The little king Zhan Keren mentioned was clearly Wang Qingchen from the HKUST Cyber Security Center.
As the current top expert in network security in the Academy of Sciences, he was also transferred to the press conference to assist with security this time.
I saw him quickly blocking a round of attacks, and at the same time said:
"The attack intensity is very high, including DDoS and flood attacks. We just defended against a very strong attack five minutes ago."
"If nothing else happens, we should have the next round of offensive within five to eight minutes."
"If we hadn't prepared a defense system a few days ago, I'm afraid we would have to fight the opponent with bayonets now."
Zhan Keren's expression immediately became more solemn after hearing this, and he asked:
"Xiao Wang, can you hold on?"
【Can you hold it?】
be honest.
Wang Qingchen has heard this sentence more than once in the past six months.
Whether it is the live broadcast of cockroach disinfecting at HKUST.
It was still the day when the 'One Mantis Killer' product was launched.
Or the scene of the HKUST public opinion press conference.
Different people asked Wang Qingchen this question.
Wang Qingchen's answer every time was a very confident "can", and he truly fulfilled his promise.
But this time...
He was a little unsure.
This time, the network security team of the Academy of Sciences was divided into two groups, A and B, based on personal abilities and response methods.
Group B has a larger number of people, probably around a hundred people, and is defending at the famous National Supercomputing Center in Chengdu.
They mainly target common attacks with high traffic but relatively low technical skills, such as conventional DDoS and so on, and their main function is to intercept traffic.
In game terms, it is used to clear mobs.
As for module a...
It is a 'special operations' team composed of Wang Qingchen, Xiao Rong and elites from the Institute of Information, Chinese Academy of Sciences.
There are 31 members in this group, all of whom are old men in plaid shirts with high hairlines and borderless hairlines.
You can put it this way.
Except for those masters who have quit the industry or work in private companies, all the top hackers in the country are gathered here.
This is the top lineup in the network security industry, and can theoretically crush 99.99% of opponents.
But the problem is...
What Wang Qingchen, Xiaorong and others faced this time was from the 0.01% headed by Haidang Duan.
It can also be seen from some habits that many of them are Wang Qingchen...or old acquaintances of Huaxia Hongke.
even.....
Wang Qingchen was still in the middle of an attack when he vaguely caught a glimpse of a figure that shouldn't appear on this occasion:
Eric Raymond.
Let’s look at some details.
Basically, we can rule out the possibility of his disciples or disciples being involved, and it is 100% that he himself will be the one to do it.
The old man was pulled out, which shows how many strong troops have been invested across the sea this time, and how determined their attitude is.
without any exaggeration.
This is the most official confrontation between the two sides.
Except for the furry bear next door, no country is currently qualified to compete with either of the two.
So let's be real.
Wang Qingchen really didn't have much confidence that he could defend the other side - after all, attacking was easier than defending.
But at this juncture, he was not allowed to say depressing words, so this well-known celebrity who looked very artistic suddenly gritted his teeth and puffed out his chest and said:
"No problem, Director Zhan, don't worry, I won't let those guys ruin our live broadcast!"
After making a guarantee to Zhan Keren.
Wang Qingchen immediately focused his attention on network security maintenance.
Bang bang bang——
The security center was filled with the sound of typing on keyboards. From the outside, it seemed that behind Gujing Wubo's live broadcast, there were invisible swords and swords.
After terminating a computer worm attack, a hoarse male voice suddenly came from beside Wang Qingchen:
"Brother Yi! The tcp connection is under attack, and the program keeps returning ack messages!"
The speaker was a middle-aged man with dark circles under his eyes, and his hair was as messy as a bird's nest. You could tell at a glance that he was a middle-aged Internet addict.
What he shouted was not Wang Qingchen’s name, but Wang Qingchen’s original code name in the Hongke Alliance:
Wings of Chaos.
That's right.
This person was also a member of the original Hongke Alliance and participated in the Sino-US hacker war.
Or to be more precise...
Among the 31 people present, more than 60% were members of the original Honker Alliance.
The remaining part basically has some intersection with Wang Qingchen, Xiaorong and others.
Or they were apprentices they had personally taught.
Or have taken their courses.
This is actually quite normal.
After all, the participants in the original Sino-US hacker war were top domestic hackers, and there were not a few who were recruited like Wang Qingchen.
Even Xiaorong was no exception - he had been working for the country for 15 years, and then he was hired by Xu Yun to join Huadun Biotech.
Hear the news from the man with dark circles.
Wang Qingchen immediately went on defense.
