2014年11月27日 星期四

---Today we're going to mix a bit of a hacker or geek News Joho, see who create a lot of big drug Huang false information under false international security people, they share from each tribe master hacker, and some wonderful gesture advanced protection information it can be said that they virtuosity to incorporated by reference (1) .Get instant updates on # bubble @ paopaone [China Internet Illegal syndicates incomplete archive] - [text / special investigator]--(2 ) ."FREEBUF - *Approaching Science: How to get a wide variety of terminals - posture clever Editor: p0tt1 [certificate of]* -(3) [51.com]- [security information] conspiracy calculation. Alipay bank account repeatedly stolen all because of the famous hacker tricks incorporated [Anonymous] [25 November 2014] - ---今天我們要來一點混合的黑客或極客新聞情報,看看誰個大毒皇製造大量假安全資訊蒙混國際的人們,這些分享來自各黑客部落高手,有的姿勢美妙的高級防護信息也可說他們技巧高超,以引為參考.(1).Get instant updates on #泡泡 ‏@ paopaone[中國互聯網違法犯罪集團不完全檔案]--[文/ 特別調查員]- --(2).FREEBUF*--*走近科学:如何搞定各种各样的终端机--姿勢巧妙編者: p0tt1 [认证作者]*--(3).[51.com]-[安全资讯] 合谋算计支付宝银行账号屡被盗全因黑客做手脚 著名編入[佚名][2014年11月25日]- **USA/UK/SEAOUL KOREAN/TW/MACAU(FDZ)/HKS/FR/JP/UKN/DE/FA/POL/VI/ESP`/CO/ARG/PY/MEX/MO/AUST./RU/HO/MAL/NW/CA/IT/PH/Swedis/Mongolian/TUR/Arabic/Latin/INDON./Greek/Dansk/THAI/......All the world lauguage**-

---Today we're going to mix a bit of a hacker or geek News Joho, see who create a lot of big drug Huang false information under false international security people, they share from each tribe master hacker, and some wonderful gesture advanced protection information it can be said that they virtuosity to incorporated by
reference (1) .Get instant updates on # bubble @ paopaone [China Internet Illegal syndicates incomplete archive] - [text / special investigator]--(2 ) ."FREEBUF - *Approaching Science: How to get a wide variety of terminals - posture clever Editor: p0tt1 [certificate of]* -(3) [51.com]- [security information] conspiracy calculation. Alipay bank account repeatedly stolen all because of the famous hacker tricks incorporated [Anonymous] [25 November 2014] -
---今天我們要來一點混合的黑客或極客新聞情報,看看誰個大毒皇製造大量假安全資訊蒙混國際的人們,這些分享來自各黑客部落高手,有的姿勢美妙的高級防護信息也可說他們技巧高超,以引為參考.(1).Get instant updates on #泡泡 ‏@ paopaone[中國互聯網違法犯罪集團不完全檔案]--[文/ 特別調查員]- --(2).FREEBUF*--*走近科学:如何搞定各种各样的终端机--姿勢巧妙編者: p0tt1 [认证作者]*--(3).[51.com]-[安全资讯] 合谋算计支付宝银行账号屡被盗全因黑客做手脚 著名編入[佚名][2014年11月25日]-
**USA/UK/SEAOUL KOREAN/TW/MACAU(FDZ)/HKS/FR/JP/UKN/DE/FA/POL/VI/ESP`/CO/ARG/PY/MEX/MO/AUST./RU/HO/MAL/NW/CA/IT/PH/Swedis/Mongolian/TUR/Arabic/Latin/INDON./Greek/Dansk/THAI/......All the world lauguage**-

*

-**Please use the god home use Google translator to translate the language of your country or city Oh ^^-
-**請各位用家善用谷歌大神的翻譯器,來翻譯你們的國家或城市的語言喔^^-
-**국가 또는 도시 ^^ 언어를 번역하는the 하나님의 가정에서 사용하는 구글 번역기를 사용하십시오-
-**Se il vous plaît utiliser l'utilisation de la maison de Dieu traducteur de Google pour traduire la langue de votre pays ou ville Oh ^^-
-**あなたの国や都市ああ^^の言語を翻訳するために神の家庭用のGoogle翻訳を使用してください -
-**Будь ласка, використовуйте бог домашнього використання перекладач Google перевести мову вашої країни або міста Oh ^^-
-**Bitte benutzen Sie den Gott den Heimgebrauch Google Übersetzer, um die Sprache Ihres Landes oder Stadt Oh ^^ übersetzen-
-**Käytäthe jumala kotikäyttöön Googlen kääntäjä kääntääthe kieli maata tai kaupunkia Oh ^^-
-**Proszę używać korzystania bóg startowej Google Translator przetłumaczyć język kraju lub miasta Oh ^^-
-**Vui lòng s dng vic s dng thn ch Google phiên dch đ dch các ngôn ng ca đt nước, thành ph ca bn Oh ^^-
-**Utilice el uso dios casa traductor de Google para traducir el idioma de su país o ciudad Oh ^^-
-**Utere deo, domum usu translator Google Translate to the language of patriae, civitatem O ^^-
-**Пожалуйста, используйте бог домашнего использования переводчик Google перевести язык вашей страны или города Oh ^^ -
-**Gebruik de god thuisgebruik Google vertaler naar de taal van uw land of stad Oh ^^ vertalen-
-**Sila gunakan digunakan di rumah tuhan penterjemah Google untuk menterjemahkan bahasa negara atau bandar anda Oh ^^-
-**Bruk gud hjemmebruk Google oversetter til å oversette språket i landet eller byen Oh ^^-
-**Si prega di utilizzare l'uso dio Home page di Google traduttore per tradurre la lingua del proprio paese o città Oh ^^-
-**Mangyaring gamitin ang bahay diyos paggamit tagasalin ng Google upang i-translate ang wika ng iyong bansa o lungsod Oh ^^-
-**Använd guden hemmabruk Google översättare att översätta språket i ditt land eller stad Oh ^^-
-**الرجاء استخدام استخدام إله المنزل مترجم جوجل لترجمة لغة بلدك أو المدينة أوه ^^-
- **Utere deo, domum usu translator Google Translate to the language of patriae, civitatem O ^^-
-**Silahkan gunakan penggunaan dewa rumah Google translator untuk menerjemahkan bahasa negara atau kota Oh ^^-
-**Brug venligst gud hjemmebrug Google oversætter til at oversætte sproget i dit land eller by Oh ^^-
-**Παρακαλώ χρησιμοποιήστε το θεό οικιακή χρήση του Google μεταφραστή να μεταφράσει τη γλώσσα της χώρας ή της πόλης σας Ω ^^-
-**กรุณาใช้theใช้งานที่บ้านพระเจ้าของ Google แปลที่จะแปลภาษาของประเทศหรือเมืองของคุณโอ้ ^^the-
-**Bonvolu uzi la dio hejmo uzo Google tradukisto por traduki la lingvon de via lando aŭ urbo Ho ^^- **



 
“WireLurker(MacHook)”木馬,”“推薦密賊”木馬,越獄捆綁“太極助手”,流氓播放器“快播”。
有意思的是,這些犯罪團伙的投資者都有一個共同的名字,叫“安全衛士360”。
 

 Get instant updates on #
Bubble @ paopaonet

China Internet Illegal syndicates incomplete archives
Text / special investigator

Recently, "WireLurker (MacHook)" Trojan Qihoo 360 again so deep public questioned everyone Jieyue its "anti-virus drug manufacturing," and even allegations that it was "the security industry unspoken rules."

To my knowledge, the so-called "industry rule" was purely malicious speculation, unfounded, but whether Qihoo 360 "anti-virus drug manufacturing," I is not sure, but are holding a "strong suspicion" position.

In fact, the security company is "drug manufacturing antivirus", is an unprovable, nor falsifiable proposition. Once the incident was disclosed, Qihoo 360 employees if it is to do, dismissal; if it's company Qihoo 360 to do, alarm, divestment. In short, attributable to an individual or an outsider, and "Qihoo 360" Ok, this is a reasonable response to it, no matter what the truth.

This time it was "malt land", Qihoo 360, a micro-company investments, its predecessor is a personal website, "Mike Solitude", was traced to a "WireLurker (MacHook)" Trojan creators and disseminators, Qihoo 360 arrests decisive alarm , stay out of it. In this regard, I appreciate.

I do not understand the way that the November 13, Qihoo 360 official microblogging issued a statement makes no mention of its investor relations and "malt land" not to mention "WireLurker (MacHook)" producer who is (in its technical capabilities, reverse analysis of the creators easy), it may give the impression of the outside world in a very guilty conscience, it owed its police arrests inevitably be criticized as "tails to survive."

