Chapter 1864 There is a paper


After hanging up the phone, Zhou Zhi began to think about it.

"Elbow! How are you?" Lao Chiri brought Li Lu and the others back. Liang Guangping and Liu Hongtao were supposed to return to the base, but because they were worried about Zhou Zhi's side, they also followed. Liang Guangping's feet were stiff He asked as he stepped through the door.

"It's no big deal." Zhou Zhi said with a slight sigh of relief. Although the matter was huge, after some analysis, Zhou Zhi found that Black Cat did not spy on the group's secrets. Although it created a permission that was surprisingly High-profile users lurked into the group's intranet, but did not make any major moves.

This approach is like a person who is interested in information technology, trying to verify his ideas and creativity.

"If you have anything to say, you can tell me." Li Lu's eyes showed the blazing fire of gossip: "Don't hide it from us."

"We found that the system was broken into by a hacker. Fortunately, he was too generous to do any damage." Zhou Zhi pretended to be relaxed: "But he also showed his flaws. We are monitoring him closely."

Li Lu, Liang Guangping and Liu Hongtao exchanged glances. The three of them all saw shock in each other's eyes. Grandpa Chiri's divination was somewhat effective! This first half has been calculated accurately!

"How did this hacker get in? Isn't your school's system made by the Clover Group? They make operating systems, anti-virus software, and firewalls. How can they be tricked?"

"This is a loophole left in the UNIX era. The previous chips were not powerful enough and this idea could not be realized, so no one thought it was a BUG." Zhou Zhi roughly explained the problem to the two of them. For a moment: "With computers As computing power soars, this BUG has been exploited. "

The empty operation sled needs to be set to fill a long series of empty operation instructions to occupy the storage space, and then use a counter to find the returns stored in this space. In the address field, malicious code will eventually be filled in and turned into output information to invade the system. In systems with extremely tight resources in the past, this method would be discovered by the system as soon as it was run, or even crash directly. Therefore, it was indeed just an idea before.

Thinking of this, Zhou Zhi's heart suddenly moved. He rushed to the computer and sat down. Just as he was about to log in, he stood up again: "Brother Tao, use your user to log in to the Clover Forum. Remember to use IP hidden mode."
< br>Liu Hongtao comes forward and makes love After practicing the operation, he successfully logged in in a few clicks: "Come on, what are you using it for?"

Zhou Zhi sat down again: "The hacker used stack overflow and no-op sled to successfully hack into the system. Yes, I checked the school’s information about these two kinds of entrances. Related papers on intrusion methods."

"Why use my user?" Nowadays, the networks of major campus networks can already access each other, and some academic resources have also been partially shared. This is actually It is also the alliance between the Clover Group and the Shu Kingdom. After the initial success of the interoperability project carried out by several foreign universities, other universities in the campus network joined in like fish that smelled fishy smell. Together, they established an academic website that includes data review, paper retrieval and other functions. ——Yizhi.com.

The "Academic" tab in the JAVA version of Clover Browser's search engine is actually supported by Yizhi.com.

Zhou Zhi was afraid of using his own users to query papers on these two technologies, and was even afraid that using users located in Liangshan Prefecture would arouse black cats' vigilance, so he changed users and hid the IP address.

Liu Hongtao is a person who has visited the information technology sector for a long time, and the remaining information should not arouse any suspicion.

Switching from the Clover browser to Yizhi.com, Zhou Zhi quickly retrieved several related papers on stack overflow and no-op sledding.

There are many articles about stack overflow vulnerabilities, because this overflow vulnerability was discovered as early as the DOS era, and was used on a large scale as an attack method in the Windows era, so its principle is already well known. However, there is only one paper on air-operated sleds, and it is relatively brief. It does not introduce too many technical details, but more about the possibility of such operations from the perspective of mathematical logic and microcontroller principles.

When Zhou Zhi met the author of this article, he was dumbfounded. This person was extremely familiar to him. He was even his immediate boss in all Sichuan University computer cooperation projects, Mai Mingdong, the director of the Computer Department of Sichuan University.

This is a bit nonsensical. Mai Mingdong was just elected as an academician last year due to several outstanding information technology achievements of Sichuan University, and he enjoys the State Council expert allowance. It is said that this uncle has the mind to use the novelty of operating a sled with no air. To make such a joke with the juniors of the Clover Group, that would be unless the sun came out in the west.

However, there is only one article about empty operation sleds in the entire Yizhi.com, and even Zhou Zhi suspected that the author of the paper might have decided on another name, and only used the word "empty operation" to make it vague. After searching, the culprit with the word "sled" was found, and there was only one article, and the author was an old acquaintance.

Still adhering to the idea of ​​​​hitting the pole with or without dates, Zhou Zhi picked up the big brother next to him and hit Mai Mingdong.

"Elbow! When are you going back to the capital of Shu?!" As soon as the call was connected, Mai Mingdong came over and asked in a face-to-face manner?

"Why should I go back to the capital of Shu?" Zhou Zhi couldn't help but be stunned.

“I’m almost overwhelmed right now! Count how many scientific research projects our school is currently undertaking?! How many are just related to you?!”

“ Aren't those projects being followed up? The progress is in line with expectations. Is there any system problem? "

"Uh-huh. Not really, but I still hope you can return to the Eighth Department to take charge..."

"No, no, no, no, I'm from the First Department, the Chinese Department," Zhou Zhi said quickly and firmly, even doing so. He made an oath that Mai Mingdong could not see at all: "I am already involved in too many scientific research tasks of the eight series..."

"Smelly bullshit! The Clover Group is not yours?!"

"Hahaha, Mr. Mai, do you still know that I have such a mess?" Zhou Zhi quickly lied: "If it delays my graduate graduation, then I really don’t dare to go back.”

“You bastard!” Mai Mingdong also knew about Mr. Gu. Zhou Zhi is shouldering the burden. The ancient music estimation project is a large-scale project that combines humanities and social sciences with information technology. Director Song has agreed to list it as a national key project after the preliminary work is completed. Now this kid is hiding in Liangshan The state euphemistically calls it "retreat for study". Now that Mai Mingdong has so many things to do, he really can't go to Lianhe Township to catch him.

I had no choice but to curse angrily, and then suddenly asked: "Then why are you calling me?"

"That's it." Zhou Zhi said quickly: "I'm here I saw an article on Yizhi.com about the stack overflow vulnerability of the 'empty operation sled' attack system. It is signed by you. I have some questions and I would like to ask you."

"What's the empty sled? I don't know? Are you sure I wrote the article?"

"Huh?!" (End of this chapter)

Previous Details Next