Chapter 268 Crack



In the early years when computers first became popular, ordinary people couldn't use them; only those who had studied related fields knew how to use them.

The computer's performance in their hands is still not fully realized.

Not to mention cracking or anything like that, they're all focused on developing the product, and nobody cares about the bugs in it.

In reality, we don't have the means to care.

Returning overseas students or foreign employees still need to hone their technical skills.

Fortunately, they didn't have any ulterior motives.

If he had the same ambitions as the top hacker in the United States, he probably wouldn't have come to China to earn a meager living.

Xing Baohua demonstrated two methods of cracking the code. One method involved using a data cable that was placed close to the data source, while the other involved using a magnetic device for remote control.

This technology is equivalent to someone tampering with our ATMs. When a customer inserts their card to withdraw money, the card is copied using magnetic stripe technology.

This technique requires a disguised device to be used.

In other words, when a card is inserted, it does not actually enter the machine, but rather enters a disguised device.

It's a bit complicated, but it's not difficult to operate at all.

As the saying goes, what you know isn't difficult; what you don't know is difficult.

More and more people gathered in the cafeteria, and seeing Xing Baohua's perfect performance, they all began to applaud him.

Taking this opportunity, Xing Baohua said to the research and development team, "There is no perfect lock in the world; someone will always be able to open it. I will tell you the cracking techniques I know. The rest will require your continued refinement."

I won't go into cracking the access control system; that's even simpler. There are many similar methods. Therefore, when you're writing programs, pay close attention to bugs. Otherwise, some people can write small programs to scan the system by exploiting vulnerabilities.

After Xing Baohua finished speaking, a foreign employee asked, "Sir, can we use a password to set up the defense?"

"Yes, but it can still be cracked. Whether it's a four-digit or six-digit password, as long as you have a high-performance computer, a program can sort and combine the passwords. If it's an eight-digit password, with the current level of computer technology, it would take a year to combine them. But it can still be cracked."

Xing Baohua said with a smile, "When it comes to cracking combinations of numbers or letters, the computing power of a computer CPU is still a bit lacking."

Even if it's not perfect, it can still be cracked.

Xing Baohua had played hacked games.

Back then, when he was working overtime at night and was bored, he would watch some short videos online.

The company's internet speed is high, but the configuration is only average.

Many downloaded videos are in compressed files, and what's even more infuriating is that they don't have the password?

The more it's locked, the more I want to see it.

Most people would have already searched for tutorials online.

It has tools for cracking compressed files, various small tools, and password dictionaries.

This is a brute-force attack. They used dictionary sorting and experimented with different passwords over and over again.

This is where the computer's computing power really shines. A supercomputer could crack it in seconds or minutes.

However, for ordinary machines, simple passwords are fine, but if the number of digits is too many, even if the machine is broken, it may not be able to crack it.

If the host has a dedicated graphics card, then it's a different story. You can use homemade cracked software or download a tool from a tech guru to improve computing power by using both the CPU and GPU.

Alternatively, you can use the graphics card alone for computation, which is many times faster than using a CPU alone.

With the continuous upgrading of computers, unzipping files has become much simpler.

If a machine in this era were to decompress a file, it probably wouldn't be able to even smoke out of it, unless it were a simple 4-6 digit file that couldn't contain any letters.

Xing Baohua also experienced a hacking incident, specifically the cracking of a Wi-Fi password.

This is much more difficult than compressing a file. The relationship password combination is 8 digits.

It also supports special alphanumeric combinations.

Cracking it would take a long time using a home computer.

Of course, with the advancement of technology and the advent of wireless Wi-Fi, computer performance was already quite advanced.

However, cracking it is still very difficult.

There are several steps involved in cracking the program.

The first step is to handle the data packets, which requires a specialized program to capture them.

There's a really weird and shady trick involved in packet sniffing.

This will cause the router to keep restarting.

If a household is using the internet, the device will scan for wireless router device information, and some devices may require a restart to capture the information.

It makes internet users wonder if their equipment is broken, and why the internet keeps disconnecting.

If you find your network connection is frequently being scanned, you need to log in to the router to see if any other devices have scanned it. Those who know what they're doing will check the device logs.

If you don't know anything about this, check if any devices are connected after disconnecting from the internet for about ten minutes. Or, just change your password.

There's a piece of software created by a genius called "Milk Bottle." It's a powerful packet sniffing tool. If you feel your computer has good performance, you can use Milk Bottle to access Wi-Fi for free.

The Wi-Fi network that Xing Baohua cracked was a bit more complicated; the key password combination was uppercase and lowercase letters plus numbers.

With his laptop at the time, it would have taken him three or four years to complete the calculations.

In the end, we found a friend who works with graphics, and with his powerful dual-graphics card, it took seven or eight hours to crack the password.

While the employees were all present, Xing Baohua explained many methods for cracking passwords and asked them to think for themselves how to strengthen their security.

After a while, Xing Baohua wanted to install several queuing machines for the bank, and even wanted to install ATMs.

This necessitates a robust digital encryption protection system.

This chapter is not finished, please click the next page to continue reading!

Continue read on readnovelmtl.com


Recommendation



Comments

Please login to comment

Support Us

Donate to disable ads.

Buy Me a Coffee at ko-fi.com
Chapter List