Chapter 1859 is specifically targeted at Clover
After the incident, Hu Tianyu and the others discovered the viciousness of this hacker. He used JDKNOTEPAD to make the programmers of the Clover Group develop a thoughtful and repeated request , failed to allow them to develop "good programming habits" and make the program extremely standardized, especially the comment part.
Originally, during the program compilation process, this kind of information should not be brought into the execution code, but JDKNOTEPAD does not directly prohibit it, but gives programmers an option. You can choose to "bring Compile with comments" and "Compile without comments".
Originally, even if this is the case, it is generally necessary to use a disassembly tool to recover the information, but this is not the case with JAVA. It has many "thing classes" nested on the web page, and in order to facilitate developers to modify and For research, you only need to use the "Learning Toolkit" and "Developer Tools" that come with the browser to read these things.
Many of these things are actually gadgets written by developers using JDKNOTEAPD for their own convenience. They often forget to turn off comments during development, so this information becomes hidden information on the web page. Part of it appears on the web page in the form of clear text. Anyone only needs to right-click on the web page, select developer tools, and then read this information openly in a constant called creator.
The most terrible thing is that the structure of this information is exactly the same as the structure of the creator information in any other program developed with JDKNOTEPAD assistance.
Among these messages, there are often phone messages and email messages left by programmers.
Almost all developers of Clover Company use the KouKou email address, and this KouKou user is also the user alias they use to log in to the Clover system.
In order to facilitate the programmers of the Clover Group to work in other places, the group has a remote login mechanism, so the hacker collected a bunch of user IDs of Clover Group programmers and constructed a super long While entering the user number, he also used an overflow vulnerability to change the password verification failure return to a successful return. Then he used a no-op sled to find the return address, and sent the success information back to the return address, successfully hacking into Yotsuba. In the internal system of grass.
After that, this trick was used all over the world. After becoming familiar with the development mechanism of the Clover system, the hacker continued to use this vulnerability to try to obtain more advanced system permissions, and eventually used the same highest-level system as Zhou Zhi. The data structure is sent to the database, adding an additional advanced user to the system.
After learning about this hacker's operation, Zhou Zhi's heart completely died.
This kind of hacker is very scary, because ordinary hackers will not be so targeted. They will only stay in exploiting operating system vulnerabilities and do things at the operating system level, but will not hack into the computer. application system level.
Because application systems are installed independently and have nothing in common, most machines are different. To achieve the greatest attack effect, hackers must of course focus on the operating system as their primary target.
Once the crack is successful, all similar models and operating systems on the network can be cracked using this method. Compared with targeted cracking of a certain application system, the destructiveness and influence are obviously greater. .
This hacker targeted the Clover Group's system in such a targeted manner. It was clear that he was no longer an ordinary hacker, but the kind who specifically struggled with the Clover Group.
After listening to Zhou Zhi's inference, Hu Tianyu was silent for a moment, and then said: "Elbow, actually... we found that this hacker does not seem to be interested in the Clover Group, but... is more interested in you?"
< br>"Big head fish!" Zhou Zhi was really angry: "This is imminent!"
"Really, really!" Hu Tianyu was frightened: "We have studied the activities of hacker users. Found...he is only interested in the projects you host, and there is He has visited your information several times, as well as some of your paper links in the system. Although he has erased these access records, Nuwa has left all the information here.”
Zhou Zhi took a breath : "Then has he visited other places?" "Well...it seems not. Also, his activity time is usually shortly after you go online, and the fox even joked that this person might be your fan..."< br>
"Stop talking nonsense! Now you wait for me to rush back. It will take about two hours to log into the system." Zhou Zhi said immediately: "Today is the weekend. This week's disaster recovery data will not be imported for the time being. There are still five days until next weekend. Time, in these five days, let’s not alert the snake, but try to find out this person’s identity first!”
“Yes!”
Hang up the phone, Zhou Zhi realized that he was The beating made my ears feel hot. Turn to the other side. The worried people said: "Something happened at Shudu School. I have to rush back to deal with it. Grandpa Chiri, I will trouble you to take them home soon. I have to leave now!"
"Then you Ride my Bai Feng!" Lao Chiri didn't talk nonsense: "Get down and hold me while we cross the suspension bridge. Don't be anxious for a while."
"I got it." Zhou Zhi got on his horse. As soon as he caught the horse's belly, he ran towards the way he came.
"I'm a graduate student at Shu University. Why can the school be in such a hurry? It just sounded like there was a problem with some computer system?"
"The computer skills at Shu University are pretty good, especially the word system processing. They are world-class in terms of teaching, they are liberal arts students, and their computer skills are so high..." Liang Guangping and Liu Hongtao are both enthusiasts of information technology, and their skills are quite good, otherwise they would not be assigned to the information department of the scientific research base. Liang Guangping suddenly reacted when he thought of the technical level that Zhou Zhi had demonstrated in front of them: "Being proficient in both arts and sciences is in line with Shu University's strengths in information technology, isn't it? Maybe he has also participated in their school Some computer engineering projects."
"I hope it won't be a big deal. Otherwise, we can go back and have fun. I won't worry if I don't go back and take a look." Li Lu said.
“I’m not busy at all.” Lao Chiri sat down cross-legged: “Today I specially broke stones to make fire to raise the fire pit, and also brought a sheep fan to cut the bones and meat to eat... It must be God’s will, good boy Girl, come and record it. "
"Eh!" Li Lu has been at the grain station for a long time and knows how Zhou Zhi and Lao Chiri get along. Lao Chiri usually doesn't deliberately show off his "intangible cultural heritage" skills. It's just a coincidence.
And Zhou Zhi did not force it, he just waited patiently for the opportunity, and only recorded it when Lao Chiri was willing to demonstrate.
I saw Lao Chiri reciting a mantra while pulling off a piece of moxa head from the fire stick.
The fire was not extinguished at this time, and the temperature of the moxa head was actually quite high. When the old red sun pulled it down, it also brought up a bunch of flying sparks, which was really beautiful.
Amidst the attention of everyone, Lao Chiri took out the sheep shoulder blade that had just been shaved cleanly by Zhou Zhi, and licked the sheep bone with his tongue. Dip moxa on the thin area.
Then Lao Chiri continued to chant, and gently waved the sheep's shoulder blade, and some white smoke rose from the mugwort head.
The three little ones looked at each other, suddenly remembering that this was a huge burial place for the Qiong people, and couldn't help but feel horrified.