According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.
...Chapter 459 A Business Derived from a Computer Virus
Use another machine to clean up the traces and remove them.
A defense line was set up on the botnet, and a trigger-based virus was planted. The virus would be activated whenever the logs were scanned, thus causing the system to crash.
If you back up the logs immediately, there's still a chance to find them, but hackers are often in a hurry and will just scan first.
Of course, after a few lessons learned, I might back up my data first before scanning in the future.
But even so, they still fell into Xing Baohua's little trap.
When backing up data, Kazuo Fujiwara's stealth trick will prove its power.
There are two backup methods: one is remote, which involves downloading the data to a designated device and then carefully creating a virtual space for analysis.
Those who are bold enough will download it to their own devices, and these bold people usually end up in a terrible situation.
Another method is on-site processing, which involves backing up the data using other media, such as floppy disks or hard drives.
If you use it on other computers, you'll almost certainly get infected as well.
With everything prepared, Xing Baohua felt relieved. However, the question remained: who was being tricked by the buyer setting a password in their email?
It's often said that curiosity killed the cat; it's easy to get annoyed by curiosity, just wanting to know why.
Cracking login passwords is not feasible with current computers due to their excessively slow processing speed.
Furthermore, a password packet is required. The password packet consists of 26 English letters and punctuation marks.
Whether it's a 6-bit or 8-bit system, collision unlocking is required.
For example, using the Galaxy-1 supercomputer, built in 1983, as the computing power for cracking, it can attempt 100 million calculations per second. It would only take 4.08 seconds to crack a 6-digit password, 6.47 minutes for a 7-digit password, 10.24 hours for an 8-digit password, 40.53 days for a 9-digit password, and 10.55 years for a 10-digit password.
Cracking will use different password packs for different situations. In other words, the original brute-force attack is changed to trying passwords in the password pack by collision. Generally speaking, the more comprehensive the password pack, the more common passwords it will cover, and the higher the probability of cracking it quickly.
Of course, for better security, set a longer password and use a combination of letters, special symbols, and numbers.
Even a supercomputer would be a headache these days.
Unless the computing speed is increased to the level of hundreds of billions or trillions of times.
Of course, this will be easier to do later.
For example, a desktop computer with a graphics card can crack a neighbor's WiFi in about a day.
Laptops are one thing, but even a second-generation i7 CPU couldn't be hacked in a week. However, a desktop computer with a graphics card can be hacked in a day.
Because graphics cards also have another function: to concentrate performance on computation.
Cracking WiFi is one of the most common and frequently used methods of intrusion, suitable for those who want to use free Wi-Fi for extended periods.
In the past, wireless routers only had 8-digit passwords. With a good machine and high performance, it could be cracked in seven or eight hours.
If the machine doesn't work, you can only spend ten yuan to find someone on Taobao to "run the password packet." Running the password packet means cracking the password packet. Once the password is cracked, they will only tell you the password so you can log in.
First, use your computer to find the WiFi signal you want to connect to via your own WiFi. Then, use the pre-installed tool, namely packet capture software, to capture the packets.
The most commonly used packet sniffing software is called "Milk Bottle." After installation, it will briefly attack the target WiFi network, causing the router to restart twice.
When a router starts up, it actively connects to the network. If you open the network connection properties, you'll see a connection rate and packet loss rate. Therefore, the software takes advantage of this packet loss rate to capture data packets at the moment the router actively connects to the network.
This data packet contains the password you want, hence it's also called a handshake packet.
If your router suddenly restarts while you're using your computer or other devices to access the internet, once is a fluke, but twice... hehe!
Congratulations, your router is either broken, attacked, or someone is using your Wi-Fi without your permission.
Once you get the handshake packet, it's actually just a small file like a compressed archive. You need a professional decoder to crack it. It depends on how many password packets you've collected. Simple ones can be cracked quickly, while complex ones might take your computer forever to crack.
If you can get the password, you can log in to the router's backend and see how many computers or devices are connected to the internet. Then you can log in to the device you want to access using the displayed IP address in sharing mode.
This is the original method of exploiting router vulnerabilities to commit network intrusion.
Of course, this is just one method; there are many other ways to achieve the goal of intrusion.
While it's possible to crack a server's built-in password using this method, it's extremely complex and time-consuming. Furthermore, if the attacker changes the password frequently during this time, even if you obtain the password, it will be useless.
Therefore, equipment with top-notch damage control is required.
Xing Baohua continued, resting his chin on his hand, "If we use servers with extremely high computing power, then the cost will be high."
If you want something cheap, he has it! A graphics card!
If one graphics card isn't enough, then use two.
Common server motherboards have dual CPUs, but desktop motherboards can accommodate two graphics cards to form a CrossFire configuration, thus improving performance.
Current technology can theoretically achieve this, but in practice it's still lacking.
It requires the cooperation of both hardware and software.
In theory, it is a multi-GPU parallel technology that allows two or more graphics cards to work together, improving the system's graphics processing capabilities or meeting certain special computing needs with the support of the chipset.
To implement dual-card or multi-graphics card technology, support from the motherboard chipset, graphics card chipset, and drivers is required.
This chapter is not finished, please click the next page to continue reading!