Until today, November 18, Qihoo 360 was publicly acknowledged its investor relations and "malt land", and announced divestment accountable. Why go back?

Well, you find Baidu pinch frame go to court, I move the bench to watch, give everyone here a material exposure - Qihoo 360 investment companies, who made a lot of poison, only the Beijing area there are at least two (other later exposed, we Shaoanwuzao), one is that we already know "malt land", another is that we do not know "as long." Come, first two shots loser photo:


 News middle of last month, the third-party software windows dark and strong push push advertising software on the Android platform, "Recommended secret thief" Trojan horse, is "a long time, such as" produced. At that time the court official micro-blog and press release were not clear that the identity of the parties, only two words - "Lee" (see below).
 
 Lee Who are they? According to informed sources (case sentencing observers), Lee is the Beijing Technology Co., Ltd. as the legal representative of a long and Modem. Charles does not know, an investigation surprised - "a long time, such as" Investors also Qihoo 360 (as shown above, the information from the Beijing Municipal Bureau of Commerce and Industry).

I note in particular, to date, a month later, Zhou @, @ 360 security guards, @ 360 mobile guards to "recommend secret thief" Trojan said nothing, instead of in the "WireLurker (MacHook)" Trojan high-profile scandal declared that "the first killing" and the attitude of the police to arrest people different person.

It seems, exposure or Qihoo 360 in favor of growth and progress.


 *I was very curious as to why evil involved in Internet companies in recent years, "malt land" (sentences and fines), "a long time, such as" (Detention of unknown origin) and other malicious drug manufacturing, "Tai Chi assistant" push piracy losses equipment (escape legal sanctions), "Nora" Fanhuang and bullying (arrest pending), ...... almost all concerned with Qihoo 360? Who can give the answer? Recalls the first of the year's top ten rogue software's "3721" in order to update the name of the silent install Windows browser 360, ...... picture too hyun, I did not dare look ...... they actually really quite spell.

Finish the story, do not want to use their brains, can loose, love pondering things continue to look down.

Back to the topic, to name a few of China's Internet Crimes Group, a typical case, and make them file.
*


 *Special Note:

     There is no denying the only reason referred to as the "Group" is that they are business or Qihoo 360 Zhou Hongyi, chairman of investment;
     As of now, I do not have any direct evidence of Qihoo 360 Chairman Zhou once or refer it to implement its corporate criminal behavior.

One, "WireLurker (MacHook)" Trojan

Manufacturer: Beijing Information Technology Co., malt ground

Communication platform: malt to Apple forum, Baidu cloud disk, etc.

Investors: Qihoo 360 (angel investors)
*

 Means and hazards:

     IOS application installer provides OS X and Windows platforms, the connection iPhone, iPad and other mobile device users via a USB cable, download and install applications utilizing enterprise deployment mechanism;
     To legitimate application from Apple app store malicious code by adding, removing copyright information, repackage, use the update mechanism of trust in enterprise deployments, replacing the user to download from the Apple app store and legitimate application installation (no effect on the built-in application), to achieve viral infections, control user equipment;
     Download link or two-dimensional code, induce users to directly download and install applications utilizing enterprise deployment mechanism;
     Steal personal information on users of mobile devices, including the device model and serial number, phone number, contact person, and so the list of installed applications.

The so-called enterprise deployment mechanism is provided by Apple for the privilege of corporate development team, without the need to install the app store review, when the update is only identity verification application are the same, in order to quickly publish or update internal applications (in-house app) enterprise users should trust only their work units in such applications, otherwise the consequences can not be expected.

Essentially, "WireLurker" does not take advantage of the Apple device security vulnerabilities, but the use of the user to take advantage of the weakness of mind or other human carelessness. More than six months, the size of the victim has reached 40 million people, seek illegal software promotion expenses (size unknown, pending judicial investigation). The Trojan began in March this year, the first report in June to be friends, but not related to abnormal attention, as early as July is a preliminary analysis of the users, in November were in-depth analysis and a formal report.

According to information provided by the Public Security Bureau, currently Chen, Lee, Wang has been under criminal detention, they will face severe legal sanctions. Which is probably Chen Peng Chen, Lee probably Lei or lifei, Wang Jian Wang is probably not clear why detainees did a segment.

Relevant facts:

 *Legal representative malt Chen Peng personally submit monthly financial statements to Qihoo 360.

Development team members: Duan Ye, Li, lifei etc. (not preclude the use of a pseudonym). After the segment in which the rule of personal information was exposed users, Beijing Sheng Feng Law Firm ("3Q war" Qihoo 360 lawsuits agency) to the relevant requirements of the Forum made quickly delete, copy to the lawyer's letter to the legal malt on behalf of Chen Peng, Chen Peng or malt display is a letter to the Principal, confessed.

Trojans get updated link: "http://app.maiyadi.com/app/getversion.php", upload your personal information link: "http: //app.maiyadi.com/app/saveinfo.php", and later server domain name Change to "comeinbaby.com", but the same path.

Trojans install identifies: com.maiyadi.installer, copyright information: com.maiyadi, use "YK3M5NA37D" digital certificate (business development team ID: "YK3M5NA37D", the development team name: "li fei", to which its uncertain name of the enterprise or whether to apply a false corporate information, present the relevant digital certificate has been revoked apples).

Trojans core files found many "E: \ lifei \ ...", "/ Users / lifei / ..." and other intermediate information from the Visual Studio development environment for Windows and OS X development environment Xcode automatically generated at compile time, display Trojan developers and development teams installer overlap.

Second, the "secret thief recommend" Trojan

Manufacturer: Beijing long as Technology Co.

Communication platform: "Trojan ants" and other applications store

Investors: Qihoo 360 (hundreds of thousands of yuan investment, 360 total cash shares, other relevant personal technology stocks)

Means and hazards:

     Submit to the "Trojan horse ant" and other malicious code applications store illegal third-party Android applications for users to download and install more than 300 models of applications, including micro-channel, microblogging, Baidu and other super application;
     Implant malicious code in real-time monitoring of mobile phone users is running the state, waiting to release its top-level window banners or pop ads (both from "easy integration"), or force the user to download games or software they provide in return. "integral "to get 15 days of free advertising time;
     Process control by the cloud (server name kuaidian360.com).

February 2013 to July, during the six months, the infection of at least 20 million mobile phones, illegal reap advertising.

Long as corporate representatives and Modem was sentenced to three years imprisonment and a fine of 31,000, for a long time as engineers Sun Xuan was sentenced to a year and a half, a fine of 6000. Confiscation of all illegal gains, the state treasury.

Third, the jailbreak bundled "Taiji assistant" push piracy losses equipment

Maker: World Technology Co., Ltd. Beijing leisurely

Communication platform: a foreign jailbreak tool

Investors: Qihoo 360 (A round of strategic investment, part of the funds from the Zhou individual)

Means and hazards:

     Jailbreak team sponsor a foreign exchange bundled "Taiji assistant" (Apple application distribution platform);
     A lot of Apple phone Caton, black and even become a brick (white apples);
     "Tai Chi assistant" to offer their customers a lot of pirated applications is jailbreak team remotely disable (publicly that "intolerable").

Part Information Reference:

http://itjuzi.com/company/2809

http://article.pchome.net/content-1685200.html

Fourth, the rogue player "Nora"

Manufacturer: Shenzhen Technology Co., Ltd. Nora

Communication platform: Nora and Cooperation Platform

Investors: Qihoo 360 Chairman Zhou (number of one million yuan angel investors)

Means and hazards:

     Bundling and silent install third-party software and browser plug-ins, tampering with the user's browser home page and default search engines;
     Pirated films and television shows, was fined 250,000 NCAC, Shenzhen Market Authority was fined 260 million;
     Dissemination of pornographic videos, business licenses revoked until the close outage, legal representative Wang Xin was arrested.

Relevant facts:

360 security browsers have built-in Nora.

Wang Xin saying: "If I become a rogue, please tell people I have had pure."

