laitimes

China Hacker Relationship Diagram

China Hacker Relationship Diagram

Brother Yuan, Jiye Shen, Glacier, Yang Jilong, Yang Yong, Fang Xing, Jiang Haike, Ji Xinhua, Hei Brother... A tribute to the pioneers of the times in the field of cybersecurity.

Author | Lin Juemin Zhang Jin

Edit | Lin Haifeng

They are ordinary people, but they are so legendary.

1

The young walker is more sword-fighting, and he is sorry to sell wine money in his pocket

In 1999, Huang Xin, a senior at Xidian University, edited a program that could control other people's computers, "Glacier," and his intern colleagues suggested he put it online.

"Such a fun software, why not share it with more people?"

Who would have thought that the "glacier" would spread explosively, and it would later become the most famous Trojan horse program in China, and Huang Xin also became the "godfather of the Trojan horse" in China at a young age.

In fact, Huang Xin wrote this program purely out of curiosity and without any malicious intent.

A year ago, Huang Xin was expelled from Xidian University for fighting, and although after pleading with him, the teachers agreed to continue his studies, but he could not get a diploma.

China Hacker Relationship Diagram

Huang Xin

Huang Xin is also a real genius, only half a year of hard study, he made up for the previous three years of homework, but also learned C++, assembly language, etc. as a means of making a living in the future, and also entered the software company internship in his senior year.

In fact, there were a large number of college students in the early hacker community.

The reason is that the predecessor of China's Internet is The China Education and Research Network.

In 1996, Tsinghua University, Peking University, Shanghai Jiaotong University, Xi'an Jiaotong University, South China University of Technology, Southeast University and other six colleges and universities submitted proposals for the construction of an education and scientific research network, which was opened that year, connecting beijing, Shanghai, Guangzhou, Nanjing, Xi'an and other five cities.

Among the student groups of these five city colleges and universities, those who have no intention of attending classes and love to do things will definitely find many low-cost Internet access opportunities, so a large number of hackers will be born.

After all, what could be cooler than being a "hacker"?

At this time when Huang Xin wrote "Glacier", Yang Jilong of Northwestern Polytechnical University, his next school, also entered the hacker circle.

Yang Jilong was in his junior year at the time, helping teachers manage the information center at Northwestern Polytechnical University, and had a lot of time to soak online for free, and could often communicate with other hackers.

At this time, there is not much that young hackers can learn, in addition to CDs and books, the most popular among them is the "Eight Hackers" written by a Taiwanese named Coolfire.

Coolfire's real name is Lin Zhenglong, a Taiwanese, who wrote eight far-reaching introductory articles during the wilderness of the Internet, each of which began: "This is not a teaching document, but it just tells you how to crack the system so that you can protect your system as a security... I am not responsible if someone maliciously hacks into someone else's computer or network as a result of this file!! ”

China Hacker Relationship Diagram

Lin Zhenglong

After warning everyone not to hack other people's computers, he began to seriously teach everyone to hack other people's computers.

At the same time, Lin Zhenglong also formulated "13 hacking rules", from "do not maliciously destroy any system..." to "Do not share cracked accounts with friends...".

It can be said that Lin Zhenglong almost wrote a "Coolfire - A Beginner's Guide to Hacking Rookies".

Huang Xin and Yang Jilong, the descendants of the mainland, have benefited from this.

A few years before Huang Xin wrote "Glacier," a Shanghai gamer named Gong Wei also read the Coolfire guide.

Gong Wei was originally frustrated playing single-player games, wanted to learn some hacking technology to crack the game console, and as a result, after reading "Coolfire", he felt that his whole life had been sublimated, and even registered the "Green Corps" hacking site, but there were few visitors.

In the subsequent Indonesian exclusion incident and the bombing of the Chinese Embassy in Yugoslavia, Gong Wei took patriotism as a call to gather hackers to fight back, and for a while, 3,000 people gathered, claiming that there were 3,000 people who joined.

