Chapter 126 analyzes the disaster in the United States!

The so-called authenticity honeypot is the real vulnerability running in the real system. The purpose of installing the honeypot program is to lure hackers to invade and expose the vulnerability to hackers, so that after hackers invade, they can be better analyzed and tracked.

Honeypots are divided into authenticity honeypots, camouflage honeypots and camouflage honeypots. Camouflage honeypots also run in real systems, but the vulnerabilities exposed in honeypots are false vulnerabilities. If hackers succeed, they will end up in vain.

Outside the Ministry of defense, Yang Tian first encountered the first honeypot device. From the surface, it should be a real honeypot, but Yang Tian doesn't think so. The Pentagon is a symbol of the United States. They can't be unaware of some powerful hackers in the hacker community.

Therefore, Yang Tian believes that the honeypot may simply be an illusion. After opening the connector and running, the state on the connector.

[local, 1, auxiliary, 3, broiler, 8W!]

At present, embed the attack input device into three auxiliary machines, then use one of them to control all broilers, then run the attack input device on the machine, knock down the command, and the attack input device outputs the attack.

[broiler 8W, proposed data stream..., number 3566, under preparation...]

Crackling, another piece of code was typed in. Yang Tian gathered the prepared data stream together. Because we must be extra careful here, it is more convenient to condense the 3566 data stream into one data stream.

Lock the other party's first honeypot. Yang Tian manipulates the data flow and attacks it directly.

Crash, Shua! The data flow impacts the honeypot, and the honeypot does not change. However, the data flow manipulated by Yang Tian moves forward with the vulnerabilities exposed by the other party.

Good guy, Yang Tian didn't expect that this honeypot device had no change. He just broke in.

Just then, the words of the wind came.

"The honeypot has changed, the real honeypot has been transformed into a disguised honeypot, and the loophole has been transferred!"

When the voice fell, Yang Tian didn't dare to neglect it. He immediately destroyed all the data streams and bombed the transformed honeypot at the same time. Embed blast code.

[blasting execution, blasting execution...]

Yang Tian's data stream is not an attack data stream, so even if the blasting code is embedded, the attack power is not strong. However, he doesn't need to be strong. He needs to blast the final state of the honeypot.

“shit!”

At this time, Yang Tian destroys the original attack point in the virtual network. The wind roll destroys the original data stream. The data stream just entering the honeypot is completely drawn up by the original attack point. Therefore, when the wind roll reminds, Yang Tian directly explodes the incoming data stream.

As long as each hacker accesses the virtual battlefield, he has his own source attack point or source data stream, and Yang Tian's source attack point is made through three auxiliary machines. Therefore, as long as the original attack point is not attacked, the data flow output from the original attack point is not afraid of other threats.

An emergency like Yang Tian can blow up the data flow and completely break away from the original attack point, so the other party can't track it. But. If the other party is faster than you, the other party will trace your original attack point along the data flow before you cut it off, and then trace your real IP.

"Wind, you're better at invading. What should I do?"

Yang Tian's strength lies in attack, so he has to consult Feng Juan in terms of invasion.

"I just analyzed all the ports of the other party, and three of them are relatively weak. But if the port is impacted, the other party will notice it immediately, so we must invade from the periphery."

From the perspective of analysis tools, there are at least 7 honeypots and N traps around. Yang Tian squints and meditates for a moment, and then lights a cigarette. Take a sip. Then he responded, "I'll try to destroy the honeypot. You invade according to the trend! Be fast!"

The wind rolls for a moment and nods!

At the beginning of the attack again, the first honeypot of the other party has been transformed into a camouflage honeypot. In other words, the vulnerabilities exposed by the other party are completely virtual. The most direct way to encounter this situation is to destroy them.

Input the command and send it to the attack input device, then control the original attack point, then draw up the data flow and destroy it. We must destroy the honeypot in an instant. Since we want to destroy it in an instant, Yang Tian decides to use the annular shock wave.

Control all broilers, draw up 23W attack data stream, and then knock in the command, followed by a series of execution code. In the virtual battlefield, the original attack point immediately forms a circular shock wave.

[annular shock wave in place, target locked, successfully locked, attacking, attacking...]