Part Information Reference:

http://itjuzi.com/company/3999

This article is reproduced with permission from author

 ===============================================================

中國互聯網違法犯罪集團不完全檔案

文/ 特別調查員

最近,“WireLurker(MacHook)”木馬令奇虎360 再次深陷輿論質疑,眾人皆曰其“制毒殺毒”,甚至有人指控這是“安全行業潛規則”。

以本人認知,所謂“行業潛規則”的說法純屬惡意揣測,毫無根據,但奇虎360 是否“制毒殺毒”,本人尚不確定,但對此持“強烈懷疑”立場。

事實上,安全公司是否“制毒殺毒”,是一個不可證明、也不可證偽的命題。 一旦事發並被公開,如果是奇虎360 員工做的,開除員工;如果是奇虎360 旗下公司做的,報警、撤資。 總之,歸責於個人或外人、與“奇虎360”沒關係,這是很合理的應對之道,無論真相如何。

這次輪到“麥芽地”,奇虎360 投資的一家微型公司,其前身是個人網站“麥克孤獨”,被曝是“WireLurker(MacHook)”木馬製作者和傳播者,奇虎360 果斷報警抓人,撇清關係。 對此,本人表示理解。

本 人不理解地是,11月13日,奇虎360 官方微博所發聲明,閉口不提其與“麥芽地”的投資關係,也不提“WireLurker(MacHook)”製作者是誰(以其技術能力,反向分析出製作者易 如反掌),可能給外界以非常心虛的印象,其報警抓人之義舉不可避免被詬病為“斷尾求生”。

直到今天,11月18日,奇虎360 才公開承認其與“麥芽地”的投資關係,並宣布撤資、追責。 早幹嘛去了?

好了,你們找百度上法院掐架去吧,本人搬板凳看熱鬧,在這裡先給大家曝個料——奇虎360 投資企業中,制毒者不少,僅北京地區就至少有兩家(其它的以後再曝,大家稍安勿躁),一家是大家已經知道的“麥芽地”,另一家是大家還不知道的“久如”。 來,倆難兄難弟先拍張合影:

上月中旬新聞報導,安卓平台上向第三方軟件窗口暗推廣告和強推軟件的“推薦密賊”木馬,就是“久如”出品。 當時法院官方微博和新聞稿均未明確指出當事人身份,只有兩個字——“李某”(如下圖)。

李某何許人也? 據知情人士透露(該案宣判旁聽者),李某就是北京久如技術有限公司法人代表李江濤。 不查不知道,一查嚇一跳——“久如”投資人也是奇虎360(如上圖,信息來自北京市工商局)。

本人特別注意到,迄今為止,一個月過去了, @周鴻禕@360安全衛士@360手機衛士對於“推薦密賊”木馬隻字未提,與其在“WireLurker(MacHook)”木馬事件曝光後高調宣稱“率先查殺”並報警抓人的態度判若兩人。

看來,曝光還是有利於奇虎360 成長和進步的。

本人很是好奇,為什麼近年作惡涉案的互聯網公司,“麥芽地”(判刑和罰金)、“久如”(刑拘待查)等惡意制毒,“太極助手”推盜版損設備(逃過法律制裁), “快播”販黃兼耍流氓(逮捕待審),……幾乎都與奇虎360 有關? 誰能給出答案? 回憶起當年的十大流氓軟件之首“3721”、以更新Windows 之名靜默安裝360 瀏覽器,……畫面太炫,本人不敢看……他們其實真的蠻拼的。

故事講完了,不想動腦筋的,可以散了,愛琢磨事的,繼續往下看。

回到正題,列舉中國互聯網違法犯罪集團的幾個典型案例,為他們立檔。
特別聲明:
  1. 不必諱言,稱其為“集團”的唯一理由是,他們都是奇虎360或其董事長周鴻禕投資的企業;
  2. 截至目前,本人沒有任何直接證據證明奇虎360或其董事長周鴻禕曾指使其旗下企業實施違法犯罪行為。
一、“WireLurker(MacHook)”木馬
製造者:北京麥芽地信息技術有限公司
傳播平台:麥芽地蘋果論壇、百度雲盤等
投資者:奇虎360(天使投資)

手段與危害:
  1. 提供OS X 和Windows 平台下的iOS 應用安裝器,通過USB 數據線連接iPhone、iPad 等用戶移動設備,下載並利用企業部署機制安裝應用;
  2. 向來自蘋果app store 的合法應用加入惡意代碼、剔除版權信息等,重新打包,利用更新機制對企業部署的信任,替換用戶從蘋果app store 下載和安裝的合法應用(對內置應用無影響),實現病毒式感染,控制用戶設備;
  3. 提供下載鏈接或二維碼,誘導用戶直接下載並利用企業部署機制安裝應用;
  4. 竊取用戶移動設備上的個人信息,包括設備型號和編號、手機號碼、聯繫人、已安裝應用列表等。
所謂企業部署機制,是蘋果提供給企業開發團隊的特權,無需通過app store 審核即可安裝,更新時也僅校驗應用標識是否一致,以便於企業快速發布或更新內部應用(in-house app) ,用戶應僅信任其所在工作單位提供的此類應用,否則後果無法預期。

本質上講,“WireLurker”並非利用蘋果設備安全漏洞,而是利用用戶佔便宜心態或粗心大意等人性弱點。 半年多來,受害規模已達40萬人次,非法牟取軟件推廣費(規模不詳,待司法調查)。 該木馬始於今年3月,最早6月被網友報告相關異常但未引起重視,最早7月被網友初步分析,11月被深入分析並正式報告。

根據公安局提供的信息,目前陳某、李某、王某已被刑事拘留,他們將面臨法律的嚴厲制裁。 其中,陳某可能就是陳鵬,李某可能就是李磊或lifei,王某可能就是王劍,不清楚被拘留的為何沒有段某。

相關事實:
麥芽地法人代表陳鵬每月親自向奇虎360提交財務報表。

開發團隊成員:段冶、李磊、lifei等(不排除使用化名)。 其中段冶個人信​​息被網友曝光後,北京盛峰律師事務所(“3Q大戰”奇虎360 的訴訟代理機構)向有關論壇發律師函要求刪除,律師函抄送給麥芽地法人代表陳鵬,顯示陳鵬或麥芽地就是發函委託方,不打自招。

獲取木馬更新鏈接:“ http://app.maiyadi.com/app/getversion.php ”,上傳用戶個人信息鏈接:“http: //app.maiyadi.com/app/saveinfo.php”,後來服務器域名更改為“comeinbaby.com”,但路徑相同。

木 馬程序安裝器標識:com.maiyadi.installer,版權信息:com.maiyadi,使用“YK3M5NA37D”的數字證書(企業開發 團隊ID:“YK3M5NA37D”,開發團隊名稱:“li fei”,不確定其以哪個企業名義或是否以虛假企業信息申請,目前相關數字證書已被蘋果吊銷)。

木馬程序核心文件多處發現“E:\lifei\...”、“/Users/lifei/...”等由Windows 開發環境Visual Studio 和OS X 開發環境Xcode 在編譯時自動生成的中間信息,顯示木馬開發者與安裝器開發團隊重疊。

二、“推薦密賊”木馬
製造者:北京久如技術有限公司
傳播平台:“木馬蟻”等應用商店
投資者:奇虎360(數十萬人民幣投資,360佔全部現金股份,其它為相關個人技術股)

手段與危害:
  1. 向“木馬蟻”等應用商店提交非法植入惡意代碼的第三方安卓應用供用戶下載和安裝,超過300款應用,其中包括微信、微博、百度等超級應用;
  2. 植入的惡意代碼實時監控用戶手機中的程序運行狀態,伺機向其頂層窗口發布橫幅廣告或彈窗廣告(均來自“易積分”),或強制用戶下載其提供的各種遊戲或軟件以換取“積分”、得到15天的無廣告時間;
  3. 過程受雲端控制(服務器域名kuaidian360.com)。
2013年2月到7月,半年期間,感染至少20多萬台手機,非法牟取廣告費。

久如公司法人代表李江濤被判處有期徒刑三年、罰金31000,久如公司工程師孫軒被判處有期徒刑一年半、罰金6000。 沒收全部非法所得,上繳國庫。
三、越獄捆綁“太極助手”推盜版損設
製造者:北京悠然天地科技有限公司
傳播平台:國外某越獄工具
投資者:奇虎360(A輪戰略投資,部分資金來自周鴻禕個人)

手段與危害:
  1. 贊助國外某越獄團隊,換取捆綁“太極助手”(蘋果應用分發平台);
  2. 大量蘋果手機出現卡頓、黑屏甚至變成磚頭(白蘋果);
  3. “太極助手”向其用戶提供大量盜版應用,被越獄團隊遠程禁用(公開表示“不能容忍”)。
部分信息參考資料:
http://itjuzi.com/company/2809
http://article.pchome.net/content-1685200.html
四、流氓播放器“快播”
製造者:深圳快播科技有限公司
傳播平台:快播及其合作平台
投資者:奇虎360董事長周鴻禕(數百萬人民幣天使投資)