TCP problems fall under the category of syn flood attacks, that is, flood attacks, which are much more difficult than simple DDoS attacks - of course, this refers to DDoS attacks below a certain level.
Students who have been programmers in this life should all know this.
Usually the establishment of a TCP connection includes three steps:
The client sends a syn packet to the server;
The server allocates certain resources and returns syn/ack packets, and waits for the final ack packet when the connection is established;
Finally, the client sends an ack message.
In this way, a connection between the two is established and data can be transferred through the connection.
The process of syn flood attack is to send syn messages crazily without returning ack messages.
When the server does not receive the confirmation packet from the client.
The specification standard stipulates that the syn/ack request packet must be resent, and the entry will not be deleted from the unconnected queue until timeout.
Syn flood attacks consume CPU and memory resources, resulting in excessive system resource usage, inability to respond to other operations, or the inability to respond to normal network requests.
At the same time, because tcp/ip believes in the source address of the message.
Attackers can forge source IP addresses, making tracing very difficult.
It is impossible to disconnect the network during the live broadcast, so Wang Qingchen and others must solve this problem before the server exceeds the load.
Wang Qingchen first used the -na command to check the port connection status and found that the queue was filled with a large number of semi-connections, and the destination port numbers were all uncommon port 23.
See this situation.
Wang Qingchen quickly established a gateway timeout setting and increased the maximum half connection to strengthen the TCP/IP protocol line.
influenced by.
Some external video signals paused, and the screen went black for a full 6.7 seconds. A burst of question marks instantly appeared on the live broadcast platform.
Fortunately, this pause did not last long, and Wang Qingchen took this opportunity to complete the settings of the filtering gateway.
The attack was suspended for now.
But before Wang Qingchen could take a breath, another exclamation came to his mind:
"Oops, my link layer was attacked! TCP is a sheep attack!"
Wang Qingchen was stunned for a moment.
Fortunately, there were many capable people at the scene. Before Wang Qingchen could react, another expert from the Information Institute of the Academy of Sciences helped fill the gap.
A few minutes later.
The entire loophole was completely closed.
The tasks faced by Team A are urgent and difficult, but they are not many in number.
So after solving these problems.
Wang Qingchen and others finally had a chance to breathe.
"Here, Xiao Wang."
The little banyan next to Wang Qingchen's seat threw a can of Devil's Claw at him. After Wang Qingchen took a big sip, he asked with meaning:
"Xiao Wang, do you feel that this wave of attacks is familiar?"
Wang Qingchen was stunned for a moment and said in surprise:
"Why, Brother Rong, do you feel this way too? I thought I was overthinking."
Seeing this, Xiaorong was silent for a moment, and an inexplicable smile appeared at the corner of her mouth:
"It seems that I felt right...Xiao Wang, those real old friends from 2001 are here."
When Xiaorong said these words, there was still a hint of emotional fighting spirit in his eyes.
Mentioned earlier.
The Rabbit Eagle hacker war in 2001 was the most intense and widely known Internet battle in China’s history.
However, although we broke into many websites across the sea in that war, our own damage was not small.
Throughout the ten-day offensive and defensive battle.
More than 1,000 websites were destroyed in China, including more than 600 important websites - in the context of 2001, the coverage of this number is actually very wide.
Across the sea, as many as 1,600 websites were destroyed, including 900 important websites.
It's just that relatively speaking, our portal has not been breached.
Therefore, the battle at that time was said to be "offensive and defensive", but in fact it was almost all about offense.
The length of defense is actually very small.
By the way.
The tactic of unplugging the network cable was also carried forward in that battle...
Now 20 years have passed.
Xiaorong did not expect that she would unexpectedly reunite with those old friends on this occasion.
To know.
In the previous attacks, Xiaorong saw some familiar figures here and there.
However, the number of those figures was generally only one or two, and some were later determined to be the actions of the opponent's apprentices - after all, the magnitude of many previous incidents was not high.
But today, what Xiaorong and the others met was not just one or two acquaintances.
For example, this time's sheep attack.
This is the skill that Kevin Poulsen became famous for...
That's right.
Kevin Poulsen.
He was one of the top five hackers across the sea. He was the first computer criminal to be charged with espionage after invading the Fifth Avenue Building.
However, Kevin Poulsen was recruited after he was released from prison in 1996. On the surface, he was working as an investigative reporter, but in fact, he was working for the other side of the sea.
In the hacker war of 2001.
Several well-known websites such as the Chinese Academy of Sciences' Education and Research Network, Pig Farm Portal, and Shuguang bbs were all captured by Kevin Poulson's team.
