Desperate Hacker
Chapter 191 Partners
Chapter 191 Partners
Chen Qingfeng wanted to set up a test environment, so he had to disconnect the network equipment he wanted to survey, and then test the equipment as simply as possible.
So soon all the office networks upstairs were interrupted!
Zhou Yaojie came downstairs in a hurry, and then saw Chen Qingfeng and the cripples under him (Zhou Yaojie's point of view), busy there!
"We can't get online!"
"I know!"
"Where are you now?"
"Don't rush me, if you want to help, just lend a hand!"
Zhou Yaojie hesitated for a moment, looked at Liu Nan who had one hand, and then quickly stepped forward to lend a hand.
The two people put the heavy equipment on the table together, and then Chen Qingfeng began to connect several isolated computers.
In this way, a mini network was organized.
Then Chen Qingfeng returned to his office and downloaded some tools.
He now wants to feed this Cisco network equipment a poison pill.
Chen Qingfeng quickly logged into a computer, and then he used scripting language to quickly forge some data that looked like ID card information.
Soon, a form was generated, which contained a 13-digit number, an 11-digit mobile phone number, and of course some randomly generated names.
Then Chen Qingfeng temporarily built a database and entered these contents into the database.
Because they are all fake, even if someone steals them, it doesn’t feel bad.
But what Chen Qingfeng really wants to do is to put something similar to a Trojan horse on this computer.
That’s right, it’s a Trojan virus!
Then we have to see where the big brain copied these data!
When the opponent copies his data through the network device, he will also take away his program!
……
Zhou Yaojie looked at Chen Qingfeng nervously.
After Chen Qingfeng finished all this, he nodded, indicating that everything was ready.
Then the network device was reconnected to the Internet.
Soon Chen Qingfeng's tool software detected that someone was secretly searching the server data on this device.
Immediately afterwards, his program also began to track the other party and found the link where the loophole was located!
The other party penetrated in through the WebUI module of this network device.Then use this network device to take away some of the data they need!
Chen Qingfeng’s disguised Trojan looks just like data!Soon, the data will be packaged and unpacked through the underlying protocol, and then routed to a target address to be reassembled and merged into a complete program!
This process sounds complicated, but anyone who has studied the source code of the TCP/IP protocol will understand it.
The entire protocol imitates the postal system, which is very simple in principle!
Of course, in the Internet field, the simpler things are, the more effective they are!
But now, people will quickly develop some functions based on some common frameworks.
For example, when some people build their own website, it may take less than an hour to launch it completely.
These people usually use some open source frameworks.
Sometimes the security functions of these frameworks are not perfect.
In other words, some projects were originally insecure, but problems occurred later, and people began to try their best to patch them in various ways.
"Mr. Chen, what are you doing now?"
"I found that they were secretly copying our data and then transferring it to the server on the other end. How do you think they will transfer it?"
"this?"
"It should be web socket! Because I found that their attack method is to exploit a vulnerability in the external UI on Cisco equipment!"
"But, won't they use some encryption methods?"
"Yes!" Chen Qingfeng didn't say a word. What encryption methods could be used? Open SSL?Ha ha!
Chen Qingfeng is lucky, the other party obviously trusts this open source software!
Then Chen Qingfeng finally found his target server!
"I'll go back and take a rest first!"
Chen Qingfeng has now found the location of his opponent, so he is not in a hurry.
So he returned to the office, but unexpectedly Zhou Yaojie was able to follow him.
"You have a way, right? You've already thought of a way?"
"Not yet, don't rush me, there will be no good results if you rush me!"
"Chen Qingfeng, don't think that if something happens to the company, you will be fine?"
Chen Qingfeng took out Flotain directly from his pocket.
"Are you threatening a dying man?"
……
Zhou Yaojie immediately stopped talking.
At this time, Chen Qingfeng took out his mobile phone and called Zhao Changan.
……
"Mr. Xiao, right? Last time I heard Mr. Chen from our company mention you. I heard that you had made some achievements in loopholes before!"
"Ah ha ha……"
The guy named Xiao smiled awkwardly. His name was Xiao Jian.It's a very common name.
Although he lives in an old community, he drives a very cool car.
It is a slightly exaggerated Alfa Romeo. It looks like a luxury car, but the actual price is not expensive.
When Zhao Changan found him, the other party was about to go out.
