Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 7 Live Hackers, Live Invasions (Part 1)

At about 15 o'clock, the report meeting began. The door in front of the stairs classroom opened and two people walked in. One of them was gentle and looked very well-educated; the other was a fat man with a very generous smile, holding a thermal water cup in his hand.

After going to the podium in front, the fat man holding a thermos smiled even more: "I have so many classmates here today. Your enthusiasm has moved me very much. Thank you for coming here to participate in our report meeting to understand the development of Internet security. You are all aspiring young people with ideals and pursuits, and full of desire for knowledge!"

After pausing, the fat man continued to smile and said, "I think many students come here today and want to meet the legendary famous hacker Cobra. Then I would like to ask, among the students here, have anyone heard of Cobra before? Are there any, please raise your hand if there are some!"

The venue suddenly became quiet and no one raised his hand, which made the people on the stage a little embarrassed.

Hu Yifei raised his hand with great help, "I have heard of it, I have heard of it at the Wolf Nest Camp Forum!"

The stage was overjoyed. This was simply a lucky star to save the scene. When he saw Hu Yifei's outfit, the fat man thought about it. He thought that the people from the Computer Association really had a wink and cooperated well. If he held a report meeting in the future, he would also look for them. "Congratulations to this classmate, you will get a new book signed by Cobra, with a set of Internet security tool sets collected and used by Cobra."

Hu Yifei was overjoyed. Unexpectedly, this raising of his hand would have unexpected gains. The tools used by Cobra should not be low-end products circulating everywhere on the Internet. Many people at the venue immediately began to regret it secretly. Some of them had heard of Cobra, but just didn't have the nerve to raise their hand.

"Student, please tell me what the Cobra you know is like?" The fat man on the stage walked down and handed the microphone to Hu Yifei.

Hu Yifei thought for a while and said, "Cobra is the first generation of hackers in China, with both virtue and art!"

"It's over?"

"It's over!" Hu Yifei nodded for sure.

The other party was stunned for three seconds and then changed into that smile, "This classmate said it very well. Both virtue and art are both strong. These four words are very important! So do you want to know what this person with both virtue and art looks like?"

This time the venue was very enthusiastic, and everyone shouted "think", but unfortunately there were no prizes.

"Then I will introduce to you the special guest of today's report meeting, the well-known hacker Cobra, the technical director of Weilan Security Technology Company, Mr. Huixin!" The fat man was so passionate that he stretched out his big hand and pointed at the gentle and gentle person on the stage.

"Hello, classmates, thank you for coming to listen to my report!" Cobra said nothing, and then bowed lightly. When he got up, he looked at Hu Yifei specifically, as if this person who had heard of him was somewhat interested.

But Hu Yifei thought about it there. It turned out that Cobra's name was Huixin. It was the first time I heard of this surname in the world.

The person holding the water cup sat back on the podium and turned on the computer, "Everyone must want to know what Cobra has done as a well-known hacker, and must also want to know what kind of development history of Chinese hackers. Don't worry, I have made a special topic for you. After reading this special topic, everyone will know!"

The projector cast a title on the screen: "A Brief History of the Development of Chinese Hackers and the Yearbook of Chinese Hackers". Then the lights in the venue dimmed, the background music started, and the special topic began to play. The digital ladder classroom built by the University of Science and Technology invested hundreds of thousands of yuan, and the effect was still good.

Hu Yifei has been exposed to many similar special articles at the Wolf Nest Base Camp and is well aware of the history of the development of Chinese hackers. However, this is the first time I have watched this type of special film. The special film has a large amount of picture materials, which are not found online. It clearly explains important events, important figures and groups in each period of the development of Chinese hackers. Every time I go to the passionate and low places, I also cooperate with the back music that fits it, which makes people feel excited.

The earliest ones appeared were "stealers", who introduced excellent foreign software products, communication and exchange registration codes on the original prototype of China's Internet.

Later, the legendary history of Kevin Mitnik, a super hacker, was introduced to China and became an idol of many Internet youth in China. The term "hacker" has since appeared on the Chinese Internet and has begun to be remembered by people.

Subsequently, Trojan horse programs began to appear, the virus storm continued to expand, and the security prospects of the Internet were bleak. Almost all people on the Internet were busy with anti-virus, the most famous of which was the CIH virus that still made many people still terrified.

