Chapter 252 God-level hackers appeared, and the scene began to be chaotic!

(2 more, please order all!!)

The young man nodded and explained: “If you want to solve it, you need to know its causes and hazards before you can take corresponding preventive measures.”

Guan Yiping glanced at the technician behind him, and the other party quickly took out the equipment and started recording.

Guan Yiping nodded in satisfaction, and then motioned to the young man to continue.

“XSS is a very old vulnerability, but it is still ubiquitous on the Internet.”

“XSS is a worm virus, it will amplify, with XSS worm, like Bib, Du Niang Tieba, this worm case has happened.”

The youth gestured and continued: “For example, if a hacker sends a book review or other virtual plug-in link, there will be malicious code in this link.”

“For example, I just saw it in some book review sections. If I saw this comment and didn’t reply, I would all share the wen! brushed with Cai Kunkun; or abusive remarks, which can attract the attention of other readers and subconsciously respond. ”

“When the reader accidentally clicks on the content or link posted by the hacker, these 07 codes will make users post the same content themselves, and this malicious code will also be posted here.”

“In this case, the book reviews containing malicious code will increase exponentially, so a large amount of outbreaks can be obtained in a short period of time. This is a very harmful attack method for the novel network.”

Having said this, the young man paused and gave the technicians behind Guan Yiping time to think.

Afterwards, he continued.

“In addition, the XSS distributed service attack is also a very deadly hacking method.”

“When a reader visits Wuxian Novel Network during a certain traffic peak period, for example, when opening a book to read, the reader’s browser will automatically execute the hacker’s command.”

“The hacker’s order, you may want him to ask for the target website-Wuxian Novel.com, and send the request in one second!”

“If, at the same time, there are 100,000 readers reading novels online, it will increase exponentially, so as to achieve the purpose of stopping Wuxian Novels.com.”

“In the case of hacking attacks, there is a name called-watering hole attack!”

“For example, if a hacker wants to send a connection to Wuxian’s internal network security technicians, the normal operation is to completely blacken the entire Wuxian and take out the other party’s information from the Wuxian background!”

“But this is a bit cumbersome, and the dynamics are big. The technicians themselves have a certain degree of strength, and the gain is not proportional to the effort. Then, the hacker can change his mind.”

“Technicians will maintain the website every day, then, directly implant XSS in the website! Let those readers be recruited first. Then, when a problem occurs, the technician will check the website.”

“During the verification, he took advantage of the server’s vulnerabilities and he was hit by XSS inadvertently! In the process, not only the technician was affected, but all the other technicians were also affected.

“Because the server itself has loopholes, even if it is patched, as long as it is not a targeted patch, it is useless.”


“Inject malicious code into the server or website at random, and when the technicians do not respond, it is easy to hack all the anti-intrusion mechanisms of the website.”

“After that, all user information may be leaked.”

“This, in some black industry chains, is already a well-known secret.”

“More importantly, as long as you don’t clean it up, this thing will always exist on your website, and one day you will be hooked.”

The young man explained patiently.

Of course, he did not elaborate on many things. Including his own ability to successfully invade within ten seconds.

That is his technology, if you say it, it will depreciate.

As the young man gave a detailed explanation, those technicians suddenly realized that they began to discuss some coping strategies with him.

Many small and medium-sized enterprises are also tempted to see the smooth progress of the surrounding companies.

The biggest difference between small and medium-sized enterprises and large enterprises is that their Internet security technicians, no matter their experience or strength, are difficult to compare with large enterprises.

Ding Yuan of Du Niang, Brother Dao of Ebao, and Penguin are well-known people, and ordinary small and medium-sized enterprises are welcome.

Because of this, they intend to take this opportunity to let those hackers help deal with some problems on some websites and new products. It would be great if we could recruit a group of talents.

All of a sudden, the auditorium began to become lively.

A large number of hackers, invited by those people, began to operate.

However, those big Internet technology companies did not speak.

However, they acquiesced to the communication between their internal technicians and those hackers.

Similarly, there are some arrogant Black Rong customers who are indifferent to the solicitation of other companies.

They are waiting for the arrival of the “God-level hacker”. They want to know whether “God-level hackers” can afford the title of “Godfather of the new generation of hackers”!

They did not participate in the last live broadcast, so they remain skeptical about “God-level hackers” in their hearts.

If it weren’t for the support of top technicians such as E Baodao and Du Niang Dingyuan, they would not even visit this place in person.

Those who have the same idea as them are the bosses of those big companies.

It is better to find a general to find a hundred soldiers!

Warriors, with their financial resources and appeal, are not lacking at all.

The hackers underneath may be supernatural or pretentious, but they have not seen the true record of the other party. So, naturally, I don’t care too much.

Moreover, their company has no shortage of talents.

On the contrary, at the Fifth Internet Security Conference, they heard about the legendary story of “the god-level hacker”, and they were also very curious about him in their hearts.

They also want to see if “God-level hackers” are unpredictable as rumors.

E Baoyun always glanced at Wu Qing and asked, “God-level hacker, haven’t he arrived yet?”

Hearing this, Mr. Penguin Teng and Mr. Du Niang Li on the side pricked their ears and listened.

Wu Qing shook his head and said helplessly: “We can’t contact him, we can only wait for him to contact us.”

“However, he said before, it’s almost there, it’s almost there.” Wu Qing sighed helplessly.

“It’s okay, don’t worry, it’s still early.”” Mr. Yun dealt with it, then turned his head and discussed with Mr. Teng and the others.

But at this moment, suddenly

The hackers sitting still and watching coldly, one of them’s cell phone rang.

“D.”



The person frowned slightly, and turned on the phone with some surprise.

Seeing the content of the text message that popped up on the phone, his expression suddenly changed, his eyelids jumped. In his heart, stormy waves have already been set off.

“Someone is black! It’s me! Hand! Machine!” He gritted his teeth and said every word. .

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like