Zhao Changan briefly explained his intention, saying that he wanted to hire him as a consultant.Soon, this guy became enthusiastic and even invited Zhao Changan to have dinner with him.
"Be a consultant! I'm not bragging to you, I have made some achievements in security. Otherwise, how could I have submitted such an important vulnerability last time?"
"Yes, yes...our company happens to have business needs in this area, and we want to cooperate with you!"
"Mr. Zhao, I am a straightforward person, not greedy for money! As for...salary..."
"Mr. Xiao, the way we hope to cooperate is to pay consultant fees. If you join our company, of course we welcome you, but... you don't have a company under your own name, will it affect your company's business?"
"That's what you said, the consultant fee..."
"To be honest, we have just discovered a vulnerability recently. Please submit it. It may make some other customers doubt whether we will use these vulnerabilities to do bad things, so we have to borrow a path from Mr. Xiao. …”
When the other party heard this, he immediately became excited. This was simply giving money away for free!
"How do you plan to cooperate?"
"Externally, it is said that Mr. Xiao's company discovered this vulnerability and then guided us to develop a response strategy! As for the bonus after reporting the vulnerability, how about we divide it into [-]-[-]? Mr. Xiao doesn't have to do anything and gets [-]% of the bonus!"
"There's no risk, is there?"
"What risks are there? At that time, the honor will belong to Mr. Xiao. You can also use this money to hire some more powerful technical personnel to sort out the current company's business!"
A wise person doesn't tell secrets, so a shrewd person like Xiao Jian is naturally not stupid either.
He could tell that what the other party wanted to use was his reputation.
But after going to the bank for a meeting last time, Xiao Jian had completely realized it.Compared with those old moneymen in Zhejiang Province, he is just like a clown!
(End of this chapter)
Chen Qingfeng wanted to set up a test environment, so he had to disconnect the network equipment he wanted to survey, and then test the equipment as simply as possible.
So soon all the office networks upstairs were interrupted!
Zhou Yaojie came downstairs in a hurry, and then saw Chen Qingfeng and the cripples under him (Zhou Yaojie's point of view), busy there!
"We can't get online!"
"I know!"
"Where are you now?"
"Don't rush me, if you want to help, just lend a hand!"
Zhou Yaojie hesitated for a moment, looked at Liu Nan who had one hand, and then quickly stepped forward to lend a hand.
The two people put the heavy equipment on the table together, and then Chen Qingfeng began to connect several isolated computers.
In this way, a mini network was organized.
Then Chen Qingfeng returned to his office and downloaded some tools.
He now wants to feed this Cisco network equipment a poison pill.
Chen Qingfeng quickly logged into a computer, and then he used scripting language to quickly forge some data that looked like ID card information.
Soon, a form was generated, which contained a 13-digit number, an 11-digit mobile phone number, and of course some randomly generated names.
Then Chen Qingfeng temporarily built a database and entered these contents into the database.
Because they are all fake, even if someone steals them, it doesn’t feel bad.
But what Chen Qingfeng really wants to do is to put something similar to a Trojan horse on this computer.
That’s right, it’s a Trojan virus!
Then we have to see where the big brain copied these data!
When the opponent copies his data through the network device, he will also take away his program!
……
Zhou Yaojie looked at Chen Qingfeng nervously.
After Chen Qingfeng finished all this, he nodded, indicating that everything was ready.
Then the network device was reconnected to the Internet.
Soon Chen Qingfeng's tool software detected that someone was secretly searching the server data on this device.
Immediately afterwards, his program also began to track the other party and found the link where the loophole was located!
The other party penetrated in through the WebUI module of this network device.Then use this network device to take away some of the data they need!
Chen Qingfeng’s disguised Trojan looks just like data!Soon, the data will be packaged and unpacked through the underlying protocol, and then routed to a target address to be reassembled and merged into a complete program!
This process sounds complicated, but anyone who has studied the source code of the TCP/IP protocol will understand it.
The entire protocol imitates the postal system, which is very simple in principle!
Of course, in the Internet field, the simpler things are, the more effective they are!
But now, people will quickly develop some functions based on some common frameworks.
For example, when some people build their own website, it may take less than an hour to launch it completely.
These people usually use some open source frameworks.
Sometimes the security functions of these frameworks are not perfect.
In other words, some projects were originally insecure, but problems occurred later, and people began to try their best to patch them in various ways.
"Mr. Chen, what are you doing now?"
