Into Unscientific

Chapter 195



Chapter 194 – The Collaboration Of Two Top Universities (6.6K)

Chapter 194 The collaboration of two top schools (6.6K)

Speaking of the three words of National University of Science and Technology.

Perhaps what many people think of is the abbreviation of ‘National University of Defense Technology’.

But in fact.

National University of Science and Technology refers to Huaxia Academy of Sciences University.

English name University of Chinese Academy of Sciences.

That is UCAS, located in Yanjing.

USTC is Huaxia University of Science and Technology.

English name University of Science and Technology of China.

Abbreviated as USTC, located in Luzhou.

be honest.

If you only look at the English letters, the two schools seem to have the same degree of overlap, and the gap in ip is also vast.

It seems that in theory, so many hackers should not be hit by mistake.

But this is only the superficial surface.

Anyone who knows the grievances between the two colleges should know that the two schools are similar not only in their Chinese names.

The relationship between the two is very complicated, and it can be called inextricably linked. There may not be many top universities in China that can have such a “bad relationship”.

Earlier, when introducing the history of USTC, I briefly mentioned the past of USTC’s southward relocation:

At that time, the teachers and students of HKUST left Yanjing with all their supplies by train, and moved south to Luzhou today.

This incident happened in 1969-1970, and it had a lot to do with the situation at that time.

Waited until 1978.

The current situation began to change. The relationship between HKUST and Yanjing eased slightly, and HKUST established a branch in Yanjing.

The full name of the branch is the Graduate School of Huaxia University of Science and Technology, which is the first graduate school in China approved by the state.

After 1982.

The Chinese Academy of Sciences approved the simultaneous use of the school name Graduate School of Huaxia Academy of Sciences and Graduate School of Huaxia University of Science and Technology.

All these seem to be developing in a good direction, but then a strange thing appeared in HKUST.

That is, the preacher of Quantum Buddhism mentioned before, Zhu Xshi, the shame of HKUST.

In short, this person has too many coquettish operations, shouting slogans louder than anyone else, and doing nothing at all.

The ten-year opportunity for great development was wasted in vain. The students of SUSTech should understand the mood of the students of USTC.

During his tenure, the relationship between USTC and the Chinese Academy of Sciences dropped to a freezing point. Many projects from the Academy of Sciences were ignored, and there were even cases where the leaders of the Academy of Sciences were rejected for inspection.

How could the Chinese Academy of Sciences be so angry, so they set their sights on the Graduate School of USTC Yanjing.

Finally, it became independent in 2012, and the National University of Science and Technology was established, which was located at the original location of the University of Science and Technology.

Later, outsiders called the University of Science and Technology of China as Nicole—that is, the homonym of your family.

Since the establishment of the National University of Science and Technology, a lot of resources have been poured into it, so the feelings of the National University of Science and Technology of China for the National University of Science and Technology are very complicated:

It’s like the eldest son going out to make a living, but suddenly a younger son is born at home, and he loves him so much.

There must be a blood relationship, but there must be some grievances and hatred between each other.

For example, if the National University of Science and Technology is not selected for the double first-class list, the University of Science and Technology of China will frantically celebrate the championship.

At the beginning, a retired teacher from the University of Science and Technology of China came to the University of Science and Technology of China when he was going to Yanjing for a meeting, and covered the word ‘college’ with a piece of paper written ‘Technology’.

After all, for many old people, Yuquan Road is their University of Science and Technology.

It is the University of Science and Technology where they eat and sleep in class, and it is their youth.

The entanglement between the University of Science and Technology of China and the University of Science and Technology of China has lasted for two or three generations. In the eyes of many people, the two are actually a family quarreling.

Because UCAS only started enrolling students 14 years ago, quite a few people or institutions in the world treat UCAS as a branch campus of CUST.

After all, Guoke was still Shuangfei at that time, and many international institutions did not understand why the Academy of Sciences established two schools with almost the same positioning.

For example, in 17 years.

The delegation of the National University of Science and Technology, led by the Academy of Sciences, made an appointment with the National University of Singapore for an exchange visit.

As a result, during the preparatory stage of the visit, the other party actually sent the invitation letter to the mailbox of the principal of the University of Science and Technology of China.

Another example is that both schools use the educational administration system of the Chinese Academy of Sciences, and the information storage switchboard is in a computer room of the Academy of Sciences, etc.

