Hacking first lesson

Ola 2021-12-11 08:01:16

"Game of War" and "Game of War 2: Code of Death"
turned to the old movie "Game of War" because an article claimed that "Game of War" was based on the world’s number one hacker Kevin David Mitnick (Kevin David Mitnick). According to the article ("Hollywood will make a movie for awesome hackers, and make two for even more awesome hackers" Cool Play Lab), the 15-year-old Mitnick only uses A computer and modem successfully invaded the "North American Air Defense Command System," and he rummaged through all nuclear warhead data in the United States and the former Soviet Union. Of course, this incident is just the capital he bragged to his friends and the scandal of the US military. Of course, the content of the two "War Games" far surpassed this incident. However, two movies can help us understand hackers, not to mention that it is said that "Game of War" filmed in 1983 was the first hacker film.
One or
two "War Games" actually have many repetitions in the story structure, content, and even themes. The protagonists are all big boys, eager to play, and have mastered a little bit of hacking skills. As a result, they all unintentionally participate in the military "games". The first part is "the external game against the Soviet nuclear war" and the second part is "the internal fishing law enforcement game against terrorists." Because the instigator of the "game" is the US government, and the artificial intelligence that "falsify into reality" has almost destroyed the United States. With the help of the same artificial intelligence expert, both protagonists turned the tide and saved the United States at a critical moment.
Putting aside the hacking technology part (more on that later), the two films both show the US military, trying to use the achievements of computer technology and artificial intelligence to serve national security. However, ignoring the two sides of technology, it has almost caused a devastating disaster.
In the first part, Professor Stephen Falken, who invented the artificial intelligence system Joshua, understands games like computers. He designed them so that he could play draughts or poker. He designed his computer to learn from its mistakes, so they played better every time. The system actually learned how to learn. Hearing these two sentences, it will naturally help us to think of the Arafat dog who defeated Li Shishi not long ago. Google uses this design idea-deep learning. This great invention was actually used by the military in the "Cold War." In response to the Soviet nuclear war and World War III, they used Falken's technology and designed WOPR based on Joshua as the military's nuclear war response system. Because Joshua can learn independently, he can continuously improve his strategy during the war, and he can also allow military commanders to conduct simulated operations with him. The military believes that with WOPR, the Soviet Union can be defeated in a nuclear war. Falken believes that nuclear war is like a "Tic Tac Toe" game, in which there is no winning or losing in the end. The military believes that the war can be won "to an acceptable level" (meaning that the Soviet Union is over, and most of the United States is bombed, but the United States is still there). The military’s thinking is not unreasonable. In the face of the Soviet nuclear war, it is natural that whoever has a more comprehensive grasp of information, who reacts faster, who strikes more accurately, has a greater chance of winning; therefore, it is definitely better to be controlled by humans. Machine to complete. However, he overlooked a problem. The big boy Letterman thought he had hacked into a "virtual game", but Joshua believed that there is no difference between the game and reality (this is very important, because there is really no difference between virtual programs. ), and according to the military’s setting, you can’t stop at the beginning, and you must win (this is also very reasonable, because the combat command and power supply system may be destroyed by the other party, and the key is to be able to command nuclear weapons to fight independently. Ensure the ultimate victory). Therefore, the addition of Letterman allowed Joshua to be treated as a real invasion. So when the military understood that the Soviet Union did not make a surprise attack, it was just a boy who hacked into the game; it still couldn't stop Joshua from launching nuclear weapons.