手段與危害:
  1. 捆綁和靜默安裝第三方軟件和瀏覽器插件、篡改用戶瀏覽器主頁和默認搜索引擎等;
  2. 盜版電影電視劇,被國家版權局罰款25萬,被深圳市場監管局罰款2.6億;
  3. 傳播淫穢視頻,被吊銷經營許可證,直至關閉停運、法人代表王欣被逮捕。
相關事實:
360安全瀏覽器曾內置快播。
王欣名言:“如果我變成流氓,請告訴別人我曾純真過。”
部分信息參考資料:
http://itjuzi.com/company/3999

本文經作者授權轉載


 =====================================================
 http://www.freebuf.com/news/special/42295.html
 

Approaching Science: How to get a wide variety of terminals

2014-09
 This article provides some methods to bypass terminals, only for the safety of learning and teaching in Figure prohibit illegal use. This paper aims to improve the safety of the terminal market, avoid vandalism.
Poem given field
  The demon does not know all the subway ticket terminal swollen, cmd come say hi king of the ~
 Imperial airport terminal navigation is the industry model, but does not seem to poke through ah ~
 Magic City subway ticketing terminal always behaved lady, can not fail to side within a small leak?
 6C ancient communities restrict payment terminal keystrokes like strike, double-click the trifecta, do not stop?
 ...
 ...... 
EDITORIAL
On the micro-letters before I often get exposed some pictures of the terminal, causing everyone's interest, of course, not the same way every time to get, and the phone back to you one by one, it is reverting process XO enough, and thus had This article can be summarized under way to bypass admission Daniel level, because you always have a different method to get, and your point is always so low slot to give you a note Meme da, next to a comment floor to visit. Here I've used science to the next several common methods and tips bypassed.
0 × 001 What is terminal?
Come on the map on the map:
Well, similar to the figure, that is our common terminals, in fact, such a terminal interoperability, ease of use and practicality are very good, after all, live in a queue for the toilet environment, legislation several such machines can really work to solve various work units queuing difficult problem, well, that's not the point, after all, we are here [*] you!
To sum up: the terminal is to be wrapped up in a variety of shapes Transformers box system and can run a variety of interactive machine half to provide services to customers! (The first time in their definition, the definition of long ~ feel good female vote: Good Long Point)
Well, good, then along Xiaobian students often said, the approach to science: the terminal really safe?
After advertising the next step.
0 × 002 considered how to get the terminal?
Well get this, there are many, such as the problems mentioned at the beginning.
  Pop-up and operation cmd (linux shell friends of course)
 Display and can operate the original operating system's desktop Explorer Registry Manager `` `` `` `` 
In short to get these, we get it, even if for the terminal or obtain permission
In fact, security attack and defense is really a very wonderful thing, there are thousands of protective measures, hacking method to so few, but a method to bypass the various protective measures itself plus the hacker way, we would consider to be a hacker with thousands of skills, I expressed some silent, we will, are you teach! Also, or you force it! (Sorry, I'm a philosopher)
0 × 003 terminals classification
My classification is relatively simple, the following to say in favor of a simple classification method for bypassing the
  1. Companions operational terminals
  2. Touch operation type terminal
As the name implies, can not think I really can not help you ~
0 × 004 ways to get terminals
[Terminal] Companions Operational
This type of terminal is relatively easy for us, because they have a keyboard and mouse, the operation is also more convenient.
No mention is made in front of the terminal protective way, I do not want to mention it is because these protection methods is rotten, direct talk bypassed.
This type of terminal is often disabling right, disable win key, disable cad key combination (ctrl-alt-del), etc., etc.
Why are so many features can be disabled to use it, because the topic itself is a web interface, it does not affect the user experience
Here you can have a map, downstairs bank shot:
From the map you can see:
Clearly is a browser ie, why is ie? Comparison of several browser font display and control the performance of the situation to know ~
The system then pit father is doing a green box inside the two control boxes to the toolbar, address bar, set up and display what are covered ~
Said before disabling a lot of keys and combinations, so suddenly thought alt + f4 students ask themselves under huh.
Described above is just a typical case type terminals are a lot of mouse and keyboard operation like this, in the face of such terminals, we can test those methods? We eleven arrangement:
  1. Programmers try to reserve the back door:
    You have to try the double right to try to see if there will be any menu, or right click and so three ~~~ This is the programmer Nima stay
  2. Programmers often these procedures are not fixed frame
    What? You can adjust the border? Yes, the top of the mouse to one of the most corners, and then to pull the center of the screen and click the left button, Huh? Is not like scratch? Jun thick line of desktop?
  3. Crazy Click law
    Do not laugh, no matter how good the program has the possibility of collapse, we do not discuss what that piece of masking procedures, point link if you keep in ie browser, or mask what the software above back row forward , the program may crash quit. (This method is a lot of work in the hall or pharmacy-tested, so the technology can not handle, the unicorn arm can!)
  4. Class outlook methods
    There are many pages Contact us ah, recruitment liaison, ah, ah, what the boss mail, after you click on the browser to call the outlook disappointing not to go, after opening you can choose what to upload attachments in outlook, the pop-up file selection box, then? Then you find cmd to chant! What? Permissions low? Nothing, still in the file selection box, where you can right-general, the new 1.txt, written inside the cmd, and then rename 1.bat, well, it was finally able to throw the soap.
  5. xss methods
    I really do not want to say this, there is a wool xss said it? Just find a search, then Bouncing bomb ~ pop cmd ~
  6. Hand residual method
    Press and hold the left mouse button click and hold the page do not loose, who knows tm programmer set up right trigger time is the number of milliseconds? More so will chant, they can not get pregnant -
  7. Supplement 1:
    How to do what's in front of that reserved for the back door or press and what trifecta of what can be seen on the rear right-click menu on the page? Right-click menu in the "Print" after after opening the next, ah, ah, what controls the installation, see the "Browse" button on the line, tap, file selection box came out, then just like Caesar Method 4
  8. Supplement 2: unusual tips, such as the above picture is, for example, have failed previous method
    You can also click forward or backward, refresh also, so ie the input focus on the browser address bar, and then invisible, blocked, and you lose the blind chant, enter: c: \ windows \ system32 \ cmd.exe and then return, general direct pop, but now eliminated xp, if not bombs, then, after you press Enter twice alt + R, this is generally not closed, this is the ie win7 download cmd.exe After saving shortcuts but not run directly:
The figure on the map:
In fact, there are many ways, but it very much the same, and in the final analysis, or can play! Either can tune! Either can write! Either can be next!
Finally able to see the file you want to run on half the battle, to run completely successful. Not profound ~
[Touch operation type terminal]
Such terminals are now very popular, such as this:
Such a touch screen terminals generally do not have a full keyboard and mouse by clicking and touch to operate, in fact, get it operational methods and Companions of the terminal is the same, you can think, touch screen technology is to point fingers Touch simulate mouse actions, then the mouse to keep the text did not go do a Caesar?
  1. Long press law
    This same reason, long press can not get pregnant, you press the right moment, in case the menu out of it?
  2. Multi-finger touch
    Just two fingers or three fingers on the page, wait - who knows the program Big Brother ape day to eat the medicine is not street vendors to buy? I encountered four fingers simultaneously press and 10 seconds out of the menu (a station platform advertising screen)
  3. Apple's operating system gesture class
    This is like mac trackpad, you keep a finger on another finger-click (two-finger or three-finger mode), and then came out menu
  4. Non-fixed borders France
    The same reason, there is the cursor with your finger to move the cursor to the corners, hold, and drag it to the center of the screen, you can display behind the desktop; no cursor? Point the finger directly at the corners, hold, drag to the center of the screen.
  5. Diagonal
    This may be the management staff in order to save hard to force the programmer to do is put the bottom right corner of a finger, a finger in the upper left corner of the screen while moving towards the center, then? Then the program minimized
After the pop-up menu, and type of terminal and keyboard operation Similarly, pop cmd, take a look at the network, ipc try Smarter weak passwords on the line.
0 × 005 supplementary explanation about the system
If you find a small terminal screen, the font is very familiar with, then please use gestures, because he may be a Android tablet or ipad, fingers grasping, clean yo ~ Android system did not write a lot of applications, crazy clicks xxx.apk stop running, continue or quit!
[I] this problem I found in a hotel chain terminal on the bar (occupancy) on an ipad on
[A] an airport trolley on real-time indoor navigation map on a ViewSonic Android Tablet
0 × 006 and a small share exchange
Devils are starting two subway ticket, went twice, the second to get, but the point of the test ticket, subway ticket with chewing X step as simply can not stop, just Haozhaogongzuo staff to explain and apologize for testing reasons - -!
Yes, the magic friends know certain media taxi terminal on the seat, right?
That also get, if you can get permission to let her or restart or shut down, the group can contact me oh ~ ~ together and exchange some of our partners & Freebuf SniFFeR.Pro little small partner to play with ~
Finally Well, exemption or, trough point increase or, to remind you to test, please notify management personnel authorized to play it safe, do not do anything illegal, or else you will only look after milo play this terminal of:
"Hey, what a strange thing seems to have come in, uh ~~~ seemed nothing wrong."
[This article FreeBuf columnist p0tt1 original]

