"Beijing!" Yang days narrowed eyes looked scanner submit out the form. Surprisingly little lion is incredibly Beijing, thought for a moment and secretly leave a sensitive.
Beijing, the capital of the country, each big government departments are located. If want to further know each other's detailed address, must invading information bureau view routing, but nowDon't have much time.
Yang days unavoidable some irritation, grinning HSS scold 1.
Then again take each other IP analysis again, this time featured a detailed carefully careful analysis Each other each port.
"Incredibly opened DNS (domain name) service!" Finally, in form find a can use the port, his inner thought, whether you are a veteran or otherwise, the state department or first cried you said.
Say, just open shells overflow tools, input instructions, for DNS services for covert overflow.
Shells code overflowing The attack is ongoing.
He while spare time, hurriedly check each other's what's going on. At this time, connector on only four IP, also is the only 4jr.sewing vice machine.
Don't Know is found by the administrator, or already compromised by him, mama of, still really fast!
Open the command prompt into connection interface, hurriedly take over the remaining 4jr.sewing machines, vice seriously
Check it again. But found a strange question, the other party has stopped attack.
Run? Am wondering over, suddenly see overflow attack has stopped, popup a life
Make prompt window.
Two rows of instruction, rapid input other's DNS system permissions immediately appear.
Yang days did not happy heart are wondering why ignore the other
. This overrun vulnerabilities though not low-level loophole, but the general veteran will notice.
Through system permissions CMD shells thus further get system administrator username and password.
"Encryption, shit! I said what was happening, and this guy the administrator password encryption!" double ID, A beat, added, "incredibly still added solidification shell" Yang days Lazy deciphered, then exit.
As if still no solution spirit, vigorous expletives sentence: "you * * *!"
Deciphering a encryption procedures, is not just a question of time, still have to rely on luck, condition
And the other party has solidification shell. This kind of solidification shell Yang is the day know, it is the United States an old hacker compilation and want to file shells, that your programming attainments must very violent only
Line, general shelling not this ultimate alternative procedure solidification shell.
Since the other party to call off the attacks, Yang days didn't also further deciphered, for him, take time to decipher the encryption process Sequence, absolutely is a fool behavior. One the other system without oneself want things, secondly, oneself still do not know each other in what tricks.
Want to know, long after vomit Export gas, begin to repair vice machine system, when inspection to one of the back door, vice machine found near a red icon file.
The file name: surrender! SMS Breath! (English)
Yang days the document on the delete the back door, then concealment, logging on to HK alliance BBS.
"Wai nest brother! Stop! I surrender!"
"
Wai nest brother! I have already stopped attack! Your aches, to stop to my attack!! "
"Ah! Whether you are in my DNS buffer overflow, stop! Unexpectedly
Is disguised overflow? "
"You finally stop attack!"
Yang days looked at a a lion (a lion) from the SMS, hesitated for a moment, quickly hit a few word,
Send out.
"Self-reported name! Otherwise directly home to nullify! Even if double encryption, solidification shell! Is not exceptional also!" Word is still just of words.
No comments:
Post a Comment