Genius of the Rules-Style System

Chapter 103 I’m not afraid that the other party will change again this time!

Copying is a basic function of computers.

The bottom layer of the computer will have a copy function. To implement the copy function, no code is needed at all, just an execution instruction. However, if you want to rely on your own computer to copy data transmitted by other computers that have not yet been recognized, it is completely difficult. It’s different.

Zhao Yi thought about making a data packet with an 'IP suffix'. By attaching the data packet to the information sent by the target host, the 'navigation' function of IP can be realized, and the information will be 'navigated'.

This is not copying, this is interception.

The target information was not copied, but directly intercepted and sent to other places.

"Unless you can gain greater permissions, or use the target host to replicate, it will be too difficult to replicate."

This cannot be solved in a short time.

If the target host is used to implement the replication function, it is relatively simple, but it is equivalent to controlling the target host. The method is also very simple, which is to drop a Trojan horse program.

"To mount a Trojan, you must break through the interception program and not be recognized as a Trojan. Concealment is the most important, but it may be recognized as long as it is running."

"It's easy to destroy, just make an infinite copy, or run it with some program..."

Zhao Yi shook his head.

Even if it is a Trojan horse program, the purpose is definitely not to cause damage. It is meaningless to harm others without benefiting oneself, and it will also involve serious legal issues.

The Trojan horse program to be made must not be destructive, and it is best to have a self-destruct function...

Self-destruct function?

Zhao Yi suddenly remembered that in the Dota game, there was a hero called Goblin Engineer. His ultimate move was to commit suicide directly, bursting out with huge power on the spot.

This way the opponent won't be able to get heads, and the effect is pretty good when death is inevitable.

"If the execution of the Trojan is a one-time operation, there will be no sequelae. Even if it is detected, it doesn't matter. It is only a one-time operation anyway."

"At the same time, it can also achieve many functions?"

Zhao Yi's eyes lit up as he thought about it, and he immediately started writing according to his ideas.

If the code of a one-time execution program is simple enough, it will be very easy to embed it into other software, programs, and documents. However, it must have the advantages of being easy to place and execute, and not easy to be detected, otherwise it will be meaningless. .

This is the difficulty.

Zhao Yi decided to write it with low-level code. The low-level code can be embedded in various places and directly call and execute some low-level computer functions to improve the capabilities of his own program.

soon.

Relying on the "Law of Cause and Effect" and "Contact Rate" abilities, he completed the 'disposable Trojan Horse Framework'.

The next step is to add functionality.

Zhao Yi's purpose is to break into the police website. It is best to find the management entrance of the website. Putting the Trojan on the police department's computer and copying the web page to record the information is a good choice.

This function is too simple to implement.

Because they all use the same operating system, many of the browser's default historical browsing record file paths are exactly the same. You only need to use the underlying instructions to perform the copy function operation and create a function that is sent to the specified IP. .

But for the sake of insurance, he decided to start from the bottom, first find the file path, and then perform copy and transfer operations.

Transmission is much more difficult than copying.

If you want to transmit, you must establish a connection. The default IP host of the Trojan must also have a port for direct connection.

Zhao Yi made another reception procedure.

The program must be running all the time to receive the information transmitted by the Trojan execution.

The following is the final step - placing the Trojan program.

"Make a website with a Trojan horse? Hide the IP so that others cannot easily find it?"

"How about designing another program?"

"wrong!"

Zhao Yi suddenly shook his head. His target was the police website, and it didn't need to be so complicated at all.

Open the monitoring record.

There were dozens of Penguin accounts and passwords on it. He logged into one to check, found a group related to police, and then sent a group email with a Trojan horse document.

Log in to the second one.

"Logistics director, Zhou Hongwen?" Zhao Yi looked at it in surprise and found that there was no need to log in anymore.

This Penguin can hold up to ten!

Li Jiandong was working the night shift that day.

Compared with other departments of the police, the logistics department is relatively relaxed. Logistics is rarely used in emergencies, and the night shift in the logistics department is relatively relaxed.

Li Jiandong, however, was not relaxed at all. He was worried that the police website would be hacked again, so he looked at the opened website link over and over again, carefully paying attention to whether it had been modified.

He kept watching until after eleven o'clock.

"It seems to be okay. After hiding the management entrance, the other party can't do anything."

Li Jiandong took a breath and noticed a group email notification appeared in the lower right corner. There were new emails in the Penguin mailbox. He usually didn't care about it. Most of them were advertisements and scammers, but this email was completely different.

That was the email sent by Director Zhou.

Li Jiandong quickly opened it and read it, and found that there was only one sentence in the email——

Everyone, come and take a look at the document below!

"document?"

Li Jiandong discovered that the email came with a document. He clicked on it without much thought. The document was opened in the browser, and there was indeed a lot of garbled characters in it.

"What? Something went wrong?"

Li Jiandong fiddled with it for a long time but still didn't understand it. He downloaded it and opened it again. There were still a lot of garbled characters in the document. "Maybe it was sent by mistake?"

Li Jiandong didn't care.

He graduated with a bachelor's degree in computer science. After entering the police force, he continued to do computer-related work. He still has a certain degree of confidence in his computer skills.

For example, the firewall on his computer is always at the highest level of protection, and the anti-virus software on his computer is always on.

As long as there are no prompts from the firewall or anti-virus software, there is no need to pay special attention to it.

Zhao Yi just finished washing and was about to go to bed. After glancing at the computer screen, he found that the program had actually received the message?

Did someone open the email so quickly?

He opened the document record, and hundreds of link records appeared in it. The function of the Trojan program is to copy the latest 100 historical link records once executed.

This is a bit like casting a net to catch fish.

In fact, this is the case with Trojan horses. How many fish can be caught by casting the net down really depends on some luck.

Zhao Yi used Penguin to deliver the information at targeted locations. He was also very lucky. He found several police-related links and opened them respectively to find the management entrance.

After reading the suffix at the entrance, he felt a sudden realization.

No wonder I can’t find it!

This guy modified the connection entrance until it was almost garbled.

Zhao Yi tried several recorded IDs and passwords, then went directly to the management page, and then put in a Flash animation of an eagle flying, links, and a hidden super-difficult Mathematical Olympiad question.

There is no shortage of special tips——

(The answer to the question multiplied by π is the password, come on!)

And then……

"yes!"

"This guy has hidden the management entrance. It's really hard to find. Just embed a functional program directly in the website source code!"

Zhao Yi started writing in high spirits.

It's easy.

He hid the program in the code for calling the database, loading pictures, and files. The function was to display the connection to the management entrance, the management account, and the password in a three-level interface of a long news.

certainly.

The information displayed is scrambled and other people will certainly not be able to understand it.

If you are an experienced programmer who is good at website design, you will probably find something wrong when you see a program that calls the database in the website code.

That also needs to be looked at carefully.

It’s not easy to see the garbled code on the third-level news interface. Firstly, there are too few people visiting it. Secondly, the news is very official and contains little content. It’s probably a bit of a headache to look at it. It is difficult for anyone to get in within the police force.

"I'm not afraid that the other party will change it again this time!"

Zhao Yi went to bed with satisfaction, but he kept thinking about programming issues in his mind.

The 'copy monitoring' failed, and I always felt very unwilling to do so. I found the management entrance by placing Trojans, which was a bit inferior in terms of means.

but……

The framework of the Bomber Trojan is not bad, it is highly concealable and easy to deploy. There are many areas for improvement, and it also has great potential for use and development.

This can be considered a gain.

I have something to do today and won't be back until after six o'clock. Sorry for the late update. There will be another chapter in a moment.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like