 
 ###################################################
  http://www.freebuf.com/news/special/42295.html
 

走近科學:如何搞定各種各樣的終端機

2014-09-02
 特別聲明:本文提供一些繞過終端機的方法,僅用於安全學習及教學用圖,禁止非法利用。 本文旨在提高市面上終端機的安全性,避免其遭到惡意破壞。
定場詩
 妖都地鐵售票終端不知道腫麼了,cmd君出來say hi了~
帝都機場導航終端堪稱業界典範,但是好像不經戳啊~
魔都地鐵售票終端一向規規矩矩大家閨秀,小內內能不能不側漏?
 6C古都社區繳費終端擊鍵限制好像罷工了,雙擊單擊三連擊,根本停不下來?
 ...
 ...... 
寫在前面
之前筆者在微信上經常曝光一些搞定的終端機的圖片,引起了大家的興趣,當然了,每次搞定的方法都不一樣,並且手機回復大家挨個回復過程實在是有夠XO,於是乎有了此文,能夠總結下方法,自認大牛級別的繞過, 因為您總有不一樣的方法搞定,並且您的槽點總是那麼的低,給你一記麼麼噠,下次到評論樓層登門拜訪。 這裡給科普下我使用過的幾種方法和常見的繞過的小技巧。
0×001什麼是終端機?
來來來,上圖上圖​​:
好的,類似上圖的呢,就是我們常見的終端機了,其實這樣的終端機操作性,易用性和實用性都是很不錯的, 畢竟生活在一個上廁所都排隊的環境下,立幾台這樣的機器確實能解決各種辦事單位的辦事排隊難問題,好的,這不是重點,畢竟我們是來[*]你的!
綜上所述:終端機就是被各種變形金剛形狀各異的盒子包裹起來的運行著各種各樣系統並且能半交互式給客戶提供服務的機器! (頭一次自己定義,感覺定義好長~~~,女票說:長點好)
恩,好的,那麼順著小編同學經常說的,走近科學:終端機真的安全嗎?
廣告之後進入下一個環節。
0×002怎麼才算搞定了終端機?
這個搞定嘛,有很多種,比如說開篇提到的各種問題。
 彈出和操作cmd(linux當然就shell啦)
顯示並可以操作原操作系統的桌面資源管理器註冊表管理器```````` 
總之拿到這些,咱麼就算針對該終端機搞定或者獲取了權限
其實安全攻防真是很奇妙的事情,防護的措施有成千上萬種,黑客攻擊的方法就那麼幾種,但是繞過各種防護措施的方法加上黑客本身會的方法,大家就認為黑客要具備成千上萬的技能,我表示有些無語,我們會的,都是你們教的! 亦或是你們逼的! (不好意思,我是一個哲人)
0×003終端機的分類
我的分類比較簡單,簡單分類有利於下面說針對的繞過方法
  1. 鍵鼠操作型終端機
  2. 觸控操作型終端機
顧名思義,思不了的我真的幫不了你~
0×004搞定終端機的方法
【鍵鼠操作型終端機】
這種類型的終端機對我們來說相對方便,因為擁有了鍵盤和鼠標,操作起來也比較方便。
前面沒有提到的是終端機的防護方法,我不想提是因為這些防護方法實在是爛透了,直接講講繞過。
這種類型終端機往往會禁用右鍵,禁用win鍵,禁用cad組合鍵(ctrl-alt-del)等等等等
為什麼禁用這麼多功能還能用呢,因為本身主題界面就是一個網頁,所以不影響用戶體驗
此處可以有圖,樓下銀行拍的:
從上圖可以看見:
很顯然是一個ie瀏覽器,為什麼是ie? 對比幾個瀏覽器的字體顯示和控件表現情況就知道了~
然後系統坑爹的是做了綠色框裡面的兩個控件框把工具欄,地址欄,設置和顯示什麼的都遮住了~
之前說過了禁用了很多的按鍵和組合,所以突然想到alt+f4的同學請自己呵呵下。
上面只是介紹一個典型的案例很多鍵鼠操作型終端機都是類似這樣,面對這樣的終端機,大家可以先測試那些方法呢? 我們一一排列:
  1. 程序員預留後門嘗試:
    你要嘗試的是雙擊右鍵的嘗試,看看會不會有菜單,或三擊右鍵等等~~~這尼瑪是程序員自己留的
  2. 很多程序員些程序的時候沒有採用固定邊框
    什麼? 可以調節邊框? 是的,把鼠標頂到一個最頂角,然後單擊左鍵後往屏幕中央拉,咦? 是不是很像刮刮樂? 桌面君粗線了?
  3. 瘋狂點擊法
    別笑,再好的程序都有崩潰的可能性,咱麼不討論遮罩那一塊的程序,如果你在ie瀏覽器裡不停的點鏈接,或者是遮罩軟件上面那一排前進後退什麼的,程序可能就崩潰退出了。 (這個方法在很多辦事大廳或者藥房裡屢試不爽,所以,技術搞不定的,麒麟臂就可以!)
  4. 類outlook的方法
    很多網頁上有聯繫我們啊,招聘聯絡啊,老總信箱啊什麼的,你點擊以後,瀏覽器就不爭氣的去調用outlook去了,打開後你可以在outlook裡選擇上傳附件什麼的,彈出文件選擇框,然後? 然後你找cmd去唄! 什麼? 權限低? 沒事,還在文件選擇框裡,這裡可以右鍵了一般,新建1.txt,裡面寫上cmd,然後重命名1.bat,好的,這下終於可以丟肥皂了。
  5. xss的方法
    我是真的不想說這個,有xss還說個毛線呢? 隨便找個搜索,然後彈彈彈~彈出cmd~
  6. 手殘法
    長按,鼠標左鍵點住頁面不要松,誰tm知道程序員設置了右鍵觸發時間是多少毫秒? 多等會唄,又不會懷孕~
  7. 補充1:
    前面說預留後門什麼的長按什麼的或者三連擊什麼,能夠看到網頁上的右鍵菜單後怎麼辦? 右鍵菜單裡有“打印”,點開後後下一步啊,安裝控件啊什麼的,看到“瀏覽”按鈕就行了,點一下,文件選擇框就出來了,然後就跟方法4一樣了撒
  8. 補充2:不常用的小技巧,比如上面那張圖,比如前面的方法都失敗了
    你 還可以點擊一下前進或者後退,刷新也行,這樣ie瀏覽器的輸入焦點就在地址欄裡了,那麼看不見,被擋住了,你就盲輸唄,輸入:c:\windows \system32\ cmd.exe 然後回車,一般直接彈出,不過現在淘汰xp,如果彈不出的話,請在回車後按兩次alt+R,這個一般是不封的,這個是win7的ie下載cmd.exe後 不是保存而是直接運行的快捷鍵:
上圖上圖:
其實還有很多方法,不過就大同小異了,歸根結底,要么能彈! 要么能調! 要么能寫! 要么能下!
最終能看到你要運行的文件就成功一半,能運行就完全成功了。 並不高深~
【觸控操作型終端機】
這樣的終端機現在很流行了比如這樣的:
這樣的觸屏終端機一般沒有完整的鍵盤和鼠標靠點擊和触控來操作,其實搞定它的方法和鍵鼠操作型的終端機是一樣的,你可以這樣想,觸屏技術就是將手指點觸模擬成鼠標操作,那麼,鼠標操作跟上文就沒去別了撒?
  1. 長按法
    這個一樣道理,長按不會懷孕,你就按會兒吧,萬一菜單出來了呢?
  2. 多指觸控
    就是兩個手指或三個手指放在頁面上,等待~誰知道程序猿大哥那天​​吃的藥是不是路邊攤買的? 我就遇到過四指同時長按10秒出菜單的(某車站站台廣告屏)
  3. 類蘋果系統的操作手勢
    這個就像mac的觸控板,你一個手指按住另一個手指不停單擊(兩指或三指模式),然後菜單就出來了
  4. 非固定邊框法
    一樣道理,有光標的,用手指把光標移動到邊角,按住,然後往屏幕中心拖動,可以顯示背後的桌面;沒有光標的? 直接將手指點在邊角,按住,往屏幕中心拖。
  5. 對角線法
    這個可能是管理人員為了省事讓程序員苦逼做的,就是一個手指放在右下角,一個手指在左上角,同時向屏幕中心移動,然後? 然後程序最小化了
彈出菜單之後和鍵鼠操作型的終端機同理,彈出cmd,看看內網,ipc試試弱口令神馬的就行。
0×005關於系統的補充說明
如果你發現終端機屏幕很小,字體很熟悉,那麼請用手勢吧,因為他可能就是一個安卓平板或者ipad,五指一抓,清潔溜溜~安卓系統很多應用沒寫好,瘋狂點擊就xxx.apk停止運行,繼續或退出!
【I】這種問題我是在某連鎖酒店的吧台上的終端機(入住)上發現的,就一ipad
【A】某機場手推車上的實時室內地圖導航就一優派的安卓平板
0×006分享和小交流
先發兩張魔都地鐵售票的,去了兩次,二次搞定, 不過點了出票測試,地鐵票跟嚼了X邁一樣,根本停不下來,只好找工作人員解釋測試緣由和道歉- -!
對了,魔都的朋友都知道出租車座椅上的某某傳媒的終端機吧?
那個也搞定了,如果你也能獲取到權限或者讓她重啟或關機,可以群里聯系我哦~一起交流些~ 和我們SniFFeR.Pro的小伙伴&Freebuf的小伙伴們一起玩耍~
最後嘛,免責也好,增加槽點也好,提醒大家測試請通知管理人員,獲得授權,明哲保身,不要做任何違法的事情,否則以後你就只能看著蜀黍玩這種終端機了:
“咦,好像有什麼奇怪的東西進來了,恩~~~好像又沒什麼不對”
[本文為FreeBuf專欄 ​​作者p0tt1原創]





