"Yes, the system will also collect and verify the user's account and password through login instructions. If a login with a root permission backdoor password is used to replace the system's login, the attacker can not only easily enter the set password Entering the system, you can also send the login information of other users to yourself. "
"At this time, even if the system administrator changes the root password or clears the root password, the attacker can still log in to the system through the root user."
"Is the antisniffing program not working at this time?" Zhou Zhi asked, "For example, ifconfig."
Attackers usually conduct a series of attack actions after entering the UNIX system. , the most common way to prevent is to install a sniffer to collect important data from the machine or other servers on the network. By default, some system files in the system monitor system tool actions, such as the ifconfig command mentioned by Zhou Zhi. "So, in order to avoid being discovered and to facilitate sniffing by itself, the attacker will try every means to replace ifconfig with it, and even include common instructions such as ls, ps, ifconfig, du, find, netstat." Xiao Miao said: "If all these files are replaced, it will be difficult to find that rootcat is already running in the system at the system level."
"You are so cruel to start with a hero." Zhou Zhi touched Mai Xiaomiao with a cup: "What you are talking about now is attack. We are talking about how to defend and counterattack."
"I know the attack method, then You will know how to defend and fight back." Mai Xiaomiao said: "The defensive method is to plug loopholes, set up integrity checks of important files, check whether they have been modified or damaged at any time, and regularly use backup command programs to perform system command programs Replace, even if the system has been invaded by rootcat, it can be wiped out at any time."
"I have written prevention software now, and these methods have been arranged by the group. As for counterattack..."< "Yes, what I just mentioned is defense, I haven't seen the counterattack measures yet." "There are two ways to counterattack, one is passive." Mai Xiaomiao smiled and said, " Why do others invade our system? That must be to steal something..."
"How can I say that to myself? The words that steal are so ugly, so I just say I'll take them out." Zhou Zhi teased Mai Xiaomiao.
Mai Xiaomiao beat him: "Anyway, if there is an attempt, we can design some mines for them."
"Of course, it doesn't happen immediately, but leaves the back door and Evidence, fighting against hackers is a long-term process. We will not reveal that we have already countered them until the special time. At most, we will let the other party see ourselves running around and plug the loopholes, so that they can be proud first. "
< br>"This is still playing military tactics." Zhou Zhi felt that there was nothing new under the sun. Although this kind of offensive and defensive battle was posted online, the fight was still human: "This is to let them steal something , but pre-install viruses or backdoors in the things and complete the counter-killing? "
"Well, that's roughly that, the other type is real attack." Mai Xiaomiao said: "As long as it comes from the Internet, There are paths to follow for attacks, so as long as we find the other party’s address, we can launch a reverse attack. "Of course, the methods are actually all those methods, it depends on who discovered more system vulnerabilities."
"This is a bit conscience--" Zhou Zhixiao said: "Four Leaf Crocodile has developed to this day. It can be said that his familiarity with the two core systems of Microsoft and UNIX are almost top-notch. At present, it has been further penetrated to the chip level, but many things have not been disclosed to the public, but are just used as content libraries for antivirus software. Don't think I don't know."
Mai Xiaomiao also smiled, the antivirus software is R&D is also a relatively large profit point for Four-Leaf Crust. Experts are often experts in using poisons. Antivirus software researchers themselves are also quite interested in the iterative upgrade and classification research and development of virus programs, and take advantage of the opportunity to help Microsoft develop VCs. Four-leaf Crocodile has long studied various protocols and controls of the system and has mastered many bugs that have not even been known to Microsoft. These bugs can be used by Four-leaf Crocodile Group to deal with attackers at any time. weapon.
For UNIX research, Four Leaf Crust has become even deeper, and it even has the ability to develop independent intellectual property operating systems based on its core, and can also develop corresponding computing power chips based on its own system instruction set and Computing power cards can be said to be a big shot in the industry.
In the process of developing its own operating system and computing power card, Four Leaf Crull also formed its own defensive barrier. Its familiarity with several major external operating systems except Apple is much greater than that of the most familiar with the external mainstream operating systems. The external familiarity with the Four-Leaf Crocodile operating system is also where it can gain a natural advantage in cyber offensive and defensive wars.
Although such offensive and defensive wars have not yet begun, the network is not very developed now, and many behaviors that destroy systems are not particularly targeted. They mainly carry out "indiscriminant attacks" through viruses, but Zhou Zhi feels that it is better than future generations. Similarly, such an era will come sooner or later.
The two of them chatted for a while while looking at the beautiful lake and mountains, and then the topic turned back to the wedding of Wu Renzhong and Shama Ricong.
As very important guests, Zhou Zhi and Mai Xiaomiao have lost the qualification to be the best man and bridesmaid. This time Wu Renzhong and Shama Ricong are going to hold the Yi wedding. There is no such thing as the best man and bridesmaid, but it is called the wedding party and the wedding gifts. In the team, Zhou Zhi got a job. Photography, Mai Xiaomiao was just watching the fun. In order to keep her by her side, Zhou Zhi asked her to be a lighting technician.
The Yi people's marriage also depends on the wedding date. The wedding date is selected by Bimo according to the zodiac sign of the year of birth of both parties. It is generally in the golden season of slack farming after autumn harvest every year, after the eleventh month of the lunar calendar to the second year of the following year This is held during this period of the month.
The day is already chosen for them. The third day of the first lunar month is the best day. On that day, there will be six stars in the star constellation parallel to the moon, which is called "Tabo" in Yi language The solar term is the best wedding day.
This date of expectation also needs to be combined with the engagement ceremony, which is to "take a sign to marry". Wu Renzhong and Shama Ricong cannot raise pigs at home, so they picked two of them from the pig farm as one of the men and women, and took them after killing them. When viewing gallbladder and pancreas, it is auspicious to use the clear yellow color of the gallbladder and large and straight fat. If the pancreas is curled, it is bad, indicating that it cannot match.
No mistakes, one poem, one post, one content, one in 6, one book, one bar, one read!
Before the slaughter, Wu Renzhong was quite worried that the pig would ruin his big deal, which made Zhou Zhi laugh so hard. He said that pigs were raising free-range pigs in the past lacked scientific means such as vaccines. If the pigs were sick or brought by them, they would have been sick. With parasites, this is possible, but the pigs in the pig farm use scientific management methods, and they are all very healthy, so it is impossible for such a situation to occur.
Sure enough, after killing two big fat pigs, they were lucky enough to be dragged to their beach villa and courtyard for later use. (This chapter ends)