Even in the field of papers, there are currently many journals that mark the notes of the volute on the back of the shell—the most outrageous thing is that several Chinese journals do this.

Also in 21 years.

Some people in Maotanchang Middle School even registered for the University of Science and Technology of China as the University of Science and Technology of China. They were foolish enough to realize that they had reported the wrong school when they arrived in Yanjing.

It’s worth mentioning by the way.

UCAS enrolls only more than 400 undergraduates each year, and 15,000 masters and doctoral students.

The cute college freshmen are surrounded by uncles and aunts with unshaven beards and ridiculously high hairlines. May I ask how big the psychological shadow area is?

all in all.

This is the case in the industry, let alone those hackers or the employers behind them.

The first attack ip they provided was naturally the University of Science and Technology of China, but similarly, the ip of the University of Science and Technology of China was also classified as a branch school and appeared in the backup column.

And it just so happens that

Tonight is still the day for Guoke to choose courses for the second half of the semester.

A school with more than 50,000 people, even if the students who don’t need to take courses are deducted, the number of instant clicks far exceeds the number of “One Mosquito” product pages—the product page only has more than 1,000 orders in ten minutes.

Then here comes the question:

Two IPs of “University of Science and Technology of China”, one with high instantaneous traffic and one with low instantaneous traffic, which one would you choose?

Some highly intelligent hackers immediately thought of an idiom:

Build the plank road in the open, and keep the warehouse in the dark.

This is also a common method in the hacker world. Take a target for you, and actually transmit data secretly.

So ever since.

The unlucky guy appeared.

Actually.

As said before.

UST’s network security capabilities are very strong, most of them come from self-employed labs, and all of them have rich experience.

Even if it is slightly inferior to the University of Science and Technology of China with Wang Qingchen in charge, it will not be that bad.

But the problem is that the current situation is a bit special, in the standard sense, there is mental arithmetic but no intention.

Unfortunately, in the early hours of Sunday morning, there were not many cybersecurity personnel on duty in UCAS, and many of the beating crowd were top foreign hackers.

What do you think this is?

Huadun Biotechnology Headquarters.

In the computer room.

Xu Yun, who just came down from the meeting room, looked at Xiaorong with a strange expression on his face:

“So, the National University of Science and Technology blocked the gun for us?”

Xiao Rong nodded, pointed at the screen and said:

“Not only that, many national science students are complaining on Weibo. There are not many topics in the middle of the night. Look, there are 16 hot searches.”

Xu Yun followed the trend and looked.

Sure enough.

On Weibo’s hot search column, there was a hot search for ‘#国科大/网络攻#’.

Xu Yun’s expression suddenly became weirder.

As a USTC person who has lived for two lifetimes, he really doesn’t have much personal feelings for UCAS.

I don’t even like to watch the other party make embarrassments.

But now Guoke not only had an accident, but somehow blocked the gun for the volute.

This is a bit dramatic

Then he glanced at Xiaorong and asked:

“Brother Rong, can we help? After all, this is an accidental injury.”

Xiao Rong was silent for a moment, then said:

“It’s not difficult to help. After all, the University of Science and Technology of China and the University of Science and Technology of China use the system of the Academy of Sciences, and many data scripts are interoperable.”

“Even in a sense, the two can be regarded as each other’s backup.”

“As long as Qingchen helps, it should be back to normal soon—after all, the hackers who attacked us were just some helpers invited by colleagues, and their magnitude is far inferior to that of Guozhan.”

“Besides, there are also a few masters at the National University of Science and Technology. Although they may have been caught off guard at first, I guess it’s time to get over it by now.”

Actually.

As Xiaorong said.

Right now.

Yanjing, one thousand and thirty kilometers away.

National University of Science and Technology.

Network Security Center.

The director of the Network Security Center, Xiang Haihua, who hurried to the scene, was standing in front of the operation desk, his brows were knitted into a ball, and he was listening to the report of Wang Qi, the officer on duty, with a solemn expression:

“Director Xiang, the attack started at around 0:50, and the SYNFlood attack first appeared.”

”A large number of SYN messages were sent in a short period of time, which caused the campus system to occupy too much CPU and memory resources, and was unable to respond to other operations.”

“Subsequently, a fairly high-level DDoS attack occurred, and more than 4 million traffic requests were generated within 15 minutes.”

