©WebNovelPub
MTL - Into Unscientific-Chapter 436 Another Battlefield (Part 2)
Chapter 436 Another Battlefield (Part 2)
The Xiao Wang that Zhan Keren spoke of was obviously Wang Qingchen from the Network Security Center of HKUST.
As the current top expert in network security in the Academy of Sciences, this time he was also transferred to the conference site to assist in security.
I saw him quickly block a round of attacks, and at the same time said:
"The attack intensity is very high. DDOS, CSRF, and SYNFlood attacks are all launched. We just defended against a very strong attack five minutes ago."
"If there is no accident, we should usher in the next round of offensive within five to eight minutes."
"If we hadn't prepared a defense system a few days ago, I'm afraid we would have to fight the opponent with bayonets now."
Zhan Keren immediately became more serious when he heard the words, and asked:
"Xiao Wang, can you hold on?"
【Can you hold it】
be honest.
In the past six months, Wang Qingchen has heard this sentence more than once.
Whether it is the live broadcast of HKUST cockroach disinfecting.
It was still the day when the product 'One Mantis Killer' was first launched.
Or the site of HKUST Public Opinion Press Conference.
Different people asked this question to Wang Qingchen.
Wang Qingchen's answer every time is very firm 'can', and he has indeed fulfilled his promise.
But this time.
He was a little unsure.
This time, the network security team of the Academy of Sciences was divided into two groups, A and B, according to individual abilities and coping styles.
Group B has a large number of people, about a hundred or so, defending in the Rongcheng Center, a well-known national supercomputer in Rongcheng.
They are mainly aimed at ordinary attacks with high traffic but relatively low technical skills, such as conventional DDOS, and their function is mainly to intercept traffic.
In game terms, it is used to clear mobs.
As for the A module.
is a 'special warfare' team composed of Wang Qingchen, Xiao Rong, and elites from the Information Institute of the Chinese Academy of Sciences.
There are a total of 31 members in this group, all of them are big men with plaid shirts with high hairlines and no borders.
You can say this.
Except for those masters who have retired or worked in private companies, the top hackers in the domestic physique are gathered here.
This is a lineup that can be called the top match in the cyber security circle, and it can theoretically crush 99.99% of opponents.
But the problem is
What Wang Qingchen, Xiao Rong and others are facing this time is the 0.01% headed by the opposite side of the sea.
It can be seen from some habits that many of them are old acquaintances of Wang Qingchen or Huaxia Hongke.
even
Wang Qingchen was still in an attack, and vaguely caught a glimpse of a figure that should not appear on this occasion:
Eric Raymond.
According to some details.
Basically, it is possible to rule out the possibility that his apprentice or grandson participated, and it is 100% that he personally ended up.
This big boss was pulled out, which shows how many strong soldiers have been invested in the opposite side of the sea this time, and how determined their attitude is.
without any exaggeration.
This is the official confrontation of the highest combat power between the two sides.
Except for the bear next door, no country can qualify to participate in either side of the two nowadays.
So to be honest.
Wang Qingchen really doesn't have much confidence to defend the opponent—after all, attacking is easier than defending.
But at this juncture, he is not allowed to say dejected words, so this well-known celebrity who looks very literary suddenly gritted his teeth, and said with a straight chest:
"No problem, Director Zhan, don't worry, I won't let those guys ruin our live broadcast!"
After making a promise to Zhan Keren.
Wang Qingchen immediately put his mind on network security maintenance.
Papapa—
The security center is filled with the sound of keyboard tapping, and the outside world seems to be full of invisible swords and swords behind the seemingly quiet live broadcast.
After terminating a computer worm attack, a somewhat hoarse male voice suddenly came from Wang Qingchen's side:
"Brother Yi! The TCP connection has been attacked, and the program keeps returning ACK messages!"
The speaker was a middle-aged man with dark circles under his eyes, his hair was disheveled like a bird's nest, and he was clearly a middle-aged Internet addict.
What he called out was not Wang Qingchen's name, but Wang Qingchen's code name in the Honker League:
Wings of Chaos.
That's right.
This person was also one of the members of the Honker Alliance back then, and participated in the Sino-US hacker war that year.
Or to be precise.
Of the 31 people present, more than 60% were members of the Honker League.
The remaining part basically overlaps with Wang Qingchen, Xiaorong and others.
Either they are the apprentices they personally brought up.
Or have studied their courses.
This is actually quite normal.
After all, the top hackers in the country entered the Sino-US hacker war at the beginning, and there were not a few of them who were included like Wang Qingchen.
Even Xiaorong is no exception—he has been working for the country for 15 years, and then he was recruited by Xu Yun to Huadun Biology.