But to be honest, at this time, everyone's so-called "joining the Green Corps" is actually a registered member on this site, and there is no strong personnel subordination relationship.

Young hackers naturally joined in.

The Green Corps is not only a hacking organization, but also an educational platform, and many young people are affected by becoming hackers.

Ji Xinhua (now the founder of Ucloud) once told Lei Feng that he was originally just a management student at the university computer center, and he only began to really learn security knowledge after joining the Green Corps, and Li Bin (now the general manager of Tencent Cloud Security) also talked about a similar experience to Lei Feng.

Also in 1999, the Green Corps held its first annual meeting at No. 6, Lane 128, Yan'an East Road, Shanghai (Starry Sky Internet Cafe).

A man named Shen Jiye appeared, and Zhou Shuai, a former member of the Green Corps, called Leifeng a "lobbyist" to Leifeng. At that time, everyone said that he was a Beijinger engaged in capital operation.

Shen Jiye is actually from a technical background, Tsinghua Automation Department enrolled in 1986, at this time he just sold his last company, optimistic about network security, but also optimistic about the green corps, so he rushed to Shanghai, persuaded Gong Wei and other core members, the green corps for commercial operation, and then the green corps transformed and owned its own network security company: Shanghai Greenfocus Computer Network Security Technology Co., Ltd.

A year later, in March, the Green Corps cooperated with Zoomlion to Beijing Zoomlion GreenFocus Information Technology Co., Ltd., and in July of the same year, Beijing NFICUS and Shanghai NSFOCUS broke down due to internal reasons, and Beijing NSFOCUS launched a new domain name.

In "Boiling Fifteen Years", this public case, which can be called the first public case in the history of China's network security, has been described in detail, and readers can purchase it by themselves, and the final result is:

The Shanghai NSB, which considers itself the successor of the green corps and hopes to continue to take the private route, will disappear silently and naturally; and Shen Jiye has become the boss of the Beijing NWB, and now the Beijing NWB has been listed.

Beijing NSF attracted a large number of hackers who needed to work, and Bu Zheng, Yuan Ge, Xiao Si, Hume, Star, etc. went to Beijing to become its generals. These 11 people, together with Shen Jiye, are known as the 12 elders of NSB.

The success of the Green Corps was remarkable, and a wave of hacker groups began to form in the country.

Wu Hanqing, who was only 16 years old at the time, established the Phantom Brigade, Wan Tao established the Chinese Hawks, and Wang Junqing founded the 0x557.

Time back to the beginning of 1999, Yang Jilong was still studying at Northwestern Polytechnical University, responsible for the daily management of the school's computer center.

That night, Yang suddenly saw someone posting a "hacker game" on the Internet, claiming that "I have a server here, you can all come and attack, who can break through the past, get the highest authority, you can come to Beijing to find me for dinner." ”

China Hacker Relationship Diagram

The young version of Yang Jilong

Yang Jilong suddenly felt victorious and defeated, and also felt very funny, so he knocked on the command line on the school computer, did not sleep for a night, and successfully passed the customs.

Later, the hackers once recalled to Leifeng Network that this should be China's first CTF bidding competition, and Yang Jilong accidentally seemed to become the first passer.

The website that publishes this "hacker game" is the focus of security.

2

Yan Zhao was generous and sad and met the Meng family

After Yang Jilong cleared the competition, he naturally wanted to find Wang Yingjian, the founder of the competition, to invite him to dinner.

Wang Yingjian was currently studying at Tianjin University of Technology as an undergraduate, but he was already one of the core figures in the security focus.

A year ago, Wang Yingjian met a young man named Zhang Xundi online.

Zhang Xundi is a hotel network manager, handsome, dancing well, English is superb, and even occasionally acts as a DJ of hotel KTV.

Zhang Xundi ran a forum called "Security Focus" on the Internet, and often translated foreign technical articles on it.

From the popularity of "Coolfire", you should be able to see that in fact, most of the early hackers are not from the class, most of the English level is really not bad, but they are very eager for foreign technology, so they rush to the "security focus".