“At that time, the situation was urgent, so I disconnected the cloud connection with administrator privileges to ensure that the database above svt was not invaded, but the teaching system of the students…”

Before Wang Qi could finish speaking, Xiang Haihua patted his shoulder and said affirmatively:

“Xiao Wang, you did a good job in this matter, and there is nothing to blame yourself. By the way, have you found the source and reason of the attack?”

Wang Qi glanced at the other programmers who were patching the loopholes, shook his head and said:

“Still not, the attack came extremely suddenly, without any warning, and we are even at a loss as to what happened now.”

“As for the source. We don’t have time to trace the other party’s IP.”

Xiang Haihua was silent for a moment, then nodded thoughtfully:

“I understand.”

Then he looked around, and all he could see were fingers typing on the keyboard and a plaid shirt.

14.

This number is currently the largest number of experts assembled by the Internet Security Center.

After all, today is the weekend, and it is a little closer to the early morning, which can be regarded as the middle of the night.

Many people’s mobile phones have been turned off, and they cannot be contacted at all.

And what they faced.

is the largest hacker attack since the founding of UCAS.

Then he sighed to Haihua, returned to his seat and began to resist the attack.

He, like Wang Qingchen of the University of Science and Technology, was once one of the main forces of the Red League, and his ability is also extremely strong.

However, he is a serious and talented student who graduated from Beiyou, so he was recruited by the letter industry around 2002, relatively low-key.

But even though Xiang Haihua’s level is extraordinary, he still feels a huge pressure at this time.

Because he was dealing with a system that had already been compromised.

It’s like defending a city.

If the city is strong and the troops are strong, then even if the enemy is extremely fierce, the defenders can still do a job with ease—at worst, the city wall will engage in hand-to-hand combat.

But once a hole in the city wall is breached with explosives, the difficulty of defending the city will immediately increase several times.

Xiang Haihua is currently facing such a situation.

And he faced more than one hole, the hole was torn like a web writer’s clothes, with seven or eight holes on one side.

Papapa—

Xiang Haihua was typing on the keyboard quickly, but the enemy’s attacks were like ocean waves, wave after wave, never stopping.

A large amount of data was merged into a thick and hard spear, and it frantically poked towards those holes, and changed positions every now and then.

For example, an attack he just intercepted.

The target of this attack is iuxilua, an online code management service within the University of Science and Technology of China, involving some research documents within the school.

Instead of involving a botnet, the attackers exploited the amplification effects of a popular database caching system called memcached.

Finally, by flooding the memcached server with spoofed requests, it amplifies its attack by thousands or even tens of thousands of times.

This is a relatively cutting-edge attack method. The key is that the technical requirements are very high, and the number of people who can do it is quite limited.

“damn it”

Xiang Haihua blocked another POST request attack with instructions, leaving a bead of sweat on his forehead.

While feeling angry and aggrieved in my heart, there is also a strong doubt:

Where did these attack tmd come from?

What is their purpose?

If any project of the National University of Science and Technology has reached a critical stage recently, the Internet Security Center is theoretically a link that must be notified, and it is impossible for the Internet Security Center to keep it secret.

I’ve seen people who acted to deceive outsiders, but never seen people who deceived their own people.

makes no sense

However, as soon as this thought flashed by, Xiang Haihua felt the enemy stabbing harder

Just as he was gritting his teeth, an engineering expert wearing glasses suddenly shouted four or five meters away from him:

“Director Xiang, there is a situation!”

Xiang Haihua’s heart trembled. The expert who spoke out was called Wu Jiao, and he was also his old partner. He rarely made mistakes.

Then he scratched his dark black hair irritably, and asked:

“what’s the situation?”

Wu was silent for a moment, a look of surprise flashed across his face, he pointed at the screen and said:

“It seems. It seems that someone is intercepting the traffic of the attack!”

Hear this statement.

Xiang Haihua’s fingers that were typing on the keyboard froze suddenly:

“What did you say?”

Wu Jiao carefully observed the data again, and affirmed:

“That’s right, someone is intercepting the information attacking us, RPS is falling, 755772106835”

While talking, Wu Jiao seemed to notice something again.

I only heard him press the earphone heavily with one hand, and his voice suddenly raised a bit:

“Wait, the other party also has our system key, and an external bandwidth provider is accessing a high-level IP!!”