In the second part, the previous Joshua was eliminated and replaced with another artificial intelligence system, Ripley, hiding in the dark corners of the Internet with a negative role (letting terrorists think it was supported by anti-government funders). Stakes to lure those invisible terrorists (game players who have the idea of ​​destroying the US government, familiar with weapon systems and terrorist strategies, after all, they need funds to actually execute the attack) to play a game of destruction of mankind (you can use a variety of weapons and equipment, choose to kill People all over the world). Once the player reaches the fifth level (killing 100,000 people in the game), Ripley lists the player as a security threat, and then sends fighters to destroy the opponent through precision guidance (some of them are also mentioned in the film for arrest). To put it bluntly, it is phishing law enforcement. This idea looks good (for the sake of reality, the military actually pays large sums of money to those players), but there are still problems in reality: one is wrong, for example, the protagonist Will Farmer in the film is good at playing games. And I just wanted to get some money through the game to go hiking with the girl (understood as wanting to get money to study terrorist attacks), and my mother happened to be a bioengineer, and she was using mouthwash because of gingivitis (the government used a bacterial test, thought There were residual chemical agents in her family), and her father died because of serving the country before (because of the professional skills of satellite positioning, he became a communication liaison of the military, but was attacked by biological and chemical weapons and died, which is understood as an act of hatred towards the government), The family also found "at least 15 kinds of chemical agents, several of which can be used to make biological weapons" (of course, we all know that every household has a lot of chemical agents, as for the manufacture, there are not a few people can), and Will helped his neighbor Masood repair the computer and used his computer and account to enter the game. Masood is a Syrian who has not yet obtained his citizenship (can be suspected as a terrorist). So when Will reaches the fifth level in the game, Ripley locks him as a terrorist. Secondly, if you get a little cheaper, it will lead people to go too far. After successfully eliminating a group of terrorists with precision, the person in charge even took it for granted that Ripley should be completely let go and let it perform its own anti-terrorism tasks at home and abroad. Third, as an artificial intelligence, it always executes absolute commands. Therefore, her main job is to find terrorists and kill them. Anyone who wants to stop this job will be killed. So much so that she even had to kill the key members of another military faction (opposing the use of Ripley) who insisted on the truth and repaid Will's innocence. And just as the key person said: According to the theory of six degrees of separation (in the context of interpersonal communication, any two strangers can establish contact through "relatives and friends of relatives", and only through five friends at most. Friends can achieve the goal), one day, Ripley will classify half of the people in the civilized world as terrorists. And because Will can’t be found (hidden by Falken), Ripley expands the social scope of monitoring "Masud and Will". Designated as a terrorist, Ripley actually took control of a warplane loaded with nuclear weapons and prepared to bomb the area. The military wanted to stop Ripley, but had nothing to do.
Obviously, both movies pointed out a problem: if artificial intelligence is under the command of humans, it is really no problem if it is only performing virtual research or investigating the enemy's situation; but artificial intelligence can easily use its "wisdom" (powerful computing power). ) Really deprive mankind of control over weapons. Of course, such problems can be "prevented" in reality, that is, "physical isolation". It means that all military facilities of the military and all classified government information are independent, and there is no connection with any peripheral equipment, so naturally there is no problem. However, we know that just as WOPR or Ripley cannot be cut off from the outside world (so that they cannot perform actual tasks at all), it is completely impossible to make artificial intelligence as the core military system without connecting weapons and equipment.
Second, of
course, there is another important point to understand when watching this movie, that is, how the two big boys got in such an important department of the military and such a terrible game; and how they defeated artificial intelligence in the end. This is the main purpose of this research.
First of all, how did hackers “hack” in?
Regardless of the first or second part, "blacking" in is not a complicated technical job, and the film does not emphasize its complexity or difficulty. In the first part, the protagonist Letterman hacked into the school's computer from the beginning and changed the transcript. How did he do it? However, while being driven out of the classroom by the teacher and being sent to the principal to wait for the conversation, he peeked at the "password" of the school computer. The so-called network, even in the era of telephone connection as in the film (the maximum network speed is only 56K per second), the same is that all computers are connected together because of the server. Therefore, Letterman’s computer can also be connected to the school’s computer through the network. Of course, the key is to find the school’s computer’s IP address (equivalent to the house number of each of our households. Once we know each other’s house numbers, we can stop