Wang Yingjian was not addicted to brushing articles, so he sent an email to Zhang Xundi, an exchange, and the two young people quickly became good friends.

On a worn-out old desktop, Wang Yingjian made a CMS publishing system for the Security Focus website and became a core member.

Soon, a young man named Wu Lujia (now the founder of the Knowledge Planet) also joined in.

In 1999, Wu Lujia was working as a salesman in a loudspeaker factory in Xiamen, which was his eighth job in the two years after graduation, because he accidentally lost the sales data in the computer, so he had to specialize in network technology and mix various security forums every day.

After joining the security focus, Wu Lujia actively communicated with various hackers.

During this time, he also gradually gained fame, and Huang Xin, the "godfather of Trojans", who had just joined the focus of safety, came to visit him in the factory.

In Wu Lujia's office and bedroom, the two drank and talked bitterly.

Because there was no bed, Wu Lujia gave the only sofa to Huang Xin to sleep, and he himself lay on the ground with a blanket, and even covered Huang Xin with a blanket in the middle of the night. As a result, Huang Xin has been lamenting many years later that Wu Lujia is a friend worth making deeply.

China Hacker Relationship Diagram

Wu Lujia

At this time, the year 2000 was near, the "millennium worm" problem was coming, and the network administrator Zhang Xundi had to be busy for the debugging of the hotel.

Zhang Xundi told Wu Lujia and Wang Yingjian: "I'm going to be busy for a while, you can help me manage the website together." He also gave the management of the server to Wu Lujia and Wang Yingjian.

The three musketeers of safety focus officially debuted, and the three worked hard to run the forum, and their influence became more and more influential.

Because he knew a lot of hackers in the focus of security, Wu Lujia's technology was getting better and better, and he received two olive branches - Beijing NSFOCUS and Huatai NetAn.

Around 2000, the three major domestic security companies stood on their feet - Beijing NSFOCUS, Huatai Network Security, and Anluo Technology.

Later, Shenzhen's Anluo technology declined, and Beijing's Venus of Venus rose to take its place. (Anluo Technology is based on Chenguang Studio, and Xie Chaoxia invited Zhang Chunhui, an internet person with old qualifications in Shenzhen, to start a business with him.) In early 2001, ISB Investment Investing Company invested $1 million in Anluo Technology, with Xie Zhaoxia as vice president and Zhang Chunhui as general manager. But in 2002, Zhang Chunhui and Xie Zhaoxia broke up and flew alone, and Xie Zhaoxia took charge of Anluo alone. )

All in all, during this time, many hackers gathered in Beijing.

Wu Lujia resolutely chose Huatai Network Security, after all, Huatai Network Security is larger, but after really going, he found that his main job was infiltration services, security consulting and pre-sales, and the work was quite leisurely.

After a period of time, Wu Lujia felt that this was not what he wanted, so he resolutely decided to jump ship with NSB.

The Green Corps disappeared, NSFOCUS became a commercial company, and hackers still needed a spiritual home, and they naturally joined the focus of security.

The backbone of NSFOCUS, Venustech, Huatai Network Security are employees of the company during the day, and at night they become the core members of the organization of Anjiao, known as The 18 Luohan of Anjiao, and later Ouyang Meiwen (shotgun, now vice president of 360 War Investment), TK Sect Leader, Yuan Ge, Wu Yunkun (now president of Qianxin), deepin, stardust... are regular customers who have become the focus of safety.

At a time when the focus of safety was growing, Huang Xin suffered a half-month prison sentence.

Just after the May Day holiday of this year, Huang Xin was detained.

According to Huang Xin's design, the controller of the glacier will apply for a 21CN mailbox by default to receive the IP address of the controlled person, and the result is a cycle error in the middle, so that all the computers that have been hit by the glacier will send emails to the 21CN every 1 minute. 21CN server crashed.

The relevant departments could not verify how many people used the glacier software, so they had to arrest Huang Xin, the author.

But this was actually a misunderstanding, because Huang Xin did not hack into 21CN, and never even maliciously controlled anyone's computer.

