Article count:16428 Read by:87919360

Hottest Technical Articles
Exclusive: A senior executive of NetEase Games was taken away for investigation due to corruption
OPPO is going global, and moving forward
It is reported that Xiaohongshu is testing to directly direct traffic to personal WeChat; Luckin Coffee is reported to enter the US and hit Starbucks with $2, but the official declined to comment; It is reported that JD Pay will be connected to Taobao and Tmall丨E-commerce Morning News
Yu Kai of Horizon Robotics stands at the historical crossroads of China's intelligent driving
Lei Jun: Don't be superstitious about BBA, domestic brands are rising in an all-round way; Big V angrily criticized Porsche 4S store recall "sexy operation": brainless and illegal; Renault returns to China and is building a research and development team
A single sentence from an overseas blogger caused an overseas product to become scrapped instantly. This is a painful lesson. Amazon, Walmart, etc. began to implement a no-return and refund policy. A "civil war" broke out between Temu's semi-hosted and fully-hosted services.
Tmall 3C home appliances double 11 explosion: brands and platforms rush to
Shareholders reveal the inside story of Huayun Data fraud: thousands of official seals were forged, and more than 3 billion yuan was defrauded; Musk was exposed to want 14 mothers and children to live in a secret family estate; Yang Yuanqing said that Lenovo had difficulty recruiting employees when it went overseas in the early days
The app is coming! Robin Li will give a keynote speech on November 12, and the poster reveals a huge amount of information
It is said that Zhong Shanshan asked the packaged water department to sign a "military order" and the entire department would be dismissed if the performance did not meet the standard; Ren Zhengfei said that it is still impossible to say that Huawei has survived; Bilibili reported that employees manipulated the lottery丨Leifeng Morning News
Account Entry

Hackers are busy: taking huge bonuses and helping police solve cases | Zhaike Weekly

Latest update time:2016-11-12
    Reads:
Leifeng.com is recruiting!

Join Leifeng.com, share the information dividend of the AI ​​era, and walk with the intelligent future. I heard that all the great people have clicked here .



1. The competition that allows hackers to earn $1.7 million by just moving their mouse is called PwnFest


The world is often cruel to artists.


For example, A-Da, which inherited the old Shanghai flavor with scallion pancakes, was almost forced to close due to a license issue.


For example, hackers who move like the wind in the cyber world once had to abandon their moral bottom line in order to get rich.


However, the world is not too bad. Ah Da has become an Internet celebrity and opened a new store. For hackers who are obsessed with technology, there has been more and more good news in recent years. Hacker competitions represented by Pwn2Own and CTF flag-grabbing competitions participated by various hacker teams seem to be giving hackers who stare at the screen for 23 hours a day a chance to make money.


However, this opportunity came too soon. This year, the PwnFest hacking competition to be held in South Korea has a total prize of $1.7 million.


Let me tell you how crazy this number is. This amount of money is enough to buy a pretty decent house in the capital.


Don't get too excited, hackers watching TV, it might be a little late to sign up now. The competition starts in a few hours. Let's take a (tearful) look at how this competition is played.


For more information, please see: One vulnerability for one house? This competition allows hackers to earn $1.7 million by just moving their mouse is called PwnFest



2. Three interesting inside stories behind the Chinese hacker winning the $140,000 prize


The browser is the best entry point for hackers to attack Windows. For example, the IE browser, which was once in ruins, often caused great trouble for Windows.


Although Edge is the second son, it feels much stronger than its big brother IE in terms of security.


Veteran hackers may have felt that this browser, which was just launched last year, is very solid in terms of design structure. In addition, Microsoft is making every effort to increase the security of Edge using the brains of the world's top researchers.


However, at today's PwnFest 2016 hacking competition, Chinese hackers once again took down the latest version of Edge running on the latest version of Windows, making Edge once again lose the opportunity to show off in front of the world.


This group of hackers is from 360 Security Team.




For more details, please see: PwnFest 2016 | Chinese hackers break into Microsoft Edge and take down Windows, three interesting inside stories behind the $140,000 prize



3. Police officer’s case handling record: How to catch “micro-business fraudsters”


A: We have such an activity. You deposit 100 yuan first, buy our toothpaste and cooking oil, and after a period of time, we will return all the cash to you.

B: Liar, turn left when you go out, you’re welcome.


This shouldn't fool you, let's try another way.


A: We have such an activity. You deposit 100 yuan first, buy our toothpaste and cooking oil, and after a period of time, we will return all the cash to you.


You accidentally deposited 100 yuan, and since you have enough money, you might as well give it a try. Two days later, you really received a product worth 100 yuan, and a week later, the 100 yuan returned to your account. You were so happy that you deposited 2,000 yuan into it.

And then, nothing happened.


On November 10, at the 2016 China Internet Security Summit (CSS) Fintech Security Session, Xu Guoai, head of Tencent's Big Financial Security, mentioned this sad story when introducing the particularly serious topic of cooperating with police in many places to combat online fraud and ensure financial security. He said that he had cooperated with the police to crack down on this gang that used WeChat business channels to commit fraud.