"I found that they were secretly copying our data and then transferring it to the server on the other end. How do you think they will transfer it?"
"this?"
"It should be web socket! Because I found that their attack method is to exploit a vulnerability in the external UI on Cisco equipment!"
"But, won't they use some encryption methods?"
"Yes!" Chen Qingfeng didn't say a word. What encryption methods could be used? Open SSL?Ha ha!
Chen Qingfeng is lucky, the other party obviously trusts this open source software!
Then Chen Qingfeng finally found his target server!
"I'll go back and take a rest first!"
Chen Qingfeng has now found the location of his opponent, so he is not in a hurry.
So he returned to the office, but unexpectedly Zhou Yaojie was able to follow him.
"You have a way, right? You've already thought of a way?"
"Not yet, don't rush me, there will be no good results if you rush me!"
"Chen Qingfeng, don't think that if something happens to the company, you will be fine?"
Chen Qingfeng took out Flotain directly from his pocket.
"Are you threatening a dying man?"
……
Zhou Yaojie immediately stopped talking.
At this time, Chen Qingfeng took out his mobile phone and called Zhao Changan.
……
"Mr. Xiao, right? Last time I heard Mr. Chen from our company mention you. I heard that you had made some achievements in loopholes before!"
"Ah ha ha……"
The guy named Xiao smiled awkwardly. His name was Xiao Jian.It's a very common name.
Although he lives in an old community, he drives a very cool car.
It is a slightly exaggerated Alfa Romeo. It looks like a luxury car, but the actual price is not expensive.
When Zhao Changan found him, the other party was about to go out.
Zhao Changan briefly explained his intention, saying that he wanted to hire him as a consultant.Soon, this guy became enthusiastic and even invited Zhao Changan to have dinner with him.
"Be a consultant! I'm not bragging to you, I have made some achievements in security. Otherwise, how could I have submitted such an important vulnerability last time?"
"Yes, yes...our company happens to have business needs in this area, and we want to cooperate with you!"
"Mr. Zhao, I am a straightforward person, not greedy for money! As for...salary..."
"Mr. Xiao, the way we hope to cooperate is to pay consultant fees. If you join our company, of course we welcome you, but... you don't have a company under your own name, will it affect your company's business?"
"That's what you said, the consultant fee..."
"To be honest, we have just discovered a vulnerability recently. Please submit it. It may make some other customers doubt whether we will use these vulnerabilities to do bad things, so we have to borrow a path from Mr. Xiao. …”
When the other party heard this, he immediately became excited. This was simply giving money away for free!
"How do you plan to cooperate?"
"Externally, it is said that Mr. Xiao's company discovered this vulnerability and then guided us to develop a response strategy! As for the bonus after reporting the vulnerability, how about we divide it into [-]-[-]? Mr. Xiao doesn't have to do anything and gets [-]% of the bonus!"
"There's no risk, is there?"
"What risks are there? At that time, the honor will belong to Mr. Xiao. You can also use this money to hire some more powerful technical personnel to sort out the current company's business!"
A wise person doesn't tell secrets, so a shrewd person like Xiao Jian is naturally not stupid either.
He could tell that what the other party wanted to use was his reputation.
But after going to the bank for a meeting last time, Xiao Jian had completely realized it.Compared with those old moneymen in Zhejiang Province, he is just like a clown!
(End of this chapter)
You'll Also Like
-
Starry Sky Railway: Start by looking for a marriage partner for the rich pharmacist
Chapter 241 5 hours ago -
Star Iron Genshin Impact: Mihoyo Live
Chapter 299 5 hours ago -
Hong Kong Variety Show: I can travel through the magical world
Chapter 180 5 hours ago -
Naruto: I am Kokushibo, the invincible six-eye
Chapter 76 5 hours ago -
On the night of genocide, I awakened the eternal Izanagi
Chapter 210 5 hours ago -
Elf: I draw a lottery for a divine beast at the beginning, and I am invincible!
Chapter 429 5 hours ago -
Prince of Tennis: Fusion Kaido, Thunder Gossip Polk
Chapter 136 5 hours ago -
American comics: Extracting the immortality of cancer cells at the beginning
Chapter 154 5 hours ago -
What? The ladies in my dreams are real.
Chapter 452 5 hours ago -
Reborn to get the male god system, but transformed into a girl
Chapter 117 5 hours ago