And now Kevin Poulsen can come forward...
To put it mildly.
At least 50% of the old acquaintances from back then should also appear today.
After confirming the 'reunion of old friends'.
Wang Qingchen and Xiao Rong once again cheered up and quickly returned to their seats to wait.
for the next ten minutes.
Although Team A still encountered several attacks, it was generally calm.
However, Wang Qingchen and Xiao Rong had no intention of slacking off.
They knew very well that those old friends were experts in making large sums of money.
If you don't take action, it will be fine. If you do, it will be a storm.
Another four minutes passed.
Wang Qingchen suddenly focused his eyes:
"Brother Rong, here we come!"
In fact, without Wang Qingchen’s prompting, Xiaorong also noticed the changes in the detector in front of him:
In just five seconds, the live broadcast server suffered a DDoS attack with a peak value of 0.11tbps!
Ddos attacks are just ordinary chicken attacks. Common Ddos attack script guys can create them, and it is not difficult to defend against them.
But if it is a high-level DDoS attack, that is another concept.
The highest DDoS attack in China occurred on April 8, 2018.
At that time, a game on Tencent Cloud suffered seven consecutive DDoS attacks from 19:13 to 19:50, with a peak value of 1.23 tbps.
That's 1.23 megabits per second.
The 'appetizer' that Wang Qingchen and the others encountered today reached 1/10 of the original record.
Almost in a matter of seconds.
Xiaorong then realized the identity of the other party:
The king of ddos across the sea, setu!
This was also one of the core members of the original attack on China Internet.
However, unlike Kevin Poulsen who was first imprisoned and then reorganized, he was serving the official service across the sea as soon as he debuted.
In a sense.
He is the 'Hongke' across the sea.
Fortunately, the Chinese Academy of Sciences was well prepared for the hacker attack this time and had prepared a high-level bandwidth in advance.
In the case of hard bandwidth resistance.
Xiaorong cleaned and diverted traffic, and finally suppressed Setu's offensive.
And the price...
The video quality of all viewers in the live broadcast room was slightly reduced by half a notch.
Fortunately, many institutions are still in the process of experimenting at this time, and the camera perspective is either a bird's-eye view, or it is locked on the commentators of the respective media.
The reduction in image quality is relatively inconspicuous.
But for Xiaorong and others, this is just the beginning...
Setu's attack implicated Xiaorong, the most capable hacker on the scene, making him temporarily unable to get away to assist others.
at the same time.
Far across the sea.
the pentagon. (This place name is not easy to describe in Chinese characters. It seems a bit sensitive. If you don’t know what place it is, you can search it on Baidu. The following will be referred to in English)
In a closed but quite open room.
Hundreds of programmers are tapping the keyboard quickly in front of the computer.
These programmers have different skin colors, some are white, some are Hispanic, and some are black.
There are even a few...
Asian.
There is an area at the front of the room that looks higher in standard. There is a man sitting in one of the areas, cracklingly inputting instructions.
Judging from his skin color, this person should be a Hispanic, in his forties, with fairly regular facial features.
However, every ten seconds or so, the muscles on the left side of his face would twitch heavily, as if there was some problem with the facial nerves.
Behind this person were six men, all of whom seemed to be in their forties or fifties.
after awhile.
The man on the seat groaned, made a fist with his left hand, and punched the palm of his right hand in frustration:
"fxxk!"
A big man with a round belly and a beard behind him couldn't help but whistled when he saw this:
"Aha, setu, I'm willing to accept the bet and lose, and I'll give you $100."
The man named Setu reached into his trouser pocket and took out a crumpled bill, and slapped it on the table angrily:
"Take it!"
The bearded man hummed the tune "La La La" and happily picked up the money:
"Setu, I haven't seen you for so many years, and your skills haven't improved much. Are you still the king of DDoS?"
Setu's facial muscles twitched violently again. He didn't know whether it was out of anger or an original nerve twitch. He couldn't help but raise his middle finger towards the other party:
"Shut up, you. Even a hundred dollars can't shut up your mouth. It's as loose as before and after. Do you know who is on the other side?"
The bearded man didn't seem to care at all about Setu's sarcasm, but asked curiously:
"who is it?"
setu glanced at him:
"Xia, the accuracy is no less than 90%."
I heard the name xia.
The surrounding atmosphere suddenly condensed, and the smile of the bearded man also instantly faded.
A few seconds passed.
