.
"Implement an attack based on known loopholes to implement an attack. Through the guessing program, the intercepted user account and password can be deciphered; using the deciphering program, the intercepted system password file can be deciphered, and the weak links and Security holes can implement electronic lures, such as placing Trojan horses, etc. Hackers may modify web pages for pranks, or destroy system programs, or put viruses to paralyze the system, or steal political, military, and commercial secrets, or carry out email harassment, Or transfer funds accounts, steal money, etc.”
Liang Yi said: "This is the operation. Whether you are a master or not depends on this step."
"Yes, this is a manifestation of the technical differences between expert hackers and ordinary hackers. Finally, clear the traces, create a backdoor, and create additional accounts to facilitate the next intrusion into the system."
Hearing this, Liang Yi smiled: "Haha, it's too shameless. After entering, you still leave a back door for yourself, so that you can visit the door next time?"
"Hackers have such bad tastes."
"You have it too?" Liang Yi asked maliciously.
"Occasionally..." Ouyang Ping'an said noncommittally.
Liang Yi straightened his expression and asked seriously: "Is it possible for the local area network of Ping An to go inside and obtain their data?"
"Currently, I can only see their interface, and I can't startle them. I can only try my best."
It was the first time he saw Ouyang Pingan so unconfident, and said, "Okay, then when you make progress, tell me."
"Okay, I'll let you know if there's any progress."
"It's time to eat. As soon as you two touch the computer, it's as if you don't need to eat. You don't know you're hungry." Ping'an's mother shouted.
The two of them hurried out.
Shi Li wrinkled her nose at them, then pointed at them and said, "Auntie has already yelled, and you have yelled several times, but you are silent, do you want to die?"
Liang Yi and Ouyang Pingan glanced at each other and said, "Is there? We didn't hear it just now,"
"No one of you men is reliable. When you touch the computer, it's like seeing a beautiful woman. You can't move your eyes."
"Haha..." Liang Yi laughed.
"What are you laughing at?" Shi Li asked.
"No... I just feel that your tone of voice is similar to that of Ouyang Ping'an's mother..." Liang Yi said.
Shi Li's face turned red immediately, she lowered her head and said, "Listen to your nonsense..."
So Liang Yi had a seafood feast at Ouyang Ping'an's house before returning to his residence contentedly.
Shi Li stayed at Ouyang Ping'an's house to chat with his mother after eating,
While listening to them talking, Ouyang Ping'an was restless all the time. He could see what was on his mind and said, "Do you really want to touch your computer?"
Ouyang Pingan smiled and asked, "How do you see it?"
"Blind people can see the look of being out of their minds, okay, what's on this computer that's so fun?"
Ouyang Pingan said: "When I encountered a problem, I really wanted to solve it. This feeling is like scratching, but this tickle grows on the back and is not easy to scratch, but I really want to scratch it."
"Go ahead and tickle it. Watching us talk, you are also absent-minded."
"Obey! I'll go right away." After speaking, Ouyang Ping'an disappeared in a flash, typing on the keyboard in his room.
Ping An's mother said guiltily, "Xiao Li, Ping An is like this, don't be angry."
Shi Li shook her head and said: "No, Dr. Liang must have something to tell him, that's why he did this, I said that on purpose just now.
Liang Yi asked without shame: "What does one-way circulation mean?"
"One-way circulation means that things on the Internet can come to this AND LAN after being strictly filtered, and the information on the LAN is protected by various security walls, so it is difficult for outsiders to enter and obtain the information inside."
Liang Yi used analogy to understand, saying: "This Tesla valve is a bit like it. The Tesla valve is also perfectly designed to achieve one-way flow of fluid, and when it flows in the opposite direction, there will be very large resistance."
"Brother Yi, that's a big deal, that's what it means by analogy."
"Isn't there no way to get in like this?"
Ouyang Pingan frowned and said, "It's very difficult to get in. The protection system is so good that there are basically no loopholes."
"Does it mean that the maker of this system is very powerful?"
"Yes, it should be a world-class security technology expert to make such an impenetrable security wall."
It can make Ouyang Pingan admire so much, which shows how terrifying the computer technology of the creator of this system is, Liang Yi sighed inwardly.
Liang Yi asked: "You often talk about hackers invading, how did the hackers intrude?"
Ouyang Pingan said: "In fact, hacking is the same as your surgery, and there are similar steps."
Liang Yi said: "Talk about it... I'm trying to understand it with surgical thinking..."
Ouyang Pingan said: "The first step is to determine the target of the attack."
Liang Yi thinks: Surgical tumor resection is the same as tumor resection, and the location of the tumor is determined.
"Yes, the second step is to collect relevant information about the attacked object. Usually, after the hacker obtains the type of the target machine and the network it is in, he needs to obtain further relevant information, such as the IP address of the target machine, the type and version of the operating system, The email address of the system administrator, etc., can be analyzed based on this information, and the possible vulnerabilities in the system of the attacked party can be obtained.”
Liang Yi thought: Judge the size and nature of the tumor.
