Cyber Heroes

Chapter 368

"Hello." Xiang Shan hugged his arms and greeted Hartman in a friendly manner.

Hartman was wandering. But this is reflected right away. He stood up immediately, loudly said: "Yes, sir."

"That...I am not your sir..."

"Hanuman team leader, Xiang Shan. It’s you. Right now you are my chief."

Xiang Shan didn't expect this hacker actually has such a straightforward character. On the contrary, he was a little sorry, just asking: "What are you doing now?"

"Are you asking about the work progress? Sir?"

Hartman's voice is still It's quite big, and several people in the security department have heard it not far away. They took a look and found that it was Xiang Shan, so they didn't care.

After all, Xiang Shan is indeed the boss now. Moreover, the boss the past few days has been trying to "communication with that group of hackers". Now that Hartman is there, the boss came to ask as it should be by rights.

After all, there is really nothing he can't ask.

"I'm scanning these electronic devices to infer the spread of the electronic virus, sir."

Xiang Shan noticed that there are indeed a lot of personal devices on this table. .

"What did you find?"

"Still scanning, sir. I just filtered out the files in the'whitelist'. The remaining suspicious objects are being used Toolkit analysis." Hartman said, "Actually, I can probably guess the technique, but I will not make a judgment until it is confirmed."

Xiang Shan asked: "Can you tell me something? ?"

"I guess it should be a kind of Trojan horse, it knows the common characteristics of research materials, it will retrieve the data that meet the characteristics in the entire computer, and then send it to the designated location when there is a public network . After all this is done, the Trojan will be automatically deleted to prevent itself from being retrieved. So check those scholars that have been leaked, you must not find the virus. But after all, it will leave traces."

Human immunity is divided into "non-specific immunity" and "specific immunity". Non-specific immunity will clear away the "non-self" in the whole person. The specific immunity only targets specific pathogens. Generally speaking, after pathogens enter the human body, they will be attacked by non-specific immunity. A piece of malicious RNA can't directly let itself into the cell, so it needs a protein shell-this is the virus.

Pathogens such as viruses will disguise themselves to activate receptors on the surface of human cells, pretending to be a substance needed by cells, and enter the cell. The large number of viruses will activate the resistance of the specific immune system. Helper T cells will recognize the antigen, read the encoded record in the memory T cell, and then produce the antigen.

This set of logic can also be roughly presented on computers and computer viruses. The computer system is defined by engineers as "legal operation" and "illegal operation", and some operations are naturally difficult to perform. It is difficult for pure malicious code to take effect directly. So hackers will "shell" the malicious code. Viruses either extract permissions or exploit loopholes to disguise their modifications as "legal operations." Anti-virus software and analysis software can retrieve the code of these "shells", and check and kill them by comparing with the virus database. Security software and virus database represent helper T cells and memory T cells.

But the viruses written by humans are the product of intelligent design, so there are often unimaginable "sao operations" of natural evolution-such as self-deleting.

The virus will destroy its own "shell" and will not give the immune system a chance to recognize it.

The spread of computer viruses also follows infectious disease. However, a virus that "will play and disappear without producing antibodies" will inevitably make it difficult to determine "patient zero".

But "Ajini" seems to be able to find "traces of virus modification"-or "symptom records", and then reverse the transmission trajectory based on the "records".

Speaking of this, Hartman was a little proud: "Actually, I still know a little bit about Zhu Rong."

Xiang Shan felt a little strange: "Are you friends? Or do you have Qiu?"

"Don't know." Hartman shrugged: "But I studied him."

"You studied him? Then why didn't you catch him? "Xiang Shan thought it was weird: "You had already caught this guy, wouldn't it be all right?"

"I'm not a policeman or IRS (United States Revenue Service)." Ha Terman was also very surprised: "If there is no order, what would you do to capture this economic criminal?"

"Economic criminal..." Xiang Shan couldn't figure it out at all. In the eyes of this hacker, can the behavior of "Zhu Rong" actually be summed up as an economic criminal...

No...it seems to meet the definition of an economic criminal, but...

Xiang Shan Asked: "Then what are you doing researching on it?"

"Hackers are people who find loopholes in the system. Some are good at finding holes accidentally left by construction workers, and some like to drill holes by themselves. "Hartman said: "Following the footsteps of other hackers, it is easy to find the "hole". I have studied the methods of other hackers. But I rarely take the initiative. Normally I just follow them. Later, look for things that can be used."