 
 ##############################################################
 http://www.ourlove520.com/News/anquan/201411/334150.html

 Conspiracy calculations Alipay bank account repeatedly stolen all because of hacker tricks
Article Entry: Anonymous Editor: admin Updated: 2014-11-25


 IT Learning Network - a love of learning Abstract: The online world there is always a lot of folk masters, by virtue of individual talent developed various types of software, they want to get into any intrusive network "area", regarded as a " hacker "level, however, this kind! If you misplaced ingenuity, to network users in the world to bring some of that unmitigated disaster.
The online world there are always a lot of folk masters, by virtue of individual talent developed various types of software, they want to get into any intrusive network "area", regarded as a " hacker "level! However, if this kind of intelligence in the wrong place, to a network of some of the world's Internet users is brought unmitigated disaster.
合谋算计支付宝银行账号屡被盗全因黑客做手脚
Qinzhou City, Guangxi Zhuang Autonomous Region after 90 guy Hwang, screen name "and sea," which the network name is really quite bluffing, although he is not a computer "hackers", however, but in the network with the pseudonym of network " hackers "master class AC, his goal very clear, now Taobao shop fire was a mess, with all PayPal transaction, if you want to get Alipay can invade computer software to steal money Alipay, this "business" is certainly good .
"Fa Hai" from the Internet really got this computer software, the timid and sea, he did not dare to do, but also to avoid the risk of committing the crime, he continued to communicate with these users on the Internet, Shandong Longkou guy Zhang and children He contacted, and the two hit it off.
Zhang screen name "Garfield", very cute name, is not doing nothing but good to each other can not be true selves. Exchange, Hwang said he was a computer in the Internet can invade Alipay software, as long as the lock someone Paypal account, Paypal account bundled with bank card password that you know, and then pay for online banking transfers, will be successful.
Zhang listen to understand the meaning, I thought, you have this software, you do not, gave me to use, anyone not "Biao child." Zhang replied: "I want this software, but can not be paid directly to you 'cost', I need to use the software to successfully get the money, and give you 'into'."
Hwang computer programmer in the original design of the software out there is merit, Zage Supreme Court? If the other promises, the software can only exist just a few days will fail, so afraid of you "play with me", both on the Internet on the "deal" was.
April 3 this year, Zhang sent from the use of this software Hwang Wen invasion Alipay account, successfully steal Alipay account bundled with this bank card password, an online transfer, the Cary 9752 dollars went to Zhang certain accounts. Zhang get ill-gotten gains, according to the agreement and give him 1,000 yuan Hwang, of course, everything is conducted in secret.
Dalian network security police received a report, saying "the devil" and "Road" is a trade-off, both the increase in the rivalry, "Strength", Dalian police cracked this case, Hwang, Zhang also are appearing in court. According to the suspects confessed that they do more than this kind of case, but invade the network to pay cash in the bank card password treasure case, the amount involved is not too big, small is tens of dollars, as many as a hundred, probably precisely for this reason, the victim did not report, the police will not be able to trace depth.
As developed the software " hackers ", hidden in the breadth and depth of the network in the ocean, the police again arrested stand it. Two suspects to return the stolen money.
The results
Sand district court of first instance verdict, guilty of theft, for Zhang, Hwang each sentenced to seven months and fined 15,000 yuan. The case in early November this year to take effect.
Reviews
This is: "Fa Hai" encounter "Garfield" conspiracy calculating Paypal, bank account full of stolen, all because the hacker tricks.
The vast expanse of the Internet world, both amplified genius IQ, but also the desire to enlarge the devil, the yin and yang of human nature, have been highlighted in this world, the more prominent "Wild World" cunning and unpredictable.
However, the magic goes, Road ridge. Some evil intents, someone uphold justice, someone want to play games, some people want you to look good! network carrier just a vast, even if I was in a network cable that end, you are in the cable end of the line, ghost is difficult to distinguish, androgynous, but After all, there is always a trail to follow.
After all, the Internet as a global new things, to the construction of the global village provides much convenience, but it is after all just a tool, criminals can take advantage of it, and the people's police can also use it for a fair world, the competition after all IQ and ability.
As the Internet becomes more prosperous trading today, illegal elements like viruses , like, always ready capture fat and defects of their eyes, of course, every trading will certainly be under pressure in this attack, constantly updated equipment, upgrading, this is probably the game a never-ending battle. IT Learning Network - a love of learning Abstract: The online world there is always a lot of folk masters, by virtue of individual talent developed various types of software, they want to get into any intrusive network "area", regarded as a " hacker "level, however, this kind! If you misplaced ingenuity, to network users in the world to bring some of that unmitigated disaster.



 From IT Learning Network ( www.ourlove520.com )

 =================================================
 http://www.ourlove520.com/News/anquan/201411/334150.html


