HK Cybersecurity House.
After getting used to the higher-spec computer, Xiao Tianna found that the speed was only slightly faster than before, and he could install more software.
Once you're used to the old-fashioned mechanical keyboard, using a custom-made one feels a bit awkward.
Geng Rui familiarized him with many software programs, including virus tracking, network protocols, and IP address analysis.
They even made him register an ID on the HK forum.
After thinking for a moment, he used "Xiaoxiaotian," which was similar to his real name.
No one would have guessed that this guy simply added a character before his real name.
He quickly became familiar with various software programs, thanks to his technical foundation.
He then discovered a major vulnerability in the HK forum. The forum was built on a server system. The server system is the infrastructure for the operation of a website or forum.
It not only processes and stores website data, but also receives requests from users and returns website content.
The server operating system is the foundation of the server software environment, and the database it stores is used to store and manage data in the website forum, such as user information and post content.
In addition, the application program is the software that enables the specific functions of the website forum, such as posting and commenting.
The vulnerability discovered by Xiaotian was not accessible through senior administrator privileges, but rather through a forum address, allowing access to the server for cross-site scripting attacks.
This makes it easy to bypass permissions. In other words, by finding this attack method, one can bypass the senior administrator status, enter the server system, and change or control the forum's permissions.
A malicious click could change the administrator password, giving access to both attackers and forum administrators, leaving them helpless. The only solution is a restart to buy time to regain control.
Xiao Tianna figured out the server system structure in a very short time.
In addition, he himself comes from a systems research background, so although there are differences, it's not a big problem.
Whether Xing Baohua obtained the utility from others or wrote it himself, it was a practical tool.
Use these Utilities to make some patches.
After I finished, I told Geng Rui that the HK forum had a major vulnerability.
After the analysis and explanation, Geng Rui asked, "If this vulnerability is released, won't a lot of trolls come in?"
“Theoretically speaking, that’s how it is,” Xiao Tian said slowly.
"Senior, write some traffic testing software, put it at the vulnerability point, test the traffic fluctuations, and you'll know how many people will get in through this vulnerability. Then, apply your patch and catch them like turtles in a jar."
Xiao Tianna said, "That's a good idea, but I need several ports of the server and the serial port protocol so that I can disguise the software without being detected."
"Okay, I'll give you the highest level of access in a bit," Geng Rui said with a smile, her eyes filled with admiration and affection.
After gaining root access and the port protocol, Xiao Tian wrote software based on the protocol's contents. This meant that all the trolls who exploited the vulnerability to gain access to the forum had nowhere to hide.
Once the vulnerability is plugged, if the other party wants to retreat, they can only quickly disconnect from the network, which means there will be no time to clean up any traces of intrusion.
With the addition of anti-tracking viruses, at least before the network is cut off, the other party can track a lot of botnets, or even the real machines.
After the hackers disconnect from the internet, they don't have time to clean up the traces. The main IP paths will appear in the logs. By searching through them one by one, you can definitely find the source.
The current method of searching is no longer done manually, but by scanning ports to find compromised machines, eliminating the possibility of compromised machines, and following the clues, which can greatly shorten the time to lock down real machines.
This secret weapon has not yet been revealed; it was developed by Uncle Qiao's team to maintain the HK forum.
Once the forum is attacked by trolls, this thing can quickly pinpoint the attacker's real device and IP address.
Of course, experts are an exception.
Xiao Tian had only ever used an internal direct network connection before, but after coming to Hong Kong, he realized how vast the external network was and how much more fun it was.
I'm very excited and passionate about writing practical software based on my own ideas. Soon I'll be able to prove my worth.
I spent more than half a day looking through the ports and serial protocols inside the server, and started coding based on these protocols. I even took some time to look at the underlying structure of the server system.
It makes it easier to disguise his program.
Even at midnight, he was still full of energy. Everyone else was exhausted, but this guy was as excited as if he had drunk a dozen cans of Red Bull!
Just before dawn, I managed to put together a tiny gadget, a few kilobytes in size, and placed it directly on the vulnerability to test traffic fluctuations.
Any attackers who gained access through the vulnerability were instantly tracked down by the virus. The virus automatically excluded compromised computers by scanning their ports, thus directly identifying the real IP addresses.
If Xing Baohua saw this, he would definitely say "Awesome!"
After resting, Geng Rui saw that Xiao Tian was still so energetic, so she advised him to rest as soon as possible.
The two discussed handing over their work. Geng Rui was responsible for monitoring his procedures, and if any issues arose, she would call him to handle the follow-up tasks.
This guy only slept for about four hours before being woken up. Now the HK forum has triggered a traffic fluctuation program, and it shows that four trolls have entered.
They've already fallen into the trap, but there's still a chance to escape.
The virus was being tracked by analyzing the botnets on a small server, the fans whirring and whirring like bugles, a sound that was quite exciting.
"Should we patch it or not?" Xiao Tian asked Geng Rui.
Once the patch is applied, the haters will realize they've been exposed.
This chapter is not finished, please click the next page to continue reading!
Continue read on readnovelmtl.com