"The third step is to scan with appropriate tools. Collect or write appropriate tools, and evaluate the tools based on the analysis of the operating system to determine which vulnerabilities and areas are not covered. Then, in the shortest possible time The target is scanned within the system. After the scan is completed, the obtained data can be analyzed to find security holes.”
Liang Yixiang: Design the surgical approach and specific treatment plan.
"The fourth step is to establish a simulated environment and conduct a simulated attack. Based on the information obtained before, establish a simulated environment, and then conduct a series of attacks on the simulated target machine to test the possible reaction of the other party. By checking the logs of the attacked party, you can understand the attack The "traces" left by the process. This allows the attacker to know which files need to be deleted to destroy evidence of their intrusion."
Liang Yi thought: It is equivalent to simulating surgery in the system, simulating various possible problems during the operation.
"Implement an attack based on known loopholes to implement an attack. Through the guessing program, the intercepted user account and password can be deciphered; using the deciphering program, the intercepted system password file can be deciphered, and the weak links and Security holes can implement electronic lures, such as placing Trojan horses, etc. Hackers may modify web pages for pranks, or destroy system programs, or put viruses to paralyze the system, or steal political, military, and commercial secrets, or carry out email harassment, Or transfer funds accounts, steal money, etc.”
Liang Yi said: "This is the operation. Whether you are a master or not depends on this step."
"Yes, this is a manifestation of the technical differences between expert hackers and ordinary hackers. Finally, clear the traces, create a backdoor, and create additional accounts to facilitate the next intrusion into the system."
Hearing this, Liang Yi smiled: "Haha, it's too shameless. After entering, you still leave a back door for yourself, so that you can visit the door next time?"
"Hackers have such bad tastes."
"You have it too?" Liang Yi asked maliciously.
"Occasionally..." Ouyang Ping'an said noncommittally.
Liang Yi straightened his expression and asked seriously: "Is it possible for the local area network of Ping An to go inside and obtain their data?"
"Currently, I can only see their interface, and I can't startle them. I can only try my best."
It was the first time he saw Ouyang Pingan so unconfident, and said, "Okay, then when you make progress, tell me."
"Okay, I'll let you know if there's any progress."
"It's time to eat. As soon as you two touch the computer, it's as if you don't need to eat. You don't know you're hungry." Ping'an's mother shouted.
The two of them hurried out.
Shi Li wrinkled her nose at them, then pointed at them and said, "Auntie has already yelled, and you have yelled several times, but you are silent, do you want to die?"
Liang Yi and Ouyang Pingan glanced at each other and said, "Is there? We didn't hear it just now,"
"No one of you men is reliable. When you touch the computer, it's like seeing a beautiful woman. You can't move your eyes."
"Haha..." Liang Yi laughed.
"What are you laughing at?" Shi Li asked.
"No... I just feel that your tone of voice is similar to that of Ouyang Ping'an's mother..." Liang Yi said.
Shi Li's face turned red immediately, she lowered her head and said, "Listen to your nonsense..."
So Liang Yi had a seafood feast at Ouyang Ping'an's house before returning to his residence contentedly.
Shi Li stayed at Ouyang Ping'an's house to chat with his mother after eating,
While listening to them talking, Ouyang Ping'an was restless all the time. He could see what was on his mind and said, "Do you really want to touch your computer?"
Ouyang Pingan smiled and asked, "How do you see it?"
"Blind people can see the look of being out of their minds, okay, what's on this computer that's so fun?"
Ouyang Pingan said: "When I encountered a problem, I really wanted to solve it. This feeling is like scratching, but this tickle grows on the back and is not easy to scratch, but I really want to scratch it."
"Go ahead and tickle it. Watching us talk, you are also absent-minded."
"Obey! I'll go right away." After speaking, Ouyang Ping'an disappeared in a flash, typing on the keyboard in his room.
Ping An's mother said guiltily, "Xiao Li, Ping An is like this, don't be angry."
Shi Li shook her head and said: "No, Dr. Liang must have something to tell him, that's why he did this, I said that on purpose just now.
You'll Also Like
-
Star Iron: I, who forged my own armor by hand, ascended to the cycle of reincarnation.
Chapter 127 22 minute ago -
Bleach: The Strongest Kenpachi Starting from Signing In
Chapter 480 22 minute ago -
The victory of a religion in another world is so easy?
Chapter 158 22 minute ago -
American comic book series: The beginning of fusion with Homelander
Chapter 589 22 minute ago -
Fan-made short videos have appeared in Honkai Impact 3rd, and characters have been created and sent
Chapter 261 22 minute ago -
You think you're worthy of saving the world?
Chapter 290 22 minute ago -
Wizard: I'm leveling up by AFK in another world
Chapter 86 22 minute ago -
94: From Technological Warfare to Space Empire
Chapter 96 22 minute ago -
My ex-girlfriend's best friends are getting restless right after the breakup.
Chapter 96 22 minute ago -
Faerun: The arcane mage is still too imprisoned.
Chapter 91 22 minute ago