Under the rescue of hackers such as Security Focus, Huang Xin was finally proved to have nothing to do with the matter and did not leave a case record.

With the misuse of glaciers, Huang Xin stopped maintaining this remote control tool, but instead developed a free application called "Glacier Trap", which specifically cleaned up the "ice Trojan" in the computer, and even allowed the user to directly talk to the controller, "Your Trojan has been discovered".

"Glacier" is now extinct on the Internet, and "Ice Trap" is still available for download on the Internet.

At the same time, Huang Xin put his main energy into the free security detection tool X-scan, which allowed him to gain a large number of fans.

On this day, Huang Xin received a fan email from a college student named Yang Yong (now the head of Tencent's security), who later offered to help him test X-scan, so he gave him his newly written version.

This student studied at the First University of Economics and Business, which is 1:10 between men and women, and it is not good to fall in love every day, so he knows that he specializes in technology, which shows that he is also extraordinary.

Huang Xin actually received an X-scan technical error from Yang Yong, and deeply felt that this boy was also a talent, so he sent a letter of thanks: "Do you have time to come to our side?" Please eat! ”

Many years later, Yang Yong told Lei Feng.com that one of the things that had the greatest impact on him in the process of embarking on the career path of safety was "meeting noble people, such as I met Glacier (Huang Xin)".

China Hacker Relationship Diagram

Yang Yong

On that day, Yang Yong successively met Wang Yingjian, Wu Lujia, Yang Jilong, Wang Juan, Cai Jingjing (now the founder of Yongxin Zhicheng), Wang Wei at the dinner table... Since then, he has been part of the security focus.

After a certain meal, Wang Yingjian pulled everyone to his rental house with Huang Xin and Juanzi, and announced that he wanted to hold a "hacking conference" and named it Xcon.

After the audience listened, everyone clapped their hands and praised, and all expressed their great support for Xcon. After a lap of heated discussions, everyone found that they were now facing a big problem - they wanted to do things and had no money.

3

Confidants meet to show their magic skills, and a sword becomes famous in the world

Xcon is now the top and most authoritative closed-door hacking conference in China, which has been opened in 2002 for twenty years and has gained influence around the world.

The information available on the Internet says that Xcon originated from DEFCON, founded by American super hacker Jeff Moss, but this is not the case.

Time is back in time again at the beginning of this century.

Wu Lujia and Wang Yingjian participated in the hacking conference held in Beijing by Lin Jun, who had just gone to Tianji Network as editor-in-chief from the deputy editor-in-chief of "Computer News" at that time (which is why the first hacking conference was sponsored by Computer News and the second Tianji Network), and The online edition editor Xiong Jie Zhangluo was held in Beijing, and they finally met Zhang Xundi who came from Wenzhou.

When the various fronts finally met in northern Shaanxi, everyone was excited and drank a lot of wine.

The Convention Hotel proposes: "The largest room can only accommodate two people. ”

They immediately said: "The three of us want to be together, and it is okay to make a floor." "That night, they talked all night, and they couldn't talk enough.

Logically, the three major network security companies of NSFOCUS, Huatai and Qiming are all in Beijing, so why didn't Zhang Xundi come to Beijing as a big hacker to work?

According to a teacher Yang Jilong, who did not want to disclose his name and gender, because Zhang Xundi was too handsome and danced too well, his wife was not at ease. It wasn't until 15 years later that he was allowed to leave the prefecture-level city hotel where he worked, and was "forced" to join Alibaba's senior security expert after taking tens of millions of shares. This has been the case in previous years.

After separating from Zhang Xundi that year, Wang Yingjian has always been thinking about it and wants to "hold a hacking conference" and let everyone get together again.

At this moment, someone on the security focus reacted that there was a problem with the article of a person named ID Flashsky.

Who is Fang Xing?

Compared with the young hackers with a focus on security, Fang Xing only began to learn computer technology at the age of 30.