Xiang Haihua’s pupils shrank suddenly, and he blurted out a sentence:

“Own the system key? Is it from the Academy of Sciences?”

Gollum—

Wu Jiao’s Adam’s apple rolled a few times, and he shook his head.

With a weird expression on his face, he said:

“It’s not the Academy of Sciences. The other party didn’t hide the IP of the Internet switch. They are from Luzhou.”

“Luzhou?”

Hear the place name.

Xiang Haihua opened his mouth subconsciously, but he didn’t speak in the end.

Looking at the entire China.

In addition to the core layer of the system, there are only two units that have the key to the educational affairs system of the National University of Science and Technology:

Chinese Academy of Sciences, and

University of Science and Technology of China.

Among them, the Academy of Sciences is in Yanjing, and the University of Science and Technology of China is in Luzhou.

So where the reinforcements are coming from now, the answer is very clear.

Xiang Haihua graduated from Beiyou University, and is neither a student of the University of Science and Technology of China nor the University of Science and Technology of China, so there is no emotional entanglement between schools.

But he and Wang Qingchen are acquaintances, and the relationship between them is neither good nor bad.

There is no deep hatred, but there is no less rivalry in the Hongmeng, and she has chased the beautiful hacker Luo Yueyinghui of the Hongmeng, but she has not succeeded.

After being ordered to safety, the two became the directors of the Internet Security Center of two universities at the same time.

The relationship between the past and the past of the new unit, the relationship between the two has become more subtle.

Now that he knows that his old opponent has helped him, it is impossible for Xiang Haihua not to feel touched.

However, the thoughts in his heart belong to his thoughts, the current situation is still critical, and he cannot allow him to feel emotional.

So fast.

Xiang Haihua put his mind back on the offense and defense of the UCAS system.

With the help of HKUST, a large number of data attacks were intercepted and sniped.

The pressure on the Cyber Security Center of the National University of Science and Technology of China immediately decreased a lot.

Xiang Haihua and others began to patch up the loopholes with peace of mind, and self-checked for possible viruses.

Considering the special situation, Xiang Haihua simply chose to block any web requests with “Ping-To” and “Ping-From” HTTP headers.

that’s it.

As time passed by every minute and every second.

The defect level of the UCAS system has gradually recovered from 39% at the peak to 48%.

then 61%

75%

88%

at last.

Following an XSS vulnerability bypass script is laid.

The system is finally back.

100%.

See this scenario.

Xiang Haihua loosened his shoulders suddenly, brushed his thick black hair, and let out a long sigh of relief.

Although the educational administration system suffered heavy losses, the students complained a lot.

But at least the database above the sub-high school has not been compromised, and the school only needs to consider the appeasement of the students in the school.

If you really can’t do it, add 0.1 to your grade point to guarantee you amnesia on the spot every minute.

However, just as it was diverging to Haihua’s thinking.

A mission log suddenly appeared in front of him.

The content of the log is very simple, starting with two IP addresses.

One of them is Neon.

The other Xiang Haihua was a bit unfamiliar, and it took some effort to remember that it was Tuao.

And under the two IP addresses, there is a very simple letter:

【fb, go? 】

See these words.

Xiang Haihua’s eyes widened.

The fb here is not the abbreviation of Facebook, its full spelling is fightback.

is translated into Chinese.

Fight back!

It is clear.

Wang Qingchen’s side not only resisted the attack, but also grabbed the opponent’s heel!

This log not only appeared on Xiang Haihua’s screen, but also appeared in front of the computers of every network security expert.

Almost instantly.

The atmosphere in the entire computer room was solemn, and all the experts turned their heads to look at Xiang Haihua, with fire in their eyes.

it is more than words.

See this scenario.

Xiang Haihua took a deep breath, stood up abruptly, and took off his wig.

After a while.

A big bald head shining brightly under the fluorescent lamp:

“Everyone is there, ready to fight back!”

The leader added one more chapter, and still owed two chapters.

In fact, 8k a day and 9.2k a day before, if you are thick-skinned and add one more chapter, it feels reasonable, but after thinking about it, forget it. If you say add three chapters, then add three chapters of the text, not false.

Try to return the remaining two chapters as soon as possible.

(end of this chapter)


Tip: You can use left, right, A and D keyboard keys to browse between chapters.