Xiang Shan has indeed heard of such things. Some little black hats, the bottom of the world who are like traffickers, only learn some special basic techniques from some big hackers. [It may even use scripts written by big hackers, known as "script kiddie" assholes] After they use certain scripts to hack into innocent websites, the Trojan files generated by those scripts on the website may have passwords They are all exactly the same.

These script boys are more like the furnace cauldron and puppets of the script owner. They will invade some innocent websites, slightly modify the material on the homepage to prove their own words, and then put their "records" triumphantly in the anonymous community to accept others' admiration. But all of this is to facilitate the hidden actions of the big hacker behind the scenes.

But Xiang Shan really doesn’t know that hackers at this level of "Ajini" can also do this...

In other words, hackers at this level of "Zhu Rong" can actually Treated like a script kid...

"For me, reversing Trojan horses written by other hackers is actually a bit more interesting than breaking a complex system." Hartman said: "I am not Say I’m not good at the latter. Actually, I’m also very good at finding loopholes, but compared with other hackers, I can’t open up the quality gap. But I like to think about tricks that others have played, sir.’ Vol. Gan' I cracked the bits and pieces that the mediocre left on the Internet. I knew that he still had several things that he hadn't explained... Many famous hackers, you think they have confessed all their crimes. Have you ever watched "Harry Potter"? It says that those wizards like to play with Muggles, so they cast themselves a fire curse during the witch hunt, and then stand in the fire and make two calls. I may not be so leisurely when I stand in court, but I must be holding back the thought of'you know so much' in my heart. I am different..."

What did Hartman realize now, Stand up straight again: "I'm sorry, sir. I may be a little verbose."

Xiang Shan doesn't really hate such people. He felt that this guy had a similar taste of "technical house". He waved his hand: "So you know the evidence of a lot of big hackers? You can send them to jail at any time?"

"It's not that exaggerated, sir. At most, I can only confirm that this ID is on the Internet. What happened? or “Which IP did this ID use to log in?” Many times, if you want to convict those criminals, you still have to dig out their identities in the real world, or even snatch their devices when they operate their accounts. To obtain evidence." Hartman was very honest: "The FBI is very professional in this regard."

When he said this, he glanced at the original FBI monitor next to him. The original FBI monitor was actually nodded with the honorable person.

Xiang Shan scratched his head: "You can't lock the position of Zhu Rong soon?"

Hartman was surprised: "Don't you know, sir , My main job is to investigate computer virus infections and assess the extent of information leakage. As for catching Zhu Rong, I have to wait for this matter to be done."

Xiang Shan nodded: "I thought I can find that one directly through you."

"Well, maybe I will be there when the final arrest is made and keep her online through provocations. But in most cases, social engineering Learning means is the best attack."

Xiang Shan nodded: "You are still very transparent. I thought you were proud of your technique."

"No , I’m really proud.” Hartman said: “My technology can maximize the formidable power of social engineering. The correct order can use my power correctly.”

Xiang Shan Said: "That's why you want to...join the army?"

Hartman was nodded.

"Then why don't you sign up for the army normally?"

"I have technical advantages, but no physical advantages, sir." Hartman said: " I don’t quite understand what the normal process should look like. But people like me can’t perform at their own level. Now computer science is advancing very fast. If I relax my studies because of my daily military training, I might not be the best in the world. Good hacker."

Xiang Shan probably understands why the soldiers in the United States don't like this man at all.

It's weird to like it.

Moreover, this guy didn't seem to conceal his intentions at all, so he actually told himself a "foreign chief" on this occasion.

Xiang Shan even noticed the expression on the face of the original FBI monitor. I'm afraid he also thinks this colleague is absurd. But he didn't seem to be allowed to speak, so he kept silent.

Hartman even said happily: "I will become the deputy director of the FBI one day. As long as my technology and the power of the FBI, the cybercrime in the United States will definitely be cured by me. Yes!"

On hearing this, the former FBI staff showed a slight smile, but they quickly converged.

——This poor child, I don’t know how he is isolated...

However, Xiang Shan hates this kind of technical house, does not raise.

He chatted with this "Agni" for a while.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like