The 1998 Indonesian anti-China incident angered Chinese hackers and also prompted the emergence of the earliest hacker groups in China. They attacked Indonesian government websites, condemned the atrocities, and created the first generation of Chinese hacker spirit with the theme of "unity and strength". This group was later called the "Green Corps" of the Whampoa Military Academy in the Chinese hacker community.

The hacking tools developed by Chinese hackers themselves began to appear at this time. The famous Liuguang, Shuxue, and Luandao. The authors of these tools have a common name, his name is Xiaorong.

Another year has passed, and 99 years was the most glorious year for Chinese hackers. This year, the first Sino-US hacker war broke out. The bombing of the embassy in Yugoslavia has led to the scale of this battle that took place on the Internet. With the brilliant results of this war, Chinese hackers have since occupied a place in the world security circle. Chinese Red Guest took over the baton of their predecessors and added new content to the spirit of Chinese hackers, that is patriotism, and the second generation of Chinese hackers appeared.

After the patriotic Chinese hackers cleaned up the United States, they then cleaned up Taiwan, which had a two-country theory, and their reputation was greatly boosted. China's hacker software Trojan Ginghe showed strong combat power in this battle and directly stimulated the emergence of more excellent hacking software later. Huang Xin, the author of Trojan Ginghe, was also well-remembered.

It was also in this year that China's hacker camp began to diverge, and Hongke was one of them. The "Green Corps" also officially formed the "Zhonglian Green Alliance" network security company and took the steps of commercialization.

After the new millennium, with the development of the domestic Internet, the threshold for Internet access began to lower, and the threshold for hackers also decreased. The emergence of a group of fool-style hacking tools represented by Dugu Swordsman made this group more popular. The term hackers continued to appear in the media and were hyped very much. Hackers during this period were called the third-generation hackers. They no longer focused on technology, but relied more on ready-made tools. The mess of personnel also made this group become impetuous.

The second Sino-US hacker war after the Sino-US aircraft collision in 2001 gave this manic group a blow. Chinese hackers failed to continue their glory in this war, and this war has largely become a patriotic show in the media.

After the war, with reflection on the hacker spirit and the influence of the Bolai hacker spirit, the Chinese hacker group continued to differentiate, and more schools emerged. Even groups in the same camp would undergo deep divisions. Even the "Green Corps" that were in the same school were divided into Beijing's "Green Alliance" and Shanghai's "Green Alliance".

It is precisely because of this extreme differentiation that the era of the hacker alliance has never returned, and replaced by scattered small groups. This has led to the fact that the Chinese hacker group has never dominated the country again, and there are no leaders like Xu Rongsheng, Chinese hawks, netcc, and Yuan Ge who have strong appeal.

In the special film, some other special characters are also introduced, such as Kingsoft Qiubojun and Tencent Ma Huateng, which caused constant commotion in the venue. As long as the characters appear in the special topic will be accompanied by Cobra and their photos.

Hu Yifei's eyes wide open, but he didn't expect that such a low-key person, Cobra, would have such a wide network of contacts in the circle.

The special film was played, and the venue was silent for a long time. While everyone was excited about the hackers' brilliant achievements, they were also reflecting and regretting.

"Okay, our topic will be played!" The fat man holding the cup laughed again, "After watching the special film, do you have the feeling of trying out your skills? Do you want to have a hacker addiction in person?"

"I want to!" someone in the venue immediately shouted excitedly.

"It's useless to think about it!" The fat man laughed, "I can become a hacker by watching a special film. I don't have great skills!"

The audience burst into laughter.

"I can't do it, but Brother Cobra next to me is very good!" The man pointed at Cobra, "Now, we will ask Brother Cobra to demonstrate the hacker's attack methods to everyone, so that everyone can see with their own eyes how terrifying the real hacker is!" The fat man deliberately flipped the last word and immediately mobilized the atmosphere on the scene.

Cobra opened the microphone in front of him, blew the air, and said, "There are many hackers' attack methods. Today I will mainly demonstrate two of them, SQL injection attack and overflow attack. Many of the students at the scene may not understand it. It doesn't matter. I will give you some explanations."

Cobra opened the computer in front of him and connected the projector. The large screen in the venue began to display the screen on his computer. Cobra opened a web page and showed it to be a BBS. "This is a forum. If you take a closer look, will you feel very familiar? Yes, this is exactly the same as the BBS of your University of Science and Technology, using the same program code!"