Heard the news from the man with dark circles.
Wang Qingchen immediately started to defend.
TCP problems belong to the category of SYNFlood attacks, that is, flood attacks, which are much more difficult than simple DDOS attacks—of course, this refers to DDOS attacks below a certain level.
Students who have been programmers in this life should know it.
Usually the establishment of a TCP connection includes 3 steps:
The client sends a SYN packet to the server;
The server allocates certain resources and returns a SYN/ACK packet, and waits for the last ACK packet of connection establishment;
Finally, the client sends an ACK message.
In this way, the connection between the two is established, and data can be transmitted through the connection.
The process of SYNFlood attack is to frantically send SYN packets without returning ACK packets.
When the server does not receive the confirmation packet from the client.
The specification standard stipulates that the SYN/ACK request packet must be resent, and this entry will not be deleted from the unconnected queue until it times out.
SYNFlood attacks consume CPU and memory resources, resulting in excessive system resource usage, inability to respond to other operations, or failure to respond to normal network requests.
At the same time, because TCP/IP believes in the source address of the message.
The attacker can forge the source IP address, which makes it very difficult to trace.
It is impossible to disconnect the network during the live broadcast, so Wang Qingchen and others must solve this problem before the server is overloaded.
Wang Qingchen first used the netstat-na command to check the connection status of the lower ports, and found that the queue was filled with a large number of semi-connections, and the destination port numbers were all uncommonly used port 23.
See this scenario.
Wang Qingchen quickly established a gateway timeout setting and increased the maximum half connection to strengthen the TCP/IP protocol line.
influenced by.
Part of the external video signal paused, the screen went black for a full 6.7 seconds, and question marks flashed across the live broadcast platform instantly.
Fortunately, this pause did not last long, and Wang Qingchen took this opportunity to complete the setting of the filtering gateway.
Attack suspended for now.
But before Wang Qingchen had time to take a breath, another exclamation came to mind:
"Oops, my link layer is under attack! TCP is a feint!"
Wang Qingchen was taken aback for a moment.
Fortunately, there were not many capable people on the scene. Before Wang Qingchen could respond, another expert from the Information Institute of the Chinese Academy of Sciences helped fill in the vacancy.
After a few minutes.
The entire loophole was completely plugged.
The tasks faced by Team A are urgent and difficult, but the number is not many.
So after solving these problems.
Wang Qingchen and others finally ushered in a chance to breathe.
"Here, Xiao Wang."
Xiao Rong at the side of Wang Qingchen's seat threw a can of magic claws at him, and after Wang Qingchen took a big gulp, he asked meaningfully:
"Xiao Wang, do you feel that this wave of attacks is familiar?"
Wang Qingchen was slightly taken aback, and said in surprise:
"Why, Brother Rong, you feel the same way? I thought I was thinking too much."
Xiao Rong was silent for a moment when he saw this, and an inexplicable smile rose from the corner of his mouth:
"It seems that I didn't feel wrong Xiao Wang, those real old friends from 2001 came."
When Xiao Rong said these words, there was still a trace of emotional fighting spirit in his eyes.
Mentioned earlier.
The Rabbit Eagle hacker battle in 2001 was the most intense and well-known Internet battle in China's history.
However, although we broke through many websites across the sea in that war, our own damage was not small.
Throughout the ten-day offensive and defensive battle.
Huaxia destroyed more than 1,000 websites, including more than 600 important websites—under the background of 2001, this number covers a very wide range.
Across the sea, as many as 1,600 websites were destroyed, including 900 important websites.
Only relatively speaking, our portal has not been compromised.
So at that time, the battle was said to be 'offensive and defensive', but in fact it was almost all about offense.
The length of the defense is actually very small.
By the way.
The tactic of pulling out the network cable was also carried forward in that battle
Now 20 years have passed.
Xiao Rong never expected that she would unexpectedly reunite with those old friends on this occasion.
To know.
In the previous attacks, Xiao Rong saw some acquaintances here and there.
But the number of those figures is generally only one or two, and some of them were later determined to be the actions of the opponent's apprentice—after all, the magnitude of the previous incidents was not high.
But today, what Xiaorong and the others met was not as simple as one or two acquaintances.
For example, this feint.
This is Kevin Poulsen's famous skill
That's right.
Kevin Poulsen.
He was one of the top five hackers across the sea, hacked into the Wunasha Building, and was the first computer criminal to be accused of espionage.
However, Kevin Poulsen was incorporated after he was released from prison in 1996. He was working as an investigative reporter on the surface, but he was actually working for the opposite side of the sea.
In the hacker wars of 2001.