China Hacker Relationship Diagram

Fang Xing

Prior to this, Fang Xing had worked as a worker, cashier, insurance salesman, substitute teacher, and computer clerk because he had graduated from college, and had been "optimized" to sell agricultural machinery in the depths of the mountains because he had helped the waitress to block alcohol and offended the leaders; he had been expelled because he resisted discrimination from colleagues.

In 8 years, Fang Xing changed 8 jobs, and he was really a frivolous renxia, and he didn't rub sand in his eyes.

How can Fang Xing tolerate others questioning plagiarism?

So he published a series of rebuttals, in which he revealed a deep understanding of the underlying binary that transcended ordinary technology.

Huang Xin, Ji Xinhua and his hero cherished the hero, so they immediately introduced him to the security focus, and after a round of voting, everyone agreed to join him.

In the summer of 2002, Wang Yingjian held the first Xcon next to Nancheng Century Park on the outskirts of Beijing.

Didn't you say earlier that there was no money? NSFOCUS and Venustech later sponsored a portion.

Half of the core members of Xcon are the backbone of NSFOCUS, and the other half are the backbone of Ouyang Meiwen, the backbone of Venus, and these two companies naturally pay for sponsorship.

So where did Huatai Net Security go? It has been acquired and has since ceased to exist.

After the conference began, Shen Jiye was invited to speak on stage as a sponsor.

China Hacker Relationship Diagram

Shen Jiye took the microphone and said, "Speak? I know that at such meetings, I say anything annoying, don't say it, just do it. ”

In this way, the representative of Venustech was not embarrassed to speak, which also created a convention, the Xcon conference did not have a leadership speech session, and everyone came up to talk about technology directly.

Two of the "four hackers" mentioned in Leifeng's article "08 Olympic Hackers Are Now Safe" - Jiang Haike and Ji Xinhua stood on the podium and gave speeches on "Virus Detection Based on Network Flow and Packets" and "Adhoc Security Protection".

Later, Xcon became more and more in line with international standards, and Wang Yingjian even invited Richard Stallman, the world's grandmaster-level hacker and father of free software, to give a speech, and almost everyone who listened to the lecture experienced a dream journey.

China Hacker Relationship Diagram

Left Wang Ying key, right Richard Stallman

Symantec's chief software engineer Matt Conover, who also spoke at Xcon, was a teenager who proposed buffer overflow attacks at the age of 16 and was in his early twenties.

However, Matt Conover Chinese level is not very good, so he asked an animal lover Yang Jilong for advice: "Hello, World!" What should I say about procedural Chinese?

Yang Jilong patiently translated the name of an animal that originated in the Americas to him. Then, very naturally, Matt Conover frequently quoted the three words "grass mud horse" in the conference, which caused the audience to laugh.

Matt Conover has another identity, he is one of the founders of w00w00 (the self-proclaimed world's largest hacking group).

For w00w00, we can not strictly understand as the American version of the "security focus", they have more than 30 core members - more Thananjo people, and later most of these people went to Microsoft, Google, and also started companies to sell to Facebook, such as whatsup founder Jay Coom.

Thankfully, Matt Conover wasn't angry, or both sides were having fun.

Young hackers are always much more joyful whenever they get together.

Compared with Yang Jilong, who was full of joy, Xcon more often asked Zhao Wei, who was a guest speaker at Venustech at the time and later went to McAfee, as a translator.

Many years later, hackers are still amazed at Zhao Wei's translation skills.

Ideally, after the top hacking conference Xcon, public opinion exploded, and various reports were repeated. But the reality is that after every Xcon conference, no one in the society knows about it.

The reason is simple, the early hackers were more resistant to the media, and the closed-door conference neither had an audience to see nor allow the media to enter, which also led to Xcon taking many years to establish its due reputation.

Still, the reputation of the security focus has been overwhelmed.

Shortly after Xcon's first conference, Fang Xing discussed his discovery of the RPC DCOM vulnerability when analyzing the Microsoft MS03-26 vulnerability, so he quickly wrote an article and sent it to Ji Xinhua.

