If you don't study at Peking University, you will become a soldier, and I will become an office

Chapter 152 Exploiting loopholes in the system.Advanced Hacking Redfield Skills, Scanner

Chapter 152 Exploiting loopholes in the system.Advanced Hacking Redfield Skills, Scanner

"Comrade Li Xiu, at your level, it will be a little troublesome to report."

At first, he thought that Li Xiu was just an ordinary novice, so he could tell his level just by looking at the software.

But now, a more complex test is required.

and.

At present, there are very few people in the information department, and it is in the development stage.So the section chief is also thirsty for talents.

Li Xiu's talent for appreciating food made him a little greedy.

He was thinking now, after Li Xiu finished the military academy, he would find a way to transfer Li Xiu to the information department.

It is a waste of this kind of talent to go to the grassroots troops.

As for now, the section chief has no idea yet.

At the very least, one has to go to the military academy, and being in the military academy is more conducive to Li Xiu's development.

"Come on, Li Xiu, why don't you try this?"

After thinking for a while, the section chief opened the chair and asked Li Xiu to sit on a stool. At the same time, he turned on the computer.

At the same time, the section chief opened a page, and a task list immediately appeared on it.

Li Xiu walked over and saw the above content directly.

On the side, there is also a word 'Advanced', which represents the difficulty.

Li Xiu opened the first test, and a new page appeared immediately.

"Please test the trial program, find and fix bugs that occur when the program is running."

"This one is for the test in our department. Would you like to try the first one?"

The chief explained.

Then, he said: "Because the task is relatively difficult, if you have no idea, you can try the previous task first. The previous task should be easier."

Li Xiu nodded, and said again: "No problem, but it should take a while."

"Is ten days enough? Don't feel pressured, just give it a try," said the section chief.

"That's enough." Li Xiu replied, "But now that I'm back in the army, I still need to follow up with the basic training of the army."

"It's simple, I'll just contact my superiors to second you. Moreover, without a secondment order, you can't use the intranet authority."

"it is good."

For this proposal, Li Xiu's heart moved.

I don't know, does secondment count as joining?
If you have the opportunity to drill a hole in the system.Then you have the opportunity to complete the task.

Naturally, Li Xiu agreed.

Afterwards, Li Xiu went out to explain the situation to the company commander.

Geng Jun was a little reluctant at first, and he was also worried that Li Xiu would be poached.

After all, the information department, this kind of treatment is very high, if Li Xiu is poached suddenly, he will have to die?

It wasn't until Li Xiu promised to go back after a few days of secondment that he left.

After Geng Jun left, Li Xiu returned to the computer room of the information department and started to operate.

First, I used the vulnerability scanner in the computer to scan, and as expected, no vulnerabilities were found.

Since the section chief has said that this task is more difficult, it is definitely not easy.

No way, I can only try other methods.Open the development environment software, set up the development environment, and then Li Xiu began typing codes on the mechanical keyboard.

He was an amateur hacker in his previous life, but he still remembered the algorithm architecture of the vulnerability scanner developed with his mentor.You only need to change a little content so that it can adapt to the win98 system, and it can be used.

This software is much more powerful than the vulnerability scanners publicly available on the Internet.Li Xiu wants to try to see if this model can scan out the loopholes.

At this time, Li Xiu was also a little regretful. If he joined the information department and acquired the skill of 'Advanced Hacking Red Field', he might be able to write a more powerful vulnerability scanner.

If it is seconded, I don't know if this loophole can be exploited.

If not, he can only give up.

He still decided not to join the information department because of the reward.

Li Xiu wrote the code very easily.

The information department has an independent network and a huge resource information database. Li Xiu can find some necessary technical documents, resource knowledge and tools in the resource database.

At this time, if it is a domestic network, there are not many resources, but there are many in the resource library.

About an hour later, the section chief leaned over to take a look, and said unexpectedly, "Are you writing a vulnerability scanner?"

Li Xiu nodded, and immediately said: "Yes."

The section chief nodded, he was already looking forward to Li Xiu's performance.

"No, this is a secondment notice, which is equivalent to your leave request. In our information department, we work eight hours a day. It's a little more than your free time in the company."

"Come here and sign."

Li Xiu did as he did and signed.

After that, the section chief didn't bother Li Xiu either.

At this time, an electronic voice suddenly came from Li Xiu's ear: "Look! Congratulations to the host for completing the main task, special information-based special operations, rewarding advanced hackers with red-field skills."

He was overjoyed immediately, Li Xiu didn't expect that taking advantage of the loopholes in the system really made him succeed.

After ten days of secondment, he really got a reward.

Open the panel, as he thought.