The Chinese Academy of Sciences' Education and Research Network, Pig Farm Portal, and Shuguang BBS are all well-known websites led by Kevin Poulsen.
And now Kevin Poulsen can show up.
Be conservative.
At least 50% of the old acquaintances from that year should also appear today.
After confirming the 'reunion of old friends'.
Wang Qingchen and Xiao Rong once again scored 120 points, and quickly returned to their seats to wait.
For the next ten minutes.
Although Group A still encountered several attacks, it was generally calm.
However, Wang Qingchen and Xiao Rong didn't have the slightest intention to slack off.
They knew very well that those old friends were all masters of big money.
If you don't make a move, it's fine, and if you make a move, it will be a stormy sea.
Another four minutes passed.
Wang Qingchen suddenly stared:
"Brother Rong, here we come!"
In fact, there is no need for Wang Qingchen to remind, Xiaorong also noticed the change of the detector in front of him:
In just five seconds, the live broadcast server encountered a DDOS attack with a peak value of 0.11Tbps!
DDOS attack is a common bot attack, common DDOS attack script kiddies can do it, and it is not difficult to defend against it.
But if it is a high-level DDOS attack, it is another concept.
The highest DDOS attack in Huaxia occurred on April 8, 2018.
At that time, a game of Tencent Cloud suffered 7 consecutive DDoS attacks from 19:13 to 19:50, with a peak value of 1.23Tbps.
That's 1.23 megabits per second.
The 'appetizer' that Wang Qingchen and the others encountered today reached 1/10 of the original record.
Almost in just a few seconds.
Xiao Rong realized the identity of the other party:
The king of DDOS across the sea, Setu!
This is also one of the core members who attacked Huaxia Internet at the beginning.
However, unlike Kevin Poulsen, who went to prison first and then was incorporated, he has been serving the official across the sea since his debut.
In a sense.
He is the 'Honker' across the sea.
Fortunately, the Chinese Academy of Sciences was well prepared for the hacker attack this time, and prepared a high-level bandwidth in advance.
In the case of bandwidth hard resistance.
Xiao Rong cleaned and drained the water, and finally contained Setu's offensive.
and the price
is the video quality of all viewers in the live broadcast room, which has been slightly reduced by half a stop.
Fortunately, at this time, many institutions are still conducting experiments, and the camera perspective is either overlooking the whole world, or locking on the commentators of their respective media.
The reduction in image quality is relatively insignificant.
But for Xiaorong and others, this is just the beginning
Setu's attack involved Xiaorong, the most capable hacker on the scene, making him temporarily unable to get out to help others.
at the same time.
Across the distant sea.
The Pentagon. (This place name is not very easy to describe in Chinese characters. It seems a bit sensitive. I don’t know where it is. I can Baidu it. I will refer to it in English.)
In a closed but quite open room.
Hundreds of programmers are rapidly typing on the keyboard in front of the computer.
These programmers have different skin colors, some are white, some are Hispanic, and some are black.
There are even a few
Asian.
In the front area of the room, there is an area that seems to have a higher standard, and a man is sitting in one of the positions, typing commands cracklingly.
This person should be a Hispanic in terms of skin color, in his forties, with fairly regular facial features.
However, every ten seconds, the muscles on his left face would twitch heavily. It seemed that there was some problem with the facial nerves.
And behind this person are surrounded by six men, all of whom seem to be in their forties or fifties.
after awhile.
The man in the seat let out a groan, clenched his fist with his left hand, and hammered on the palm of his right hand angrily:
"FXXK!"
Behind him, a big man with a round belly and a beard saw this, and couldn't help but whistled:
"Aha, Setu, I'm willing to bet and lose, and I'm sincerely offering $100."
The man named Setu reached into his trouser pocket a few times, took out a crumpled banknote, and slapped it on the table angrily:
"Take it!"
The bearded man was humming the tune of 'la la la' while happily picking up the money:
"Setu, I haven't seen you for so many years, and your technology hasn't improved much. Is this the king of DDOS?"
Setu's facial muscles twitched violently again. He didn't know whether it was because of anger or the original nerve twitch, but he couldn't help but raised a **** towards the other party:
"Shut up you, 100 dollars can't stop your broken mouth, the same loose thing from front to back, do you know who is on the other side?"
The bearded man didn't seem to care about Setu's sarcasm at all, but asked curiously:
"who is it?"
Setu glanced at him:
"xiaorong, the accuracy is not less than 90%."
Heard the name xiaorong.
The surrounding atmosphere suddenly froze, and the smile of the bearded man also instantly subsided.
A few seconds passed.