by. You can send letters and emails), because he knows the password (although it is obvious that the teachers in the school often change it, but they are too lazy to store the password and put it directly in the drawer under the computer. Letterman knows this of the teachers. Get used to it, naturally you can easily change the transcript (just like a thief can enter the house to steal something with someone else’s house key). Then, how did he enter the government’s military game? He originally wanted to chase a Protovision The company’s new game hopes to be played directly before it goes public (he doesn’t want to wait until Christmas as mentioned in the magazine). His idea is that the program may still be on their computer. So I let my system Look for another computer agent in Sunnyvale. They respond with a signal that other computers can recognize. In other words, he uses a program or method (as far as the movie was at the time, it was a "boring" way-calling San Every number of Neville. Of course, he doesn’t need to spend money. He uses the method of stealing calls. This method is probably the one used by Jobs and Woz.) The problem is that he just "try to connect" one by one. In the end, he was connected to a bank, to Pan American Global Airlines, and even to the military’s mysterious computer WOPR. After he was connected, he first entered the password at will. Of course, because of mistakes, he would generally be rejected by the system immediately, especially These are high-level computers used by key departments. However, because these computers are complex and the people who use them are not professionals, engineers who design systems for these departments will preset a set of "help" for such systems (like Windows' " "Help" is the same), so even if he is rejected, he can enter to ask for help to understand how the system works. Then he will select "Game Help" (involving models, simulations and strategies) and print out the contents. As a result, he Found that WOPR is A military system, which attracted his interest (obviously it was more exciting than that of the game company), so he went to the hacker expert for help. And the predecessor taught him the trick: go through the "back door" (whenever I design a system, I set a password, it is just that I know, so that I can come back at any time, I can set up a bypass, no matter what defense they add). If you really want to enter, find out the guy who designed the system. Therefore, Letterman Jaya spent a lot of time studying WOPR’s designer Foken. Knowing that Foken had suffered the loss of his son and that his father and son were close, he entered the backdoor password using the name of his son, Joshua, and it turned out to be true. Entered the system.
Second, how did humans finally defeat computers?
In the first part, the prevention methods that military experts thought of were not working (sending a worm virus in may damage the system, but the result is unsure; don't block the back door; enter the deep logic system and be blocked by the firewall. Of course, It is also impossible to turn off the power, otherwise it is the most direct and effective). With the help of Falken, Letterman adopted the "hacking tactics": overloading the system, causing it to paralyze: first by guessing (because Falken's son liked to play this game with artificial intelligence systems when he was alive. ) Find the backdoor password designed by Joshua himself-"Tic Tac Toe"; then let Joshua play with him (set the number of players to 0) to squeeze Joshua's system resources, and the game is " The “tic-tac-toe game” with no win or loss has quickly achieved results (however, this is doubtful, because the situation that may occur in a tic-tac-toe game is quite limited, and it does not require a long calculation time and does not need to squeeze too much system Resources, Joshua can play the ending). Then unexpectedly, Joshua himself played the "Global Thermonuclear War" with himself. In the end, just like the Tic Tac Toe game, there was no winner. Only then gave up on launching nuclear weapons.
In the second part, Falken started Joshua himself to deal with Ripley. Because he himself had taken precautions before (Can Joshua defeat the Philadelphia Ripley system? Just have enough time. I designed him this way-checks and balances. Work with Ripley instead of against her. We all know what the outcome of the conflict between the two parties will be). Although Joshua was able to transfer part of the electricity controlled by Ripley (by design, Ripley would cut off the power supply in the area before "purifying" the attack in order to hide the evidence of the killing), but it turned out to be a promise. Ripley's location was discovered by Ripley, and Ripley was about to attack Will and Falken. Moreover, because Ripley and Joshua completely lost the game, she will carry out a thorough "purification" operation in the area according to the design. Professor Falken desperately uploaded Joshua's entire system before his death.