The two stayed up all night, spent two full nights analyzing it, and finally published it on the famous international vulnerability website SecurityFocus under the name of "Security Focus". This is the first article in the world to publish technical details of the RPC DCOM vulnerability.

A month later, the "shockwave" virus developed under the RPC DCOM vulnerability swept the world, and tens of millions of Microsoft system computers were recruited.

Microsoft suffered a serious crisis, so it urgently held a global conference, on the one hand, accusing Fang Xing and others of being security focusing on the lack of responsibility, on the other hand, trying to recruit Fang Xing to work in Microsoft China two years later.

There are two details worth noting here: Fang Xing and Ji Xinhua's article is written for the English version of Windows, and the English version and the Chinese version of Windows are not the same, so the "shockwave" worm that shook the world suffered in China, and its attack failed on the Chinese version of Windows.

On the other hand, the rule of the information security industry is that people can write technical articles about vulnerabilities that have already been patched. Microsoft had released patches at the time, but they weren't helping users build a sense of patching.

According to Ji Xinhua's statement to Leifeng Network, they had sent an email to Microsoft before publishing the article. But Microsoft apparently didn't recognize the importance of this article, and they really didn't expect china to have such technical power.

4

Thirty-six long swords are there, and the bulls are divided into stars

After experiencing this incident, the focus of security has greatly appeared in front of the global Internet, countless technology enthusiasts around the world have sent praise emails, and the technical strength of Chinese hackers has been further recognized by society.

Young Chinese hackers can finally eat a full meal.

Why? Because the reality is so tragic.

Hackers told Leifeng Network: "Network security is a well-off demand, the entire Chinese Internet industry is still struggling with food and clothing, who is willing to spend money on network security!" ”

Since the dot-com bubble burst in 2000, the entire industry has been in a dark state.

Although NSFOCUS is the industry leader and a gathering of talents, it could not pay salaries for half a year in 2002, and other hackers lacked stable income.

Shen Jiye's face was always full of sorrow, at this time, he heard a bad news from Wu Lujia, "the focus of security is greater than the fame of NSFOCUS."

Shen did not believe it, so he searched on the Google page and found that the index of the security focus was much more than that of NSFOCUS, which was even more frustrated.

That is, in the year of Xcon, Wang Junqing (la0wang, founder of 0x557 and co-founder of Jinxing Technology) stayed in Shanghai for half a year, as he later said to Leifeng.com - "All pleasant interviews ended at the moment when I took out my high Chinese."

China Hacker Relationship Diagram

Wang Junqing

Fortunately, Lao Wang met Ouyang Meiwen and joined Venus.

To put it more, the total market capitalization reached by the 0x557 entrepreneurial group may be the first in the domestic hacking organization, and it is second only to the aforementioned w00w00 worldwide (mainly they have WhatsApp!). Who's better off with this than that?"?

However, the hackers of that year really needed a way out to eat!

Wu Lujia was lucky during this time, encountered Ouyang Meiwen's poaching, on Valentine's Day in 2003, these two bearded men chatted while drinking red wine, and only after the end did they find that the surrounding couples were watching them.

Wu Lujia was originally determined not to go, but as a result, he met Venustech Yan Wangjia personally out of the horse, so he had to jump ship and become the CTO of Venustech in Shenzhen.

However, he worked for almost two years at Venustech.

At the beginning of 2005, Huang Xin always had the desire to start a business because X-scan was too good, so he agreed with Wu Lujia to "work hard for 3 months each, and if you can't do it, you will resign and start a business."

As a result, only a few weeks passed, Huang Xin suddenly mailed Wu Lujia more than a dozen boxes, and Wu Lujia had to leave his job to start a business.

Under the investment of Venustech, the two made a company called Dacheng Tianxia, mainly engaged in anti-information leakage business.

Later, Dacheng Tianxia merged with the super patrol police of the well-known hacker Dong Zhiqiang (killer), but there was no 1+1 greater than 1, and killer went to Baidu, and is now the head of Yunding Lab in Tencent's seven laboratories.