Perhaps in order to teach people a lesson, as soon as his speech ended, a uniformed policeman, Zhu Hai, deputy captain of the Seventh Brigade of the Criminal Investigation Bureau of the Shenzhen Public Security Bureau, gave the audience a detailed account of the case on the spot.



For details, please see: 2016 CSS | A "bloody case" caused by a barrel of oil, a police investigation record: How to catch a "micro-business fraudster"



4. Hacker Seeker can break through 4G and get your text messages, and also provide spy tools for Chaoyang people



In a cafe in Shangdi, Beijing, I am waiting for the arrival of hacker Seeker.


I have high expectations for hacker Seeker. He once gave a speech at the hacker conference KCon titled "Advanced Exploitation Technology of Fake Base Stations - Completely Breaking SMS Verification Codes", introducing the use of LTE/4G fake base stations + GSM man-in-the-middle attacks to break all SMS verification codes. This technology is the same as the LTE fake base station technology that the 360 ​​Unicorn Security Team once revealed. Seeker also went to the 360 ​​office to communicate with the team. Later, he told me that there were only some differences in the code implementation.


Seeker once gave a brief introduction in his PPT:


A mentor for entrepreneurs who have failed in their entrepreneurial endeavors;

Pseudo angel investors;

The founder and president of a non-famous private university;

In my spare time, I do odd jobs in the school’s communications security laboratory.


His main job is not hacking, which makes me even more curious.


I was waiting in the cafe at that time, and I didn't know that a few hours later I would see Seeker take out a complete set of hacker equipment from his big backpack that he could carry with him to set up a fake base station at any time. Although, he told me that he didn't bring a power amplifier and the cracking range was only a few meters. But I knew that as long as he wanted, my phone across from him could be under his control at any time.




Click on a keyword to view related historical articles


PwnFest 2016 Special


One vulnerability, one house? This competition allows hackers to earn $1.7 million just by moving their mouse

Chinese hackers break into Edge and take down Windows. Three inside stories behind the $140,000 prize

Chinese hacker Tang Qinghao demonstrated a light-speed VMware virtual machine escape. What happened behind these 20 seconds?



Alibaba's "Double 11" Party

With Trump in office, are American automakers panicking?

Commercial sex robots | Taobao Buy+ | Zhang Xiaolong's internal speech

Musk's solar tiles | Foreign journalists evaluate LeEco's ecosystem

Xiaomi Mi MIX | Xiaomi VR | Huawei Kirin 960

MacBook Pro Launch | Microsoft Launch 2016

Hammer M1/M1L | Loongson 3A3000 | Samsung Note 7

DJI Mavic | Google Home

Domestic multi-line laser radar | Google Daydream VR helmet

Xiaomi 5s | Movidius | lightning | Prisma | Live

Xiaomi Robot Vacuum Cleaner | Yi M1 Micro Single Camera | Xiaomi Notebook

App ID | Huawei drone | Amazon Echo



Latest articles about

Database "Suicide Squad" 
Exclusive: Yin Shiming takes over as President of Google Cloud China 
After more than 150 days in space, the US astronaut has become thin and has a cone-shaped face. NASA insists that she is safe and healthy; it is reported that the general manager of marketing of NetEase Games has resigned but has not lost contact; Yuanhang Automobile has reduced salaries and laid off employees, and delayed salary payments 
Exclusive: Google Cloud China's top executive Li Kongyuan may leave, former Microsoft executive Shen Bin is expected to take over 
Tiktok's daily transaction volume is growing very slowly, far behind Temu; Amazon employees exposed that they work overtime without compensation; Trump's tariff proposal may cause a surge in the prices of imported goods in the United States 
OpenAI's 7-year security veteran and Chinese executive officially announced his resignation and may return to China; Yan Shuicheng resigned as the president of Kunlun Wanwei Research Institute; ByteDance's self-developed video generation model is open for use丨AI Intelligence Bureau 
Seven Swordsmen 
A 39-year-old man died suddenly while working after working 41 hours of overtime in 8 days. The company involved: It is a labor dispatch company; NetEase Games executives were taken away for investigation due to corruption; ByteDance does not encourage employees to call each other "brother" or "sister" 
The competition pressure on Douyin products is getting bigger and bigger, and the original hot-selling routines are no longer effective; scalpers are frantically making money across borders, and Pop Mart has become the code for wealth; Chinese has become the highest-paid foreign language in Mexico丨Overseas Morning News 
ByteDance has launched internal testing of Doubao, officially entering the field of AI video generation; Trump's return may be beneficial to the development of AI; Taobao upgrades its AI product "Business Manager" to help Double Eleven丨AI Intelligence Bureau 

 
EEWorld WeChat Subscription

 
EEWorld WeChat Service Number

 
AutoDevelopers

About Us Customer Service Contact Information Datasheet Sitemap LatestNews

Room 1530, Zhongguancun MOOC Times Building,Block B, 18 Zhongguancun Street, Haidian District,Beijing, China Tel:(010)82350740 Postcode:100190

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号