My black technology plug-in
Chapter 94
At the end of the day''s work, Qin Jian returned home. After dinner, he came to the study.
There is a high-performance computer in the study, and there is only one keyboard on the round desk.
Qin Bamboo Slips started the computer, and then an arc display screen with a length of about 2 meters was projected on the desk.
This is a projection screen made by Qin bamboo slips. Its function is not very different from the traditional screen, but it looks very cool.
The computer starts successfully. Instead of displaying the graphical interface, black command boxes are displayed on the screen.
Qin Jian began to hit the keyboard.
Bezo''s behavior this time made Qin Jian very angry. He decided to let bezo suffer.
As Qin Bamboo Slips hit the keyboard, the data on the screen flows like a waterfall on the screen. It is not good enough that the projected screen is wide enough. Qin bamboo slips can open many command lines and perform different tasks at the same time.
Qin Jian didn''t use the DDoS attack used by Liu Baoshui to deal with the super large Internet company flax line, because this method has little effect on flax line. With the scale of flax line''s global data center, even if Qin Jian launched a 100 million level attack, the DDoS attack is still too rough. As long as there is bandwidth, With server resources, it is easy to defend. There is no doubt that as the world''s largest cloud computing center, flax line does not lack server resources and bandwidth.
Therefore, what Qin Bamboo Slips need to do now is to enter the business system of flax line through the loopholes of the system and find places that can be used.
Intrusion server and intrusion personal computer are completely different. Personal computers generally use micro window systems. There are many vulnerabilities. As long as Qin Jian wants, he can come up with many vulnerabilities.
However, the system used by the server is an open-source Linux system or a customized system based on the Linux system kernel. Many people may think that the open-source system certainly has no closed system security, but the fact is just the opposite. The open-source system can be studied by all people around the world because the source code is completely open, Almost every line of code will be continuously optimized to make the system more and more secure. There are almost no vulnerabilities at the kernel level.
Moreover, with more and more companies using Linux, the Linux system becomes more and more secure. It is almost impossible to find a system level general vulnerability like the micro window system.
However, any system has vulnerabilities, including the Linux system. Although the kernel of the Linux system has been optimized by countless engineers around the world, the software running on the Linux system can not guarantee that there are no vulnerabilities, especially those systems with deep customization of Linux.
This is like many honest and upright officials in TV dramas. They are upright, not corrupt and not accepting bribes, but he can''t guarantee that the people around him are the same as him. For example, his parents and brothers are not greedy. Many honest and upright officials are so implicated by the people around them.
The same is true for breaking a system. It is difficult to find a place to start on the system kernel, but the software and services running on it are incomplete, with fatal vulnerabilities.
Qin Jian''s technology can be said to be the world''s top, and it''s not too much to say that he is the strongest hacker. However, it''s also difficult for him to find obvious exploitable vulnerabilities in the kernel of Linux system. After all, this is a kernel optimized by countless people around the world. So what Qin Jian has to do now is to analyze all kinds of services provided by linen server one by one, It is expected that vulnerabilities can be found in these business software.
The most important thing about digging loopholes is to be patient and careful. Qin Bamboo Slips undoubtedly have these two qualities.
For the next ten days, Qin Jian also went to the company. In addition to eating and sleeping every day, he was studying various services provided by flax thread.
The projection screen in front of him has changed from one floor to four floors. Sometimes Qin Bamboo Slips need to look up to see the information displayed on the top screen.
Suddenly, Qin Jian smiled at the corners of his mouth. After more than ten days of analysis, he finally found an exploitable loophole in the trading system.
It has to be said that the technology of flax thread is really strong. It took more than ten days to find such a valuable loophole with the technology of Qin bamboo slips.
Qin Jian leaned down on the chair and stood up immediately.
After fighting for more than ten days, he didn''t have time to manage personal hygiene. Now that he has found a loophole, Qin bamboo slips are not in a hurry.
He came to the bathroom, took a hot bath, repaired his beard, changed into clean pajamas, and then ate a meal. Then he returned to the study. At this time, he had figured out how to use this trading loophole to launch a fatal blow to the linen line.
Finding a vulnerability does not mean that you can attack immediately, but you need to design the attack steps, write the programs you need to use in the attack process, and various auxiliary gadgets.
Qin Jian''s hands kept beating on the keyboard, and utilization programs were written one by one. These programs can be said to be special. They can only target the current vulnerability. Changing a vulnerability or changing an environment will fail.
