The young man nodded and explained, "If you want to solve it, you need to know its causes and harms before you can take corresponding preventive measures. "

Guan Yiping glanced at the technician behind him, and the other party hurriedly took out the equipment and began to record.

Guan Yiping nodded with satisfaction, and then motioned for the young man to continue.

"XSS is a very old vulnerability, but it's still prevalent on the Internet. "

"XSS is a worm, it will amplify, with XSS worms, like scarf, Du Niang sticker, this worm case has happened. "

The young man gestured for a moment and continued: "For example, if a hacker posts a book review or other virtual plug-in link, there will be malicious code in this link. "

"For example, I just saw it in some book review areas, and I didn't reply to this comment when I saw it, and I was the kind that picked up Wen Kunkun, or the kind of insulting remarks that can attract the attention of other readers and subconsciously fight back..."

"When a reader accidentally clicks on a hacker's content or link, this code will make the user post the same content themselves, and this malicious code will also be sent here. "

In this way, the number of book reviews containing malicious code will increase exponentially, so it can get a large explosion in a short period of time, which is a very harmful attack method for the novel network. "

Saying this, the young man paused, giving the technician behind Guan Yiping time to think.

Subsequently, he continued.

In addition, XSS distributed service attack is also a very deadly hacking method. "

"When a reader visits Wuxian Novel during a certain peak traffic period, such as clicking on a book to read a book, the reader's browser will automatically execute the hacker's command. "

"The hacker's order may want him to ask for the target website of the attack, the Wuxian Novel Network, and send a request in one second!"

"If, at the same time, there are 100,000 readers reading novels online, it will increase exponentially, so as to achieve the purpose of stopping the service of the Wuxian Novel Network. "

"In the case of hacker attacks, there is a name - puddle attack!"

"For example, if a hacker wants to send a connection to Wuxian's internal network security technicians, the conventional operation is to completely hack the entire Wuxian and take out the other party's information from the Wuxian background!"

"But this is a bit cumbersome, and the movement is large, and the technicians themselves have a certain strength, and the gain is not proportional to the pay. Then, hackers can think differently. "

"Technicians will maintain the site on a daily basis, so we can just implant XSS in the site! Then, when something goes wrong, the technician checks the website. "

"And during the inspection, taking advantage of the vulnerability of the server, he inadvertently got hit by XSS! And in the process, not only the technician was affected, but all the other technicians were affected..."

“...... Because the server itself has vulnerabilities, even if it has been patched, as long as it is not a targeted patch, it is useless. "

"Casually implant malicious code in the server or website department, and when the technical staff does not react, it is very easy to put all the anti-intrusion mechanisms of the website. "

"Immediately after that, all user information may be leaked.

"This, in some black industry chains, is a well-known secret. "

"What's more, as long as you don't clean it up, it's always on your site, and one day you'll take the bait..."

The young man patiently explained.

Of course, there are many things, he did not elaborate. Including his own ability to successfully invade in ten seconds.

That's his technology, and when he says it, it's depreciated.

With the young man's detailed explanation, the technicians suddenly realized and began to discuss some coping strategies with him.

The surrounding enterprises, seeing that it is going so smoothly here, many small and medium-sized enterprises are also tempted.

The biggest difference between small and medium-sized enterprises and large enterprises is that their Internet security technicians, both in terms of experience and strength, are difficult to compare with large enterprises.

Du Niang's Ding Yuan, Ebao's Dao Brother, Penguin's... These people are well-known, and ordinary small and medium-sized enterprises are not moved.

Because of this, they plan to take this opportunity to let those hackers help deal with some problems on some websites and new products. It would be great if you could recruit a group of talents.

For a while, the auditorium began to be lively.

A large number of hackers, invited by those people, began to operate.

However, the bigwigs of those large Internet technology companies did not speak.

However, they acquiesced in the communication between their in-house technicians and those hackers.

Similarly, there are some arrogant hackers who are indifferent to the solicitation of other companies.

They are waiting, waiting for the arrival of "god-level hackers". They want to see if the "god-level hacker" can afford the title of "godfather of the new generation of hackers"!

They didn't participate in the last live broadcast, so they were skeptical of "god-level hackers" in their hearts.

If it weren't for the support of top technicians such as Brother Ebao Dao and Du Niang Ding Yuan, they wouldn't even be here in person.

Similar to their thoughts are the bigwigs of big business.

It's better to find a hundred warriors than a general!

Fighters, with their financial resources and appeal, are not lacking at all.

The hackers at the bottom may be powerful, or they may be pretentious, but they don't see the real achievements of the other party. So, naturally, I don't care too much.

Moreover, their company is not short of talent.

On the contrary, at the 5th Internet Security Conference, they heard the legendary story of the "god-level hacker", and they were also very curious about him.

They also want to see if the "god-level hackers" are as unpredictable as the rumors.

Ebaoyun glanced at Wu Qing and asked, "God-level hackers, haven't you arrived yet?"

Hearing this, the penguin on the side, Mr. Teng, Mr. Duniang Li... They pricked up their ears and listened.

Wu Qing shook his head and said helplessly: "We can't contact him, we have to wait for him to contact us." "

"However, he said before, it's almost there, it's almost there. Wu Qing sighed helplessly.

"It's okay, don't worry, it's still early. Mr. Yun coped, then turned his head and discussed with Mr. Teng.

But at this moment, suddenly...

The hackers sat still, watching coldly, and one of them had his mobile phone ringing.

"Hum..."

The man frowned slightly, and opened the phone in surprise.

Looking at the content of the text message that popped up on his mobile phone, his expression changed suddenly, and his eyelids jumped. In his heart, there have been stormy waves.

"Someone... Black!it!my!hand!machine!" he gritted his teeth, word by word. _

To see the ununderlined version of the novel, please download the Fei Lu novel

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like