Now everyone's interest became aroused, and Hu Yifei also kept a close eye on the screen. The forum displayed on the screen is indeed very similar to the BBS of the University of Science and Technology, but it was just a LOGO.

"This is the BBS I set up on the company's backup website server. The server uses Microsoft's server operating system. It has made necessary security settings and installed firewalls and antivirus software. Now I will demonstrate to you how to use this forum to achieve the purpose of intrusion and control this server!"

Someone at the scene was so excited that he was trembling. Damn, you have to study hard. When you learn to do it, you will get rid of the school’s BBS, so that your fucking food in the cafeteria will be free of oil and water, so that you won’t pass the exam! Today’s report meeting was really in vain.

"Now, 99% of websites need to use databases. The so-called SQL injection is a hacker method that uses the website to filter the data in strict filtering of data, insert some data query language when submitting data, and thus obtain the information you want." Cobra briefly introduced it, but he did not expect the people below to understand. He demonstrated on the computer: "For example, when I am visiting this page of the forum now, I added a SQL judgment statement behind the URL. The meaning of this code is also very simple, which is to ask if 1=1 is correct. The answer is definitely correct, so when I hit the Enter key, everyone saw it and the page opened normally."

"But if I ask if 1=2 is correct, then you can see that after the URL is submitted, the web page cannot be displayed normally, and the server returns an error message! Why is this? Because 1=2 itself is wrong, so after the server analyzes, it will not be displayed."

"So what are you thinking about now?" Cobra suddenly asked the people at the scene.

No one answered the site, which is normal. The correct answer will be displayed, and the wrong answer will not be displayed. What problem can this indicate? Can you invade by asking some questions that equal to a few?

Cobra waited for a while, and saw that no one answered, and then smiled and said, "Think about it, if the SQL statement I submitted was not asking if 1=1 is correct, but asking the forum administrator whether the account number is called Admin and whether his password is 12345, then what kind of information will the web page tell us?"

Suddenly some people understood that Hu Yifei was the first to understand. Damn, this is amazing. If the forum administrator's account is really Admin, then the web page will be displayed normally. If not, the web page will make an error. If you try one by one, you can always try out what the administrator's account is and his password.

Seeing that many people understood it, Cobra continued: "Of course, this is just the simplest judgment statement. There are many types of SQL statements, including queries, judgments, additions, deletions, and most importantly, modifications. If you want to understand what SQL injection is, you have to learn the SQL language well. This is not difficult, the language format is fixed, and you can master it in a few hours!"

Hu Yifei was very excited. It turned out that he could master it in a few hours, but he thought it was difficult.

Cobra clicked on the forum and said, "Everyone has seen it. The administrator account of the forum is indeed called Admin. You don't need to enter a query statement. The forum list is displayed. We know his account and guess his password. It's just a matter of time. But this seems to be a waste of time. Should we consider using modification statements? Can we use SQL statements to directly change his password to 12345?"

Cobra clicked on the forum to log in, entered the account Admin, and then entered the password 12345. When logging in, the forum prompted the password wrong and could not log in. "You see, the password for the management account is not 12345. Now we use the method just now, insert the SQL statement behind the URL, and change its password to 12345."

I typed a large number of SQL statements behind a URL, and when I pressed to enter, the web page was displayed normally. Cobra said: "Now the page is displayed normally, which tells us that the password has been modified successfully. If it is not successful, it will prompt an error!"

Cobra returned to the login interface and entered the account and password 12345. This time everyone saw it very clearly. They logged in smoothly and their password has become 12345. This is amazing. They just added a small piece of code to the usual URL, and actually modified the administrator's password. If it weren't for seeing it with their own eyes, no one would have believed it.

The impatient person raised his hand directly, "Well, Brother Cobra, can you rewrite the code just now? I can write it down!" Those who don't know thought he was good at studying, but those who know understood that this kid must be unhappy and might be holding some bad water in his stomach.

Cobra smiled: "It's okay to write it ten times, but this code is not universal. If I can succeed, you may not succeed. Because you must also understand the database structure of the website. The database structure of different websites is different, and not every website has such a vulnerability. For example, the website of your University of Science and Technology has fixed this vulnerability three months ago!"
Chapter completed!
Prev Index    Favorite Next