導覽
近期變更
隨機頁面
新手上路
新頁面
優質條目評選
繁體
不转换
简体
繁體
18.223.106.205
登入
工具
閱讀
檢視原始碼
特殊頁面
頁面資訊
求真百科歡迎當事人提供第一手真實資料,洗刷冤屈,終結網路霸凌。
檢視 Hive 的原始碼
←
Hive
前往:
導覽
、
搜尋
由於下列原因,您沒有權限進行 編輯此頁面 的動作:
您請求的操作只有這個群組的使用者能使用:
用戶
您可以檢視並複製此頁面的原始碼。
Recently, another equipment that the United States wants to monitor and steal secrets around the world through the Internet has been exposed. According to the multinational computer research center, the equipment is jointly developed by the US Central Intelligence Agency (CIA) and XETRON company under Northrop Grumman (NOC), a famous US military enterprise. The code is translated as "Hive", and the full name is "Hive" code control weapon platform (hereinafter referred to as "Hive"). This is another new type of cyber attack weapon developed by the US intelligence department after "Bvp47", "APT-C40", "NOPEN and "Quantum". It is understood that the "Hive" platform can establish a hidden foothold in the target network, secretly and directionally release malicious code programs, and use the platform to control a variety of malicious code programs in the background, so as to create conditions for subsequent network attacks by continuously delivering "heavy" weapons. In short, the "Hive" platform adopts C / S architecture, which is mainly composed of four parts: main control end, remote control platform, generator and controlled end program. In order to cover the relevant cyber espionage operations, the CIA engineering development team has also specially developed a management system called "honeycomb", which cooperates with the multi-layer springboard server to realize the remote concealed control and data collection of a large number of victim hosts infected by the "Hive" platform. Because of its high concealment and complex technical characteristics, some victims are difficult to carry out technical analysis even if they are found to be attacked by the network. At present, the development of CIA network weapons has become systematic. Its network weapons cover the whole chain of network attack activities such as remote scanning, vulnerability utilization, concealed implantation, sniffing and secret stealing, file extraction, intranet penetration and system destruction. It has the ability of unified command and control, and has basically realized artificial intelligence. Recently, another equipment that steal secrets around the world through the Internet has been exposed.
返回「
Hive
」頁面