031 Finding a needle in a haystack

Style: Fantasy Author: The scholar laughs at the hidden knifeWords: 2835Update Time: 24/01/13 10:31:28
"How do you feel about your first day on the job?"

What Meng Fei didn't expect was that Luo An's WeChat profile picture would actually light up and send greetings.

During working hours at the bank's desk, you are not allowed to turn on your mobile phone at all.

They can only contact VIP customers through work WeChat ID and operate on the computer.

But Meng Fei is not subject to this restriction. He has networking skills. The most powerful BUG system in the brain directly controls the mobile phone in the pocket.

"It feels okay."

Meng Fei was actually talking about the girl next to him.

"Is the case difficult?"

Luo An only cares about business.

If the experts he selects can successfully solve the case, the relationship between Mantis Software and relevant departments will be further deepened, and they will be more qualified to compete for more projects.

But on the other hand, if everything goes wrong, Meng Fei's loss will be small, but the reputation of Mantis Software will be greatly affected.

"Don't worry, big boss, I will take care of it."

Luo An was stunned. I've heard that this guy is reserved and cautious before, why is he so overconfident now?

In fact, this case is indeed difficult. Even if he has the system at hand, there will still be some trouble.

But always be confident in front of your boss, unless you have trouble with your future.

This case seems very simple. It is that the money of several VIP customers was transferred away inexplicably.

But it’s complex, and finding the real reason is like looking for a needle in a haystack.

In the past two weeks, small amounts of funds amounting to hundreds and thousands of dollars have been transferred from the accounts of VIP customers of Golden Turtle Bank to an illegal account that has been monitored.

The bank did not immediately close the illegal account. This actually doesn't mean much. This account is just used by the mastermind to collect money.

If you block this one, he can still use other accounts. By then you may not be able to monitor it.

The VIP customers of Golden Turtle Bank are all wealthy, and they usually don't even notice this small amount of transfers.

When people from the bank called to inquire, they discovered that the money in their accounts had been transferred inexplicably, and they all denied that they had done anything.

Judging from the system records, the money was transferred through legal operations by entering user names and passwords.

It's just that these operations do not come from these VIP users' own computers or mobile phones.

Some people may think, oh, I can just check the IP addresses of these operations and find out where the operators are.

In fact, this meaning is for reference only.

Even if people don't hide it deliberately, with NAT forwarding everywhere and countless machines sharing IP addresses, it will be difficult to locate the real culprit through the IP address.

If the other party sets up a proxy and moves the IP overseas, or simply walks on the street and finds a wifi hack to access the Internet, you can easily blame others.

The person in charge of this case was the Cyber ​​Security Section of the Criminal Investigation Bureau. They had already investigated the information and sent it directly to Meng Fei's mailbox.

He browsed through them one by one. You can see that the machines initiating operations are scattered and irregular.

There are mobile phones and computers, domestic and foreign, corporate and personal machines. There are even servers that are obviously hacked.

This is a real veteran, a veteran who leaves no trace.

If only VIP customers really leaked their passwords, it would not be a serious problem.

Within two weeks, the accounts and passwords of hundreds of VIP customers were leaked at the same time, which is a bit scary. You don't even know how much leaked out.

The account list of VIP customers is only saved in the bank. Therefore, even if we don’t talk about how the password was leaked, the account list could only have been leaked from the bank.

If there is a leak, Mantis software will also be involved. The security system of Golden Turtle Bank is developed and maintained by Mantis Software.

Because of this, the bank requested the Criminal Investigation Bureau to invite an expert familiar with Mantis software from the Expert Academy to participate in the investigation.

This must be Meng Fei who just took office.

His mission is not to catch the mastermind behind the illegal money transfer, but to find out how the bank account numbers of VIP users were leaked.

A task like finding a needle in a haystack.

But VIP account managers are the biggest suspects.

Because there is a huge pit here, which is also the weakest point of the entire system.

The VIP account manager's computer can access VIP customer information from the server, which is necessary for their operations.

Just to prevent the account managers from leaking this information, the security system used technical means to block it so that they could not see it.

If there is a way to break through the shielding of the security system, account managers may obtain this information and sell it to black organizations.

This does not mean that leakage cannot occur through other means. But based on Meng Fei's experience, hackers always choose the easiest link to start with.

He must first be familiar with the operating routines of VIP account managers, and then analyze step by step to see if there is any possibility of breaking through the shield by chance.

Even if it doesn't appear on the surface, if you look closely at every line of code and every instruction, the vulnerability may be hidden.

Maybe it can't be triggered by normal operations, and it can be exposed by using some special actions.

For example, there was a very funny vulnerability in Windows in his previous life.

Originally, you had to enter your username and password when logging in. Later, someone accidentally discovered that by switching the input method when entering the password, this step can be skipped.

Password restrictions become deceptive.

Perhaps the source of the leak was that an account manager accidentally did an unusual operation and found that he could see the account list of VIP users and downloaded it?

Meng Fei didn't need to analyze step by step, he directly called up the BUG system.

"Scan all vulnerabilities that may expose VIP customer accounts."

At this time, he could feel countless codes and logic running through his mind like lightning.

The first few times he used the strongest BUG system, he didn't feel this way, and everything passed by without any awareness.

It can be felt now because as his level increases, his control and understanding of the power from the system is getting stronger.

He could feel the powerful computing power coming from nowhere, analyzing every bit at an incredible speed.

Eventually a series of vulnerabilities were listed.

He shook his head repeatedly.

It's not that these vulnerabilities are unavailable, it's just that they're too difficult to exploit.

If you get a development team and work hard for a few months, you may be able to use one or two of them.

It is absolutely impossible for a VIP account manager sitting here to use these loopholes to obtain the customer's account.

But the results of his analysis this time could only confirm that there was no problem with the client in front of him and the server connected to this time.

He didn't know if other machines would be different.

Theoretically the software on these machines is the same.

But no one knows whether different versions of patches will be installed on different machines, or whether the insider will install a Trojan horse that directly destroys the security system?

He plans to analyze all the machines used by VIP account managers.

This is not something you can do by just installing an anti-virus software and scanning it once.

Antivirus software can only recognize recognized viruses and Trojans. If you write a program to "steal" information that already exists on your machine, it will most likely be ignored by anti-virus software.

What he needs to scan is all the code that may be run on the machine, whether it is a virus or not.

He needs to know their origin, purpose of operation, specific behavior, and whether there are vulnerabilities.

It is equivalent to comprehensive security testing of a large number of unknown software.

This probably involves a total of more than 300 computers in the account manager's office on this floor.

Before the change, even if you didn't count the time spent developing scanning tools, it would be considered good if you could get ten of them in one day. This work would take at least a month.

But now he can directly use the BUG system to scan one after another.

Of course he doesn't walk around in front of every computer and perform his "magic" in full view of everyone. And the time is not so tight.

He would do this in the dead of night when everyone was off work.

So for the rest of the day, I just hung out browsing websites and flirting with girls on WeChat.

The working hours in the morning always go by incredibly fast. Especially when there is a beautiful girl sitting next to you.

Then he heard a cooing sound.

He lowered his head and whispered to the girl beside him:

"Your stomach is ringing."

Xiao Han, who had been busy with work and forgot about time, finally realized what he was doing.

"Oh, I'm so sorry, I almost missed my meal!"