Advanced hacking red field skills, like sniping, are divided into many small projects.

Intrusion, cracking, compilation and decompilation, analysis, etc.

Each small skill has a proficiency experience column behind it.

"This is a great harvest." Li Xiu's eyes flashed with excitement.

Advanced hacker red field skills focus on intrusion and cracking.The liver is full of experience, no matter how fortified the defense system is, it can't stop him.

Of course, he needs to continue to practice to improve his experience, otherwise this thing is just a decoration.

Only by working hard can there be gains.

System skills are equivalent to a learning accelerator, and everything is based on the premise of his real efforts.

In the following time, Li Xiu basically entered the retreat mode.

Writing a vulnerability scanner is an intrusion process.

Vulnerability is a defect in the specific implementation of hardware, software, protocol or system security policy.

Hackers only have the opportunity to intrude if they find loopholes or induce defects in the system.

In the process of Li Xiu writing the vulnerability scanner software, Li Xiu's [Invasion] skill experience column is also increasing slowly.

At the same time, there is also the feedback of a huge volume of king points, as well as various intrusion methods and routines in his mind.

Li Xiu didn't have much experience in virus writing before. Now, all kinds of virus information, code writing, packing methods, etc. are all over his mind.

A virus is actually a set of computer instructions or program codes that can replicate itself.

In addition to the destruction function, there are other functions, such as monitoring, intercepting data, attacking system resources, etc.

"It's a pity that anti-tracking is not included in the advanced red domain skills this time. If I invade, I can't hide my tracks. I can only attack with a clear card. But I can buy anti-tracking skills by accumulating king points."

Li Xiu sighed.

This is a pity.It would have been nice if he had been given a red-field and blue-field spree from the start.

After thinking about it, greed is not enough.

Being able to invade is already invincible.Anti-tracking him also has a certain Honker foundation.

As time passed day by day, Li Xiu's software completion progress was also improving.

In the blink of an eye, five days passed, and the vulnerability scanner tool developed by Li Xiu was finally successfully completed.

Originally, Li Xiu estimated that it would take at least eight days to complete, but because of his improved proficiency, it took Li Xiu five days to finish writing the vulnerability scanning tool.

As the [Invasion] skill column continues to increase, Li Xiu's level in this aspect has also improved.

This software tool is more powerful than the one he developed with his previous mentor.

After that, Li Xiu immediately started to run the software and check the program.

Soon, the scanners were finding more and more vulnerabilities.

The first, the second, the third...,.

One by one, the loopholes are like mushrooms after a spring rain, and they are revealed one by one.

These loopholes are not easy to find.Vulnerability is a defect in the system security policy. The defect does not necessarily mean that there is no protection. It may be that the protection tool cannot be recognized, or the protection can be invalidated through methods, that is, where the protection ability is weak.

In short, no matter what kind of system, there will definitely be weak defensive capabilities.

The difference is that the defects are big and small.Is it hidden.

Soon, the scanner ran for 2 minutes and found four vulnerabilities.

Li Xiu didn't hesitate, and immediately started to repair.

About half an hour passed.

All four bugs have been patched.

........................

"Report."

At the door of the information department office, Li Xiu made a report outside the door.

"Come in."

The door was not closed, and when Li Quan, the section chief, saw that it was Li Xiu, he immediately smiled and spoke.

Immediately, Li Xiu walked in.

"The food in the information department is good." The section chief took a sip of hot tea, and when he saw Li Xiu coming, he immediately asked,

"The food is very good, I have eaten very delicious recently!" Li Xiu nodded.

"That's good. Tell me, what's the matter?"

At this moment, the section chief turned off the screen of the computer in front of him and faced Li Xiudao.

"Report, I've finished writing the software. Found four bugs and have patched them."

"Four places?" The section chief was a little surprised, isn't there only three places?
Could it be that Li Xiu made a mistake.

"Chief, what's the problem?"

The section chief shook his head, but did not express his doubts immediately.

"Okay, let me see."

Afterwards, the section chief came to the computer and opened the program and the vulnerability scanner written by Li Xiu.

Li Xiu was also beside him, and he also began to explain the types of computer vulnerabilities and the methods of intrusion.

For the first few days, the section chief didn't listen much.

After all, loopholes are easy to explain as long as they can be found.

What he focused on was the third one, which was beyond the scope of the answer.

And when he saw the detailed explanation of this loophole, the section chief was also a little surprised.

He didn't expect that they would ignore such a loophole when the program was running.

If the level of the intruder is very high, it is indeed possible to successfully invade through the method Li Xiu said.

What surprised him even more was that the scanner written by Li Xiu was so powerful.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like