合謀算計支付寶銀行賬號屢被盜全因黑客做手腳


文章錄入:佚名責任編輯:admin 更新時間: 2014-11-25




 IT學習網-愛學習摘要:網絡世界總有不少民間高手,憑藉個人才華研究出各類軟件,任意侵入其所想進入的網絡 “區域”,算得上是“ 黑客 ”水平!不過,這類聰明才智若用錯了地方,給網絡世界的某些網民帶來的就是不折不扣的災難。
網絡世界總有不少民間高手,憑藉個人才華研究出各類軟件,任意侵入其所想進入的網絡 “區域”,算得上是“ 黑客 ”水平!不過,這類聰明才智若用錯了地方,給網絡世界的某些網民帶來的就是不折不扣的災難。
合谋算计支付宝银行账号屡被盗全因黑客做手脚
廣西壯族自治區的欽州市90後小伙黃某,網名“法海”,這網名實在挺唬人的,他雖然並不是什麼電腦 “黑客”,不過,卻在網絡中與化名的網絡黑客 ”類高手有交流,他的目標挺明確,現在淘寶網購物火得一塌糊塗,用的都是支付寶交易,如果想弄到可以侵入支付寶的電腦軟件來盜竊支付寶裡的錢財,這“生意”肯定好。
“法海”還真從網上弄到了這種電腦軟件,這個法海膽子小,他自己不敢干,也是為了規避作案風險,他在網上不斷與此類網友交流,山東龍口小伙兒張某與他聯繫上了,兩人一拍即合。
張某網名 ”加菲貓“,挺可愛的名字,幹的卻都不是好事,彼此不能以真面目示人。 交流中,黃某表示,自己電腦中有可以侵入互聯網支付寶的軟件,只要鎖定某人支付寶賬號,與支付寶賬號捆綁的銀行卡密碼就能知道,再進行網銀轉賬支付,就成功了。
張某聽明白了這個意思,心想,你有這個軟件你不用,卻給我用,誰都不是“彪子”。 張某回答:“這個軟件我要了,但不能直接支付給你'費用',需要我用軟件成功地弄到錢,給你'分成'。”
黃某電腦中的這個軟件編程者當初設計出來就有高招,咋個高法? 如果對方失信,這個軟件只能存在短短數天就會失效,這樣就不怕你“玩我”,兩人在網上就“成交”了。
今年4月3日,張某利用黃某發送過來的這個軟件侵入溫先生的支付寶賬號,順利竊取到與這個支付寶賬號捆綁的銀行卡密碼,網上一轉賬,這個卡里的9752塊錢就到了張某賬戶中。 張某弄到不義之財,按約定他分給黃某1000多元,當然一切都在秘密中進行。
大連網絡 安全警察接到報案,有道是“魔”與“道”都是此消彼長的,雙方都在較勁中提高“內功”,大連警方把這案子偵破了,黃某、張某也都到案。 據嫌犯交代,他們做了多起這類案子,不過侵入網絡支付寶套取銀行卡密碼的案子,涉案數額都不太大,小則數十元,多則上百元,可能恰恰就是這個原因,被害人都沒報案,警方也就無法深入追查。
至於研製出這個軟件的“ 黑客 ”,潛藏在深廣的網絡海洋中,警方待機再抓吧。 兩嫌犯把贓款返還了。
結果
沙區法院一審作出判決,犯盜竊罪,對張某、黃某各判刑7個月,並處罰金15000元。 此案於今年11月初生效。
點評
這正是:“法海”遇到“加菲貓”,合謀算計支付寶,銀行賬號全被盜,全因黑客做手腳。
浩瀚無垠的互聯網世界,既放大了天才的智商,也放大了魔鬼的慾望,人性的陰陽兩面,都在這個世界裡得到凸顯,愈發凸顯“江湖”的詭詐與莫測。
然而,魔高一尺,道高一丈。 有人心術不正,就有人匡扶正義,有人欲耍手段,就有人要你好看! 網絡只是一個浩瀚的載體,即便我在網線這端,你在網線那端,人鬼難分,雌雄莫辨,但畢竟總會有踪跡可循。
說到底,互聯網作為全球新鮮事物,給地球村的建設提供了大大的便利,但它終究只是一個工具,犯罪分子可以利用它,人民警察也可以利用它,對​​於一個公平的世界而言,比拼的終究是智商和能力。
作為網絡交易方式日趨繁榮的今天,非法分子就像病毒一樣,時時刻刻都準備攻陷他們眼裡的肥肉和缺陷,當然,每一種交易方式也一定會在這種攻擊的壓力之下,不斷更新裝備,升級換代,這,恐怕是一場永不休止的博弈之戰。

 摘自IT学习网(www.ourlove520.com)


 ================================================================


 '' I always say that life is fleeting,
How many people pursue vanity,
People can really contribute, how many people do it?

Innocence and ignorance is only a thin line difference,
Great era can '' true '' presence known to the world
No one is probably a million.

So sometimes I can Ning hackers or geeks who believe the words / article
More authentic than reality.
Some people choose life, "not clear", lest wake life can stand!
Some people are proficient training calendar life, thorns carrier transit is still a hero looks like ~

 

The true to finally bridge the reincarnation of Meng Po soup ...
The soul of the people are still in line way of heaven ~ ''

     Sharing is a virtue, Thanksgiving cause Privilege
         Contentment small as dust Melody.Blog heartfelt `` Sincerely,


http://melody-free-shaing.blogspot.com/2014/11/today-were-going-to-mix-bit-of-hacker.html
=========================


''我時常説人生轉瞬即逝,
多少人追求虛榮,
真心貢獻世人的能有幾多人做得到?

天真與無知僅一線之差,
大時代下能以''真''存在於世的
恐怕是一萬中無一個.

所以有時我寜可相信黑客或極客者的言語/文章
比現實更真確.
有的人選擇一生"不清醒",唯恐醒來一生也站不起來!
有的人卻精通人生練歷,荊棘載途仍是一個英雄模樣~

真真假假到最後還是在孟婆橋上輪迴之湯...
靈魂尚在的人們都是在行天之道~''

    分享是美德,感恩致尊尚
        知足常樂 渺小如塵 Melody.Blog衷心敬上``


http://melody-free-shaing.blogspot.com/2014/11/today-were-going-to-mix-bit-of-hacker.html
=========================

나는 항상 인생은 덧라고 '',
얼마나 많은 사람들이 허영을 추구,
사람들은 정말 얼마나 많은 사람들이 수행 기여할 수있다?

순결과 무지 만 세선 차이,
위대한 시대 '는'진실 ''존재 세계에 알려진 수 있습니다
아무도 아마 백만 없다.

그래서 가끔 내가 할 수있는 닝 해커 또는 단어를 생각 괴짜 / 기사
현실보다 더 진짜.
웨이크 수명이 서있을 수 않도록 어떤 사람들은 "분명하지 않다"생명을 선택!
어떤 사람들은 ~ 숙달 훈련 일정 수명이 가시 캐리어 운송은 여전히처럼 보이는 영웅입니다

진정한 마침내 멩 포 수프의 환생을 연결하는 ...
사람의 영혼은 '~ 하늘의 라인 방식으로 여전히

      미덕입니다 공유, 추수 감사절 원인 권한
          먼지와 같은 작은 만족이, 감사합니다``진심으로 Melody.Blog


http://melody-free-shaing.blogspot.com/2014/11/today-were-going-to-mix-bit-of-hacker.html
=========================



'' Je dis toujours que la vie est éphémère,
Combien de personnes poursuivent vanité,
Les gens peuvent vraiment contribuer, combien de personnes le faire?

Innocence et l'ignorance est seulement une différence de ligne mince,
Grande époque peut '' vrai '' présence connue au monde
Personne ne est probablement un million.

Alors parfois je peux pirates Ning ou geeks qui croient les mots / article
Plus authentique que la réalité.
Certaines personnes choisissent la vie, "ne sait pas", de peur que la vie de réveil peut se tenir!
Certaines personnes sont compétents formation civile vie, de transit épines de support est encore ressemble à un héros ~

Le vrai pour finalement combler le réincarnation de Meng Po soupe ...
L'âme des gens sont encore en voie de ligne du ciel ~ ''

      Le partage est une vertu, la cause de Thanksgiving Privilège
          Contentement réduit en poudre Melody.Blog sincère `` Cordialement,


http://melody-free-shaing.blogspot.com/2014/11/today-were-going-to-mix-bit-of-hacker.html
=========================
 

'' Ich sage immer, dass das Leben ist vergänglich,
Wie viele Menschen Eitelkeit zu verfolgen,
Man kann wirklich dazu beitragen, wie viele Menschen es tun?

Unschuld und Unwissenheit ist nur eine dünne Linie Unterschied,
Große Ära kann '' true '' Präsenz in der Welt bekannt
Niemand ist wahrscheinlich eine Million.

Also manchmal kann ich Ning Hacker oder Freaks, die die Worte glauben / article
Authentischer als die Realität.
Manche Menschen wählen, das Leben "nicht klar", damit Zuge Leben stehen kann!
Einige Leute sind kompetent Trainingskalender Leben, Dornen Carrier Lauf immer noch ein Held aussieht ~

Die wahre, endlich die Reinkarnation von Meng Po Suppe zu überbrücken ...
Die Seele der Menschen sind immer noch im Einklang Weg des Himmels ~ ''

      Sharing ist eine Tugend, Thanksgiving Ursache Privilege
          Zufriedenheit klein wie Staub Melody.Blog herzliches `` Mit freundlichen Grüßen,


http://melody-free-shaing.blogspot.com/2014/11/today-were-going-to-mix-bit-of-hacker.html
=========================

私はいつもその人生はつかの間であると言う''、
どのように多くの人が虚栄心を追求する、
人々は実際にそれをどのように多くの人が行うには、貢献することができますか?

無邪気さと無知だけ細い線差で、
グレート時代は''本当''存在を世界に知られていることができます
誰もが、おそらく百万円でありません。

だから、時々私ができる寧のハッカーや言葉を信じオタク/記事
現実よりももっと本格的。
ウェイク生活が立つことができるないよう一部の人々は、「はっきりしない」人生を、選択してください!
一部の人々は〜堪能トレーニングカレンダーの生活は、とげキャリアトランジットはまだのように見えるの英雄であるである

真は最終的に孟ポーのスープの生まれ変わりを埋めるために...
人の魂は''〜天国のラインのように残っている

     美徳がされている共有、感謝祭の原因特権
         ほこりのような小さな満足は、誠意をこめて、 ``心からのMelody.Blog


http://melody-free-shaing.blogspot.com/2014/11/today-were-going-to-mix-bit-of-hacker.html
=========================

'' Mi ĉiam diras ke la vivo estas efemera,
Kiom da homoj persekuti vantajxon
Homoj povas vere kontribui, kiom da homoj faras tion?