Today, the main product of Dacheng Tianxia is the well-known knowledge payment service platform Knowledge Planet, the first name of the Knowledge Planet is called Xiao Secret Circle, which is very hacker.

Tencent is also one of the important shareholders of Dacheng Tianxia.

Fast forward to 2006, when as the number of network assets and malicious attacks increased, people's security needs also increased.

Zhao Wei found Yang Jilong, Fang Xing, Yu Xian and others and said a classic line of 007: "The world is evil, but not because of those who are evil, but because of those who are indifferent." ”

China Hacker Relationship Diagram

Zhao Wei

They started a company called Know Chuangyu and launched the 365 Door God To C product.

But I have to say that their batch of entrepreneurs are more unlucky, just in time to catch up with 360 free.

The impact of the 360 free incident not only made The To C security products lose the market - 365 Door God disappeared in this way; but also made the To B product lose customers - such as the anti-virus engine made by Jiang Xiangqian and Yao Jiwei at that time, which has obviously been rated as the first in China, but Party A has fallen, and there is still no business to do.

Fang Xing later left to know Chuangyu, and Wang Wei started Han Haiyuan, mainly doing anti-APT attacks, second to none in the field, and then sold to Ali;

The real turnaround of these entrepreneurs is after the 3Q war in 2010.

Under the balance of terror, Tencent began to invest money to invest in various companies in order to prevent 360. In the intervening years, each family has a period of bitter support.

In addition to entrepreneurship, hackers have another way to go to the big factory.

Ji Xinhua, as the first hacker to be recruited by a big factory, first created Huawei's security business, in 2004 he created Tencent security, and then founded UCloud, for specific experience, see "Where are the 2008 Olympic Hackers Now";

Yang Yong was originally working as a "trainee editor" in computer enthusiast magazine, but after graduation, the magazine laid off employees and he lost his job. Under the recommendation of Huang Xin, Yang Yong first went to the Aerospace Science and Technology Group, and then under the recommendation of a friend of the security focus, he went to Tencent and Ji Xinhua in 2005 to build a team, and is now the head of Tencent's security platform;

Li Bin was first entered by Wu Lugara into the Green Alliance, and then Ji Xinhua pulled him to Huawei, he did not go, but the yin and yang mistakenly went to Tianrongxin, a few years ago also went to Tencent, and is now the general manager of Tencent Cloud Security. Leifeng Network chatted with him after the 2021 GAIR, he was full of spirit, pointing out the country, thinking that he was only in his early 40s, just in his year.

5

Life is rare to ride the good wind, and it is heroic not to avoid the interests and harms

Back in 2008, when Ji Xinhua, TK, Jiang Haike, Yuan Ge and others were escorting the Olympic cybersecurity, the Security Focus Forum website had been hit by DDoS attacks.

After experiencing countless cycles of struggle to open a week and close a week, Zhang Xundi had to choose to close the forum website.

The story of the focus of safety gradually remains only a legend, but Wang Yingjian, while running the company, still insists on running an Xcon every year, inviting everyone from all over the world to come to a gathering.

Here I have to mention a regret of everyone's early years, most of the hackers who became famous in the early speeches on Xcon went to large foreign companies.

Because the domestic Internet is too early, the development time of the security industry has not arrived, hackers are too unprofitable, and there is really no place for them.

Until the formation of the mobile Internet boom in previous years, various applications need security blessings, and the domestic security industry can be regarded as really up.

Especially after the 3Q war, Tencent almost planned to recruit legendary hackers.

After Ma Huateng Investment knew about the Chuangyu team, he once asked Yang Jilong how to do security.

Yang Jilong suggested to Tencent: First, we must dig up some real ashes-level hackers, because ashes-level hackers understand from the underlying principles to applications, and they can really strengthen Tencent's own security; second, we must invest in some security companies in all directions of the industry to enhance their strength in the peripheral ecology.

After that, Yang Jilong handed Tencent Ren Yuxin