Riding the wind of rebirth

Chapter 1859: Targeting Four-Leaf Clover

Chapter 1859: Targeting Four-Leaf Clover

After the incident, Hu Tianyu and his team discovered the hacker's viciousness. He used JDK NOTEPAD to make the programmers of Clover Group develop "good programming habits" that Zhou Zhi had repeatedly requested but had failed to make them develop, making the program extremely standardized, especially the comment part.

Originally, during the program compilation process, this type of information should not be brought into the executable code, but JDK NOTEPAD does not directly prohibit it. Instead, it gives programmers an option. You can choose "compile with comments" and "compile without comments".

Even so, it is generally necessary to use a disassembly tool to restore the information. However, this is not the case with JAVA. It has many "event classes" embedded in web pages. In order to facilitate developers to modify and study these event classes, they can be called out and read using the browser's built-in "learning toolkit" and "developer tools".

Many of these things are actually small tools written by developers using JDK NOTEAPD for their own convenience. They often forget to close comments during development, so this information becomes part of the hidden information of the web page and appears on the web page in plain text. Anyone only needs to right-click on the web page, select Developer Tools, and then read this information openly in a constant called creator.

The most annoying thing is that the structure of this information is exactly the same as the structure of the creator information part in any other program developed with the assistance of JDK NOTEPAD.

Among these information, there are often phone and email information left by programmers.

Almost all developers at Clover use QQ email, and this QQ user is also their user alias for logging into the Clover system.

In order to facilitate the programmers of Clover Group to work in other places, the group has a remote login mechanism. So the hacker collected a bunch of user numbers of the programmers of Clover Group, constructed an extra-long user number, and while entering the user, he also took advantage of the overflow vulnerability to change the password verification failure return to a successful return, and then used the no-operation sled to find the return address, sent the success information back to the return address, and successfully hacked into the internal system of Clover.

After that, the hacker used the same trick to get everything he wanted. After becoming familiar with the development mechanism of the Clover system, he continued to exploit this vulnerability to try to obtain more advanced system permissions. Eventually, he sent the same highest-level data structure as Zhou Zhi's to the database, adding an advanced user to the system.

After learning about the hacker's operations, Zhou Zhi was completely worried.

This type of hacker is very scary because ordinary hackers are not so targeted. They will only exploit operating system vulnerabilities and cause trouble at the operating system level, but will not hack into the application system level running the computer.

Because application systems are installed independently and have nothing in common, and most machines are different, hackers must of course target the operating system as their primary target in order to achieve the greatest attack effect.

Once the crack is successful, all similar models and operating systems on the network can be cracked using this method. Compared with targeted cracking of a certain application system, the destructiveness and influence are obviously greater.

The fact that this hacker targeted the Clover Group's system so specifically shows that he is no longer an ordinary hacker, but the kind that specifically targets the Clover Group.

After listening to Zhou Zhi's inference, Hu Tianyu was silent for a moment, and then said: "Elbow, actually... we found that this hacker doesn't seem to be interested in the Clover Group, but... is more interested in you?"

"Bighead fish!" Zhou Zhi was really angry: "This is urgent!"

"Really, really!" Hu Tianyu was terrified. "We studied the hacker's activity track and found that... he was only interested in the project you hosted. He also visited your information several times. He also visited some of your paper links in the system. Although he deleted these access records, Nuwa left all the information here."

Zhou Zhi exhaled: "Did he visit other places?" "Uh... it seems not. Also, his activity time is usually not long after you go online. Fox even joked that this person might be your fan..."

"Stop talking nonsense! Now you guys wait for me to get back. It will probably take another two hours to log into the system." Zhou Zhi said immediately: "Today is the weekend, so this week's disaster recovery data will not be imported for the time being. There are still five days until next weekend. During these five days, we should not alert the enemy and try to find out the identity of this person first!"

"Yes!"

After hanging up the phone, Zhou Zhi realized that his ears were burning from the call. He said to the worried people beside him, "Something happened at Shudu School. I have to go back to deal with it first. Grandpa Chi Ri, please take them home later. I have to leave now!"

"Then you ride my White Phoenix!" Old Chi Ri said without further ado: "Get off and lead me when you cross the suspension bridge. Don't be in a hurry for a short while."

"Got it." Zhou Zhi climbed onto the first horse, kicked the horse's belly, and galloped back the way he came.

"Elbow is a graduate student at Shu University. What could be so urgent at the school? Just now it sounded like there was a problem with the computer system?"

"Shu University's computer skills are pretty good, especially in text system processing, which is world-class. Elbow is a liberal arts student, and his computer skills are so high..." Liang Guangping and Liu Hongtao are both information technology enthusiasts, and their skills are quite good, otherwise they wouldn't be shouldering the heavy responsibility of maintaining the scientific research base's information system. Thinking of Zhou Zhi's technical skills that he had demonstrated in front of them, Liang Guangping suddenly realized: "Being proficient in both liberal arts and science, doesn't that just fit in with Shu University's strengths in information technology?! Elbow might have participated in some computer engineering projects at their school."

"I hope it's not a big deal. Why don't we go back? We've had enough fun, and I'd be worried if I don't go back with them to check on them." Li Lu said.

"Not really." Old Chi Ri sat down cross-legged. "Elbow specially dug stones to make fire and lit the fire pit today, and brought sheep fans to cut the meat off the bones to eat... This must be God's will, dear girl, come and record the video."

"Hey!" Li Lu had been in the grain station for a long time and knew how Zhou Zhi and Lao Chi Ri got along with each other. Lao Chi Ri usually would not deliberately show off his "intangible cultural heritage", it was usually a matter of chance.

Zhou Zhi did not force it, but waited patiently for the right opportunity, and only recorded it when Lao Chi Ri was willing to demonstrate.

Old Chi Ri was seen chanting a spell while tearing off a piece of moxa from the fire starter.

At this time, the fire was not extinguished, and the temperature of the moxa head was actually quite high. When Lao Chi Ri pulled it off, it brought up a bunch of flying sparks, which was very beautiful.

Under the attention of everyone, Lao Chi Ri took out the sheep shoulder blade that Zhou Zhi had just shaved clean, licked the thinnest part of the other side of the sheep bone without the "ridge", that is, the arched bone ridge, and dipped the moxa on it.

Then Old Chi Ri continued to chant, gently waving the sheep shoulder blade, and some white smoke came out of the mugwort head.

The three little ones looked at each other, and suddenly remembered that this was a huge burial site of the Qiong people, and they couldn't help but feel creepy.


Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like