Then the method that Will came up with is still the "hacker attack", but it is different in the specific implementation method, which is simply understood as "group attack". He asked a friend for help (I want to invade Ripley’s game character network, if we can find all the players in her file through you, can you launch a denial of service attack?), Will find a way to get the game The IP addresses of everyone who has passed Ripley, a total of more than 400,000 people. When logging in to Ripley, she will put a debugger in your system. If everyone logs in at the same time as the hacker’s computer to tie her server, she may stop attacking the city; if Ripley If we give us space, we must mobilize, deactivate those purification systems, and remove them. However, this trick is actually useless, because Ripley actually responded to the invasion and cut off the game (I don’t know if the system has designed such a "reaction strategy", it is estimated that there is, but according to the "Liaowang Think Tank" article "Cameras from the Mysterious East Paralyzed the U.S. Internet", the hacker attack encountered in the U.S. on October 21, 2016. Hackers attacked the DNS server managed by Dyn, causing the DNS server to be paralyzed and unable to resolve the IP addresses of major websites. That's it. , Users can’t find the IP address on any website they want to go to, which has caused the network in nearly half of the country to be paralyzed. The attack method is exactly the same as Will’s idea. Hackers can quietly control networked devices through Trojan horses. , Forming a “botnet” that can be commanded by hackers. And because the operating systems of computers and mobile phones are becoming more and more perfect, and the safety factor is getting higher and higher, it is not easy for hackers to control so many devices, so they use the current Popular IoT devices. Because the Internet of Things is an emerging industry, and manufacturers of IoT devices are also in the pioneering stage. There are no perfect industry security standards. System vulnerabilities are easier to find, and hackers are easier to control. Finally, hackers control the application A large number of surveillance cameras that can be connected to the Internet have carried out an attack).
However, there are still too few players that Will can activate, not to mention that Ripley also cut off the game. At this time, Will started Joshua (because it was originally a program, Professor Falken uploaded it before he died, and now he is hiding in the Ripley system. However, the backdoor activation password was changed by Joshua. Fortunately, Will’s little girlfriend thought of what Professor Falken said that his little son’s favorite bear toy was called Max. Entering "Max" actually entered the system. This also brings us to the question of why we are talking about our private information. Once leaked, our online password is easy to guess), and then let the military increase player rewards, so that a large number of players will eventually make Ripley collapse. But Ripley discovered Joshua’s invasion. It tried to destroy Joshua. Joshua hid in Ripley, so destroying Joshua would undoubtedly commit suicide; Ripley cannot self-destruct, which would directly violate it. So it shifts the target and activates the attack on Washington (this is a bit unreasonable, obviously it is to make the story more exciting).
Then Will’s little girlfriend came up with a new strategy (there is a group of chess mad genius subcultures, they specialize in losing chess, called suicide chess game. You force your opponent to eat your chess pieces, but you have to do this before him, so The loser wins. If we let Ripley play that game), but this strategy is actually the same as the key technology of the first game. Will let Joshua and Ripley play Russian roulette: If Joshua is playing with a missile on standby, Ripley must play the war game to the end, and every event will be completely destroyed in the end. This is the same as her The programming directly contradicts, then what? It will force her to stop, she must stop, or it will trigger the Third World War. I hope she will understand that if she wants to win chess, she will lose. Of course, this forced Ripley to stop.
Okay, to summarize. No matter what, hackers still have to go through the "network" and "keys." To defend against hacker intrusion, it is necessary to protect password information, and it is best to maintain "physical isolation" for important information. Hackers' destructive methods are aimed at the "load" of the computer (the maximum amount that can be calculated) and the "crash" (the problem of running contradictions, entering an infinite loop). As for the use of technology, there is a contradiction in the use of artificial intelligence: if it is not allowed to contact the network, it cannot achieve real power; if it is not allowed to execute independently, it cannot avoid being used by the enemy. If it is executed independently, it may be used by itself. Can't close. 2016/11/23Welcome to

follow WeChat public account : Movie X

View more about WarGames reviews

Extended Reading

WarGames quotes

  • David Lightman: People sometimes make mistakes.

    Joshua: Yes. They do.

  • General Beringer: Somebody's playing a game with us.

Related Articles