Innocence kaj malklereco estas nur maldika linio diferenco,
Granda eraon povas '' vera '' ĉeeston konata al la mondo
Neniu estas probable miliono.

Do kelkfoje mi povas Ning hackers aŭ geeks kiu kredas la vortojn / artikolo
Pli aŭtentika ol realo.
Iuj homoj elektas vivon, "certe", alie vosto vivo povas stari!
Iuj personoj estas kompetenta trejnado kalendaro vivo, dornoj portanto trafiko estas ankoraŭ heroo aspektas kiel ~

 
La vera por fine transponti la reencarnación de Meng Po supo ...
La animo de la popolo estas ankoraŭ en linio vojo de ĉielo ~ ''

      Dividi estas virto, Thanksgiving kaŭzas Privilege
          Kontenteco malgranda kiel polvo Melody.Blog elkoran `` Sincere,


http://melody-free-shaing.blogspot.com/2014/11/today-were-going-to-mix-bit-of-hacker.html
=========================


---Today we're going to mix a bit of a hacker or geek News Joho, see who create a lot of big drug Huang false information under false international security people, they share from each tribe master hacker, and some wonderful gesture advanced protection information it can be said that they virtuosity to incorporated by reference (1) .Get instant updates on # bubble @ paopaone [China Internet Illegal syndicates incomplete archive] - [text / special investigator]--(2 ) ."FREEBUF - *Approaching Science: How to get a wide variety of terminals - posture clever Editor: p0tt1 [certificate of]* -(3) [51.com]- [security information] conspiracy calculation. Alipay bank account repeatedly stolen all because of the famous hacker tricks incorporated [Anonymous] [25 November 2014] -
---今天我們要來一點混合的黑客或極客新聞情報,看看誰個大毒皇製造大量假安全資訊蒙混國際的人們,這些分享來自各黑客部落高手,有的姿勢美妙的高級防護信息也可說他們技巧高超,以引為參考.(1).Get instant updates on #泡泡 ‏@ paopaone[中國互聯網違法犯罪集團不完全檔案]--[文/ 特別調查員]- --(2).FREEBUF*--*走近科学:如何搞定各种各样的终端机--姿勢巧妙編者: p0tt1 [认证作者]*--(3).[51.com]-[安全资讯] 合谋算计支付宝银行账号屡被盗全因黑客做手脚 著名編入[佚名][2014年11月25日]-

http://melody-free-shaing.blogspot.com/2014/11/today-were-going-to-mix-bit-of-hacker.html 
--- 우리는 해커 또는 괴짜 뉴스 조호의 비트를 섞어거야 오늘, 그들이 각 부족 마스터 해커로부터 공유, 거짓 국제 안보 명에서 큰 약물 황 잘못된 정보를 많이 만들 누구인지, 어떤 멋진 제스처 고급 보호 정보는 그들이 참조로 통합에 기교 있다고 할 수있다 (1) 구하는거야 # 거품 @의 paopaone에 즉시 업데이트 [중국 인터넷 불법 신디케이트 불완전 아카이브] - [텍스트 / 특별 조사] - (2) "FREEBUF - *. 과학에 접근 : 단말기의 다양한 얻는 방법 - 자세 영리한 편집 : p0tt1 [증명서]를 * - (3) [51.com] - [보안 정보] 반복 모든 때문에 유명한 해커의 도난 음모 계산 Alipay의 은행 계좌를. 트릭 통합 [익명] [2014년 11월 25일] -
**USA/UK/SEAOUL KOREAN/TW/MACAU(FDZ)/HKS/FR/JP/UKN/DE/FA/POL/VI/ESP`/CO/ARG/PY/MEX/MO/AUST./RU/HO/MAL/NW/CA/IT/PH/Swedis/Mongolian/TUR/Arabic/Latin/INDON./Greek/Dansk/THAI/......All the world lauguage**-
---Aujourd'hui, nous allons mélanger un peu d'un pirate ou un connaisseur Nouvelles Joho, voyons qui créent beaucoup de grands médicaments Huang fausses informations sous de faux gens de la sécurité internationales, ils partagent de chaque maître hacker tribu, et un geste merveilleux avancions informations de protection, on peut dire qu'ils virtuosité incorporé par référence (1) .Get mises à jour instantanées sur # @ bulle paopaone [Chine Internet syndicats illégaux incomplète archive] - [Texte / enquêteur spécial] - (2) "FREEBUF -. * en approchant la science: Comment obtenir une grande variété de terminaux - posture éditeur intelligent: p0tt1 [certificat de] * - (3) [51.com] - [informations de sécurité] calcul de la conspiration Alipay compte bancaire à plusieurs reprises volé tout à cause de la célèbre pirate. astuces incorporé [Anonyme] [25 Novembre 2014] -
---私たちはハッカーやオタクニュース情報協会のビットをミックスしようとしている今日では、彼らは各部族マスターハッカーから共有して、偽の国際的な安全保障の人々の下に大きな薬剤黄虚偽の情報の多くを作成して誰が見て、いくつかの素晴らしいジェスチャーが進め保護情報は、それは彼らが参照により援用する妙技ということができる(1)の.get#バブルの@ paopaoneの即席の最新情報[中国インターネット違法シンジケート不完全なアーカイブ] - [テキスト/特別捜査官] - (2)「FREEBUF - 。*科学へのアプローチ:端末の多様な取得する方法 - 姿勢賢いエディタ:p0tt1[証明書]を* - (3)[51.com] - [セキュリティ情報]を繰り返し、すべてのために有名な4452盗まれた陰謀計算Alipayの銀行口座を。トリック取り込まれた[匿名] [2014年11月25日] -
---Heute werden wir ein bisschen von einem Hacker oder Geek Nachrichten Joho zu mischen, zu sehen, wer viele große Drogen Huang falsche Informationen unter falschen internationale Sicherheit Menschen zu schaffen, die sie von jedem Stamm Master Hacker teilen, und einige wunderbare Geste vorge Schutzinformation kann man sagen, dass sie Virtuosität durch Bezugnahme eingeschlossen werden (1) .Get Instant-Updates auf # Blase @ paopaone [China Internet Illegal Syndikate unvollständige Archiv] - [Text / Sonderermittler] - (2) "FREEBUF -. * Annäherung an Wissenschaft: Wie man eine große Auswahl an Endgeräten bekommen - Haltung kluger Editor: p0tt1 [Zertifikat] * - (3) [51.com] - [Sicherheitsinformation] Verschwörung Berechnung Alipay Konto wiederholt allem wegen der berühmten Hacker gestohlen. Tricks eingebaut [Anonym] [25. November 2014] -
---Hodiaŭ ni tuj miksi iom de hacker aŭ friki Novaĵoj Joho, rigardu, kiu kreis multajn grandajn drogon Huang falsajn informojn sub falsa internacia sekureco homoj, ili dividas de ĉiu tribo majstro hacker, kaj iuj mirinda gesto antaŭis protekto informo oni povas diri ke ili virtuosismo al korpigita por referenco (1) .Get momenteto ĝisdatigoj sur # bobelo @ paopaone [Ĉinio Interreto Kontraŭleĝa sindikatoj nekompleta arkivo] - [teksto / specialaj investigador] - (2). "FREEBUF - *alproksimiginte Scienco: kiel atingi larĝan varion de fina stacioj - teniĝo ruza Redaktoro: p0tt1 [atestilo de]* -(3) [51.com] - [sekureco informoj] konspiro kalkulo. Alipay bankokonto ree ŝtelita cxiuj pro la fama hacker trukojn korpigita [anonima] [25 novembro 2014] -
**USA/UK/SEAOUL KOREAN/TW/MACAU(FDZ)/HKS/FR/JP/UKN/DE/FA/POL/VI/ESP`/CO/ARG/PY/MEX/MO/AUST./RU/HO/MAL/NW/CA/IT/PH/Swedis/Mongolian/TUR/Arabic/Latin/INDON./Greek/Dansk/THAI/......All the world lauguage**-

 ===Melody.Blog===THE   END===>/

&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&



沒有留言:

張貼留言

window.___gcfg = {
lang: 'zh-CN',
parsetags: 'onload'
};