The development process of the program does not take much time. What consumes more time is the program design ideas, logical relations, and the problems that may occur in the whole attack process. Therefore, Qin Jian stops from time to time, thinks about it, and then starts.
Three days later, Qin Jian knocked down the last character, then compiled the program, looked at dozens of vulnerability exploitation tools in the folder, Qin Jian smiled, finally completed the tool chain, and then exploited the vulnerabilities.
Qin Jian stood up, moved his body and looked at the time. Around 7 p.m., the time in meiqu is 7 a.m. very good. This time is very suitable for launching an attack.
Qin Jian sat down again and knocked down the first command in the black command box.
【sb-p-r】
Enter, then the cursor flashes a few times, and a new command box pops up.
At this time, Qin bamboo slips have successfully entered the global online trading system of flax line.
It seems that there is no display, but the intrusion is like this. All the work has been completed in the early stage. The actual intrusion process is to command and start tools one by one, especially this targeted intrusion.
Qin Jian smiled and started the second program, a small program specially used to generate bitcoin accounts, which is very simple.
With the start of this program, the screen starts to swipe, and the bitcoin wallet addresses line by line are generated.
Qin Jian continues to launch the next tool to activate the botnet built before Qin Jian.
Botnets have many functions. They can not only launch DDoS attacks, but also execute various commands, or help Qin Jian hide his identity and hide his real IP address in hundreds of millions of personal computers. In this huge Botnet, Qin Jian''s instructions can be issued from any computer, There''s no way for anyone who wants to track him down.
[undead activation...]
[1 million, 10 million, 100 million.]
[scheduled quantity activation completed, performance test in progress!]
[performance test in progress...]
Qin Jian closed his eyes and waited for a while.
His next action needs some high-performance machines to help him complete the attack.
After waiting for more than an hour, all the undead performance tests were completed.
[number of undead meeting the requirements: 30 million +]
Qin Jian smiled. That''s enough.
【implantation-g-ugo】
A line of command is executed and a waterfall of information begins to swipe the screen.
【23.228.127.**ok】
【185.191.171.**ok】
【118.172.201.**ok】
【177.244.36.**ok】
【185.52.8.**ok】
【……】
After waiting for about an hour, 30 million + zombie computers were implanted with utilization programs.
Qin Jian smiled, and then there was the real attack.
The clattering sound of the keyboard rang. Qin Bamboo Slips continued to open one tool after another. The black command box on the projection screen in front of them kept jumping.
Finally, Qin Jian stopped.
On the middle projection screen, a black command box is enlarged, and line by line messages begin to refresh.
[the transaction from Paul has been executed in the amount of 155 $]
[transaction from Eugene executed for 1.8 $]
[transaction from vicberger executed for 68 $]
[the transaction from witchybea has been executed in the amount of 827 $]
【……】
Qin Jian smiled. This transaction loophole is really great.
At the same time, another command box also began to scroll, showing bitcoin transaction addresses one by one.
【1CQudwaAe2a6X83Zvz7EdRbz3PRfS3Q7Ak+0.002】
【1HnYuKz6CTgRJUgZ3YVsV4bJvMM9MQid5r+0.149】
【9G5FkNQSQASJHifGtxqT93QsFhzadtejdv+0.256】
【2PQ5M1gpKcnifNRxa12Yh33c4ZBpMjUhtp+0.500】
【tFU2srBM9DDW53a3HYiMJSmDuZF6jy5Bjs+0.210】
【……】
The transaction loophole found by Qin Jian is very fatal. Through this loophole, Qin Jian can use the money from flax line users to buy products to buy bitcoin shares on major bitcoin trading platforms. Although each transaction is very small, the cumulative amount is astronomical. After all, the daily trading volume of flax line is very amazing.
Looking at the information displayed on the projection screen, Qin Jian stood up. Now he doesn''t need to do anything. The program he implanted into the flax line trading system will monitor each transaction, and then use the deduction of bank credit card to buy bitcoin. Flax line users may be buying a water cup, a computer and a bag of cat food, The money will be displayed as received in the flax line system, but in fact, all the money they pay will be intercepted to buy bitcoin.
Qin Jian is a typical middleman hijacking attack, but Qin Jian hijacks the capital flow. This attack is difficult to be found in a short time. When the flax line is found, it is very difficult to catch it back.
After the attack, there was nothing to do with Qin bamboo slips. It was almost 10 o''clock. He washed and slept now and finally got a good sleep.