Defect another world

Chapter 32 Finding a Needle in a Haystack

Chapter 32 Finding a Needle in a Haystack
**031 Looking for a needle in a haystack**
"How was your first day at work?"

What Meng Fei didn't expect was that Roan's WeChat avatar would actually light up and send greetings.

During working hours at the office of the bank, you are not allowed to open your mobile phone at all.

They can only contact VIP customers through the work WeChat account and operate on the computer.

But Meng Fei is not subject to this restriction.He has networking skills.The strongest BUG system in the brain directly controls the mobile phone in the pocket.

"It feels okay."

Meng Fei was actually talking about the girl beside him.

"Is the case difficult?"

Roan only cares about business.

If the experts he selected can successfully solve the case, the relationship between Mantis Software and relevant departments will be further deepened, and they will be more qualified to compete for more projects.

But on the other hand, if it is a mess, Meng Fei's loss will be small, and Mantis Software's reputation will be a big problem.

"Don't worry, big boss, I'll get it done."

Roan was taken aback.I've heard that this kid is restrained and cautious before, why is he so careless now?
In fact, for Meng Fei, this case is indeed difficult. Even if he has the system in hand, he will still have some troubles.

But always be confident in front of your boss, unless you have trouble with the future.

The case seems very simple, that is, the money of several VIP customers was somehow transferred away.

But it is complicated and complicated, and finding the real reason is like looking for a needle in a haystack.

In the past two weeks, hundreds of thousands of small funds have been transferred from the accounts of VIP customers of Golden Turtle Bank to an illegal account that has been monitored.

The bank did not immediately close the illegal account.The shutdown isn't really that big.This account is just used by the gangsters behind the scenes to collect money.

If you block this, it's not just to startle the snake, but he can go to other accounts in the future.At that time, you may not be able to monitor it.

Golden Turtle Bank's VIP customers are all big money, and they usually don't notice this small amount of transfer.

When people from the bank called to ask, they discovered that the money in their account had been transferred for no reason, and they all denied that they had ever operated it.

Judging from the system records, the money was transferred through legal operations, entering user names and passwords.

Some people will think, oh well, I'll just look up the IP addresses of these operations and find out where the operators are.

In fact, this meaning is for reference only.

Even if people don't hide it deliberately, with NAT forwarding everywhere and countless machines sharing IP addresses, it is difficult for you to locate the real black hand by IP address.

If the other party sets up a proxy to move the IP overseas, or simply walks on the street to find a wifi network and hacks the Internet, they can easily put the blame on others.

The Cyber ​​Security Section of the Criminal Investigation Bureau is in charge of this case. They have already investigated the information and sent it to Meng Fei's mailbox.

Meng Fei browsed through them one by one.It can be seen that, at least superficially, the machines that initiate the operation are the clients' own computers.

Since these computers are all owned by the user, and the user has denied operating it, there is no clue.

This is a real veteran, a veteran who doesn't leave a trace.

Even if you can find an overseas proxy server, at least I know someone has done tricks.

If only VIP customers really leaked their passwords and were operated by others in different places, it is not a serious problem.

But within two weeks, the account numbers and passwords of hundreds of VIP customers were leaked at the same time, which is a bit scary.You don't even know how much leaked out.

The account list of VIP customers is only kept in the bank.Therefore, even if we don't say how the password was leaked, the account list can only be leaked from the bank.

If there is a real leak, Mantis Software can't get rid of it.The security system of Golden Turtle Bank is developed and maintained by Mantis Software.

Because of this, the bank asked the Criminal Investigation Bureau to invite an expert familiar with Mantis Software to participate in the investigation.

This is none other than Meng Fei, who just took office.

His task is not to catch the person behind the illegal money transfer, but to find out how the bank accounts of VIP users are leaked.

A task of finding a needle in a haystack.

But VIP account managers are the biggest suspects.

Because there is a huge pit here, and it is also the weakest point of the whole system.

The computer of the VIP account manager can access the information of VIP customers from the server, which is necessary for their operation.

Just to prevent account managers from leaking this information, the security system uses various technical means to protect them, so that they can only see the necessary information, and it is difficult to copy or send it out.

If there is a way to break through the constraints of the security system, it is possible for account managers to obtain this information and sell it to the black industry.

This is not to say that leaks are impossible in other ways.It's just that in Meng Fei's experience, the bad guys always choose the easiest part to start with with a high probability.

He must first be familiar with the operation routines of VIP account managers, and then analyze step by step whether there is a chance of breaking through the shield by chance at each step.

Even if it is not on the surface, if you look at every line of code, every instruction, the vulnerability may be hidden.

Perhaps normal operations cannot be triggered, and some special actions can be used to expose them.

For example, in his previous life, there was a very strange loophole in Windows.

When you log in, you have to enter your username and password.Later, someone discovered by accident that switching the input method when entering the password can skip this step.

The password restriction has become like a fake.

Maybe the source of the leak is that an account manager accidentally did an uncommon operation, only to find that he could see the VIP user's account list and download it?
Meng Fei did not need to analyze step by step, he directly called up the BUG system in his brain.

"Scan for all vulnerabilities that could expose a list of VIP customer accounts."

At this time, he could feel countless codes and logics running through his mind like lightning.

In the first few times when he used the strongest bug system, he didn't have this feeling, and everything passed without awareness.

It can be felt now because as the level increases, his control and understanding of this power from the system is getting stronger.

He could feel the powerful computing power from nowhere, analyzing every bit at an incredible speed.

Eventually a series of vulnerabilities were listed.

I saw him shaking his head again and again.

It's not that these vulnerabilities are unavailable, it's that they are too difficult to use.

If you get a development team, you might be able to take advantage of one or two of them after a few months of hard work.

A VIP account manager sitting here empty-handed and alone, trying to exploit these loopholes to get a customer's account list is absolutely impossible.

But the result of his analysis this time can only confirm that the client in front of him and the server connected to this time have no problem.

He didn't know if other machines would be different.

In theory the software on these machines is the same.

But no one knows whether different versions of the patch will be installed on different machines, or simply installed by an insider with a Trojan horse that directly destroys the security system?

He intends to analyze all the machines used by VIP account managers.

This is not enough to install an antivirus software and scan it once.

Antivirus software can only recognize the viruses and Trojans it recognizes.If you write a program that looks normal to "steal" the information that is already on your machine, there is a high probability that it will be ignored by antivirus software.

What he needs to scan is all the code that might be running on the machine, whether it's a virus or not.

He has to know their origin, purpose of operation, specific behavior, and whether there are loopholes.

The equivalent of a comprehensive security test of a whole bunch of unknown software.

This probably involves more than 300 computers in the account manager's office on this floor.

Before the change, even if you don't count the time to develop scanning tools, it would be good to be able to get ten units a day, and this work should be done for at least a month.

But now he can directly use the BUG system to scan one by one.

Of course he doesn't walk around in front of every computer to cast his "magic" in full view.And it's not that tight on time.

He would do it when everyone was off and at night in the dead of night.

So for the rest of the day, I just hang out on the website and flirt with girls on WeChat.

The working hours in the morning always go by exceptionally fast.Especially when sitting next to a beautiful female colleague.

At this time he heard a gurgling sound.

He lowered his head and whispered to the girl beside him:

"Your stomach is ringing."

Xiao Han, who had been busy with work and forgot the time, realized this, and her fair face suddenly turned red.

"Yeah, I'm so sorry, I almost missed the meal!"

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like