One of the handsome guys, who looked somewhat similar to Beckham, suddenly showed a trace of violence that was inconsistent with his appearance:
"It turns out it's him..."
These people present had all participated in the hacker war 20 years ago, and were naturally deeply impressed by Xiaorong, the main attacker who had personally planted the national flag on the homepage of the White House official website.
This is indeed a difficult opponent.
The handsome guy who spoke last had already suffered a big fall on Xiaorong back then.
Just when the atmosphere was a little solemn.
A little old man with gray hair walked up to the front left of the crowd and asked Setu and others:
"Guys, how is the situation now? Can you break through the Chinese defense?"
setu shook his head, sighed, and explained:
"I'm sorry, Mr. Abbott, I failed too."
"The defense system of the Chinese Academy of Sciences has a preliminary screening module. It should be specially prepared for this live broadcast these days. The logic and code are perfectly matched."
"If we don't break this layer of defense, we can only achieve 50-60% effectiveness during invasion."
"I'm not afraid of Xia in an all-out battle, but the outcome is only between two choices. Plus with the blockage of this module... I definitely won't be able to capture the core node - not to mention that there's more than just Xia on the other side."
The other people also nodded in agreement.
Although their experience of watching the battle from behind is not as intuitive as Setu's, a lot of information can still be detected.
As setu said.
The Chinese Academy of Sciences has directly blocked many overseas visit applications, forming a strong protective layer.
To use film and television works as an example, it is somewhat like the barrier Hogwarts put up before the final battle in Harry Potter and the Deathly Hallows.
If this barrier is not broken, it will never be possible to enter the frontal battlefield.
Not to mention that before setu took action, several of them also tried to attack, but the results were also not very satisfactory.
See this situation.
The little old man named Abbott looked around at a few people and asked:
"Gentlemen... Oh, and sir, this psychological woman, are you sure that we can't break through the defense of the Chinese Academy of Sciences through a frontal attack, are you?"
Everyone nodded without hesitation:
"That's right."
"I am very sure."
"I'm sorry, but this is indeed the case. After all, the Chinese Academy of Sciences has a long time to build a defense system in advance..."
"Mr. Abbott, I said please call me Ms. Salfin..."
After getting everyone's affirmative reply.
Abbott stood there like a statue, with a dignified and complicated expression on his face.
seem......
Weighing something.
As the head of the Pentagon's China Strategy Department, Abbott has already entered the upper echelons of power across the sea.
Whether it is the information they possess or their perspective on things, they are far beyond what hackers like setu can match.
It can be said that since October 1, 1972, the blockade of China has never stopped across the sea.
The first thing to start with is technology, trade, and equipment.
In the past thirty years, it has turned to education and awareness, and has done everything possible to implement "de-Chineseization."
A very representative one is the word New Year.
Working in tandem with Bangzi, they patiently spent eight years changing "ew year" to "lunar new year."
Now "lunar new year" on the Internet has become a synonym for political correctness, euphemistically called the Lunar New Year in the East Asian cultural circle.
Eight whole years, just for this one word.
There are many, many similar small actions.
While they are blocking and suppressing China's right to speak, they are also distorting China's right to public opinion.
For example, a certain neon company released a poster of a dog among flowers on the Martyrs’ Day, accompanied by the great fortune teller Yongmei.
For such an obvious and ridiculing thing, there are still people who complained about China's shameless behavior after the official banned the company's Weibo.
How ridiculous.
all in all.
in this case.
Abbott...or the will behind him will never allow China to have such an important definitional right in the field of particle physics.
Otherwise, it will not only be basic physics that will be affected - decades ago, a senior who held the same position as Abbott, named Daniel Kimbell, once stumbled upon this matter. .
Daniel Kimbell once said something regretfully in his autobiography:
"We have made countless wise decisions in our relations with China, but the failure of that release decision made all the previous correct decisions meaningless - if we had known today, we should have given up the 11 captive pilots."
Therefore, although this confrontation only took place online, the nature of its involvement was no less than that of the original incident.
The Chinese Academy of Sciences' practice of ranking all institutions for live broadcast has caused all the plans on the mainland to be scrapped.
That is to say...
Now the only turning point is the dark side of the pentagon.
As long as the live broadcast signal is cut off, the "power" of the Chinese Academy of Sciences to control the public will be cut off.
Tomorrow will still be beautiful.
Maybe China can win a Nobel Prize based on this achievement, and that's it.
Without the ranking and public attention of live broadcast, everything can be manipulated again.
In the words of Chinese people.
This is a battle between two sides...
The battle for national destiny!
.........