Pop! The power of the annular shock wave is strong. Once it is hit, the honeypot will be destroyed immediately. However, at this time, the damaged honeypot will be transformed into a data stream.

"Come on, intercept that data stream!"

After Yang Tian screamed, the wind roll immediately manipulated the source data flow, and then prepared n-channel intrusion data flow to catch up.

General honeypots have this program. If the honeypot is illegally operated or damaged, commands and data flow are fed back to the system kernel, so that the other party can detect the current state. Defense programs like this honeypot generally have this feedback program.

If the other party finds himself, it's good. Therefore, when the honeypot is damaged, Yang Tian immediately screams, because he just destroys the annular shock wave and has no way to transfer the target immediately, so he must let the wind roll help.

At this time, in the virtual battlefield, the n-channel intrusion data flow of the wind volume has successfully trapped the command data flow just now.

However, at this time, Yang Tian's second ring shock wave has been sacrificed, locking the command data stream and bombing directly!

OK, the command data stream has been successfully bombed, and it is impossible for the other party to know the state of the honeypot. In other words, the program of the honeypot in the other party's monitoring system has been in a static state and is exactly the same as before it was damaged.

Get one. Next, Yang Tian and fengjuan cooperated perfectly. At 7 a.m., they had successfully advanced to the innermost layer of the periphery. Halfway, they bombed 48 honeypots and 236 traps in the same way.

The purpose of this attack is not to attack, but to better analyze the details of the Ministry of defense.

So in the innermost layer of the periphery, the two quickly analyzed it, Shua! Shua! Shua! A series of data on the analysis tool are flipping very fast, and the network state of the Ministry of defense is being quickly analyzed by the two people.

A relatively powerful network platform like the Pentagon can't scan it at all. It can only penetrate from the periphery to the inner layer, so as to analyze that the innermost layer is close to the port of the server.

The data was analyzed for 12 minutes. After the analysis results were fed back, Yang Tian and fengjuan left the access point and evacuated immediately.

Because there were more important things to do at noon, they didn't say much and went to bed directly.

Firefox group will test the security situation of Hualian security network group. It is said to be a test, but it is actually a provocation dissatisfied with Hualian.

This news, whether hell or HK alliance or ant Dynasty, they all know. However, the three parties do not make any comments as before.

Maybe they are all waiting for the match between Firefox and Hualian security group at 8 o'clock tonight.

However, at more than 10 a.m., something surprising happened again, and another organization registered on the official website of Hualian.

Organization (individual): free base!

Time: December 24, 8 pm!

result:

Good guy, the free base is also registered. The news excites the rookies. The free base has changed a new person in charge, lone star. I don't know how strong it is now. From the registration form, the free base and Firefox regiment will fight Hualian security group at the same time.

Free base, Firefox group vs Hualian network security group.

For this incident, the HK alliance and the ant Dynasty discussed in their respective conference rooms. Now, both the HK alliance and the ant Dynasty have developed to the largest scale in history, so the major events in the hacker community are worth participating in and discussing for them.

Information Department of Security Bureau.

The lion sat in front of the computer. The display screen was the official website of Hualian network security group. Behind him, Jiang Peng and Yunfei stood side by side.

For a few days, Jiang Peng still refused Yunfei access to the computer. He only allowed him to watch, analyze and participate in discussion, but not in action.

"Group leader Jiang, it seems that Hualian will be robbed this time!" The lion hit the keyboard for a moment and said.

Jiang Peng remained calm, "Firefox regiment, free base, Hualian security group!" Then he suddenly turned his head and asked Xiang Yunfei, "Yunfei, what do you think?"

Yunfei stared at the display screen and responded calmly, "I don't know the strength and status of the three parties, so I can't draw a conclusion!"

The lion then stood up and smiled, "now we only have some basic information in our hands, and the detailed information is being collected. Firefox group is a terrorist group. The person in charge, Firefox, has few members, only 120 people, but 120 people are black guest experts!"

Then he paused. The lion glanced at Jiang Peng, who nodded. He didn't know what code they were playing.

Then, the lion continued, "the free base is not the free base before. As far as we know, behind the organization is a business organization, a global chain organization! That's all I know about the specific situation!"

The morning passed like this.

However, the United States has ushered in a great disaster! The disaster is approaching like a tsunami!