One of the handsome guys who looked somewhat similar to Beckham suddenly showed a tyranny in his eyes that didn't match his appearance:
"So it was him"
These people present had participated in the hacker war 20 years ago, so they were naturally impressed by Xiaorong, the main attacker who once planted the national flag on the homepage of the White House official website.
This is indeed a difficult opponent.
The handsome guy who spoke at the end had a big fall on Xiao Rong.
Just when the atmosphere was a little dignified.
A little gray-haired old man walked up to the front left of the crowd, and asked Setu and others:
"Several, how is the situation now? Can you break through the defense of the Chinese people?"
Setu shook his head, sighed, and explained:
"Sorry, Mr. Abbott, I failed too."
"The defense system of the Chinese Academy of Sciences has a preliminary screening module. It should be specially prepared for this live broadcast these days. The logic and code are perfectly matched."
"If we don't break this layer of defense, we can only play 50 to 60% of the effect when we invade."
"I'm not afraid of xiaorong in a full-strength battle, but the outcome is in the balance. In addition to the blocking of this module, I will definitely not be able to capture the core node—not to mention that there is not only xiaorong on the opposite side."
The rest of the people also nodded in agreement.
Although their experience of watching the game behind is not as intuitive as that of Setu, a lot of information can still be detected.
As Setu said.
The Chinese Academy of Sciences directly blocked many applications for overseas visits, forming a solid protective layer.
Using film and television works as an example, it is a bit like the barrier that Hogwarts put up before the final battle in Harry Potter and the Deathly Hallows.
Unless this barrier is broken, it will never be possible to enter the frontal battlefield.
Not to mention that before Setu made a move, several of them also tried to attack, and the effect was not very satisfactory.
See this scenario.
The little old man named Albert looked around a few people and asked:
"Gentlemen. Oh, and this psychic woman, are you sure we can't break through the defense of the Chinese Academy of Sciences through a frontal assault, are you?"
Everyone nodded without hesitation:
"Exactly."
"I am very sure."
"I'm sorry, it's true. After all, the Chinese Academy of Sciences has a long time to build a defense system in advance"
"Mr. Abbott, I said please call me Ms. Salfin"
After getting a positive answer from everyone.
Abbott stood in place like a statue, with a dignified and complicated expression on his face.
seems
is weighing something.
As the head of The Pentagon's China Strategy Department, Abbott has already stepped into the upper echelons of power across the sea.
Whether it is the information they have or the vision to look at things, they are far beyond the reach of hackers like Setu.
It can be said that since October 1, 1972, the blockade of China has never stopped across the sea.
It started with technology, trade, and equipment.
In the past 30 years, it has turned to education and awareness, doing everything possible to implement "de-Chineseization".
Very representative is the word New Year.
They worked with Bangzi one after another, spent eight years with great patience, and forcibly changed "chinesenewyear" to "LunarNewYear".
Now "LunarNewYear" on the extranet has become synonymous with political correctness, euphemistically called the Lunar New Year in the East Asian cultural circle.
Eight years, just for such a word.
There are many, many similar small actions.
While blocking and suppressing China's right to speak, they are distorting China's right to public opinion.
For example, a certain neon company released a poster of a dog in the flowers on the day of the martyr’s sacrifice, and it was also accompanied by the great fortune teller Yongmei.
Such an obvious sarcasm, there are still some people who complained about domestic glass hearts after the company's microblog was officially banned.
How ridiculous.
all in all.
under these circumstances.
Abbott, or the will behind him, will never allow Huaxia to have such an important right to define in the field of particle physics.
Otherwise, it’s not just basic physics that will be affected by then—a senior who held the same position as Abbott decades ago, named Daniel Kimbell, once stumbled on this matter.
Daniel Kimbell once said a word in his autobiography with great regret:
"We have made countless wise decisions in our relations with China, but the failure of that decision to release people made all previous correct decisions meaningless—if we had known today, we should have given up those 11 captive pilots."
Thus, although this confrontation only took place online, the nature of the confrontation involved is no less than that of the original incident.
The practice of the Chinese Academy of Sciences to list all the institutions in the rankings for live broadcast has made all the proposals in front of the stage of Haidian abolished.
That is to say
Now the only turning point is the dark side of The Pentagon.
As long as the live broadcast signal is cut off, the "power" of the Chinese Academy of Sciences enveloping the public will be cut off.
Tomorrow will still be beautiful.
Maybe Huaxia can win a Nobel Prize for this achievement, and then that's all.
Lack of live broadcast rankings and public attention, everything can be re-managed.
In the words of the Chinese people.
This is a two-sided
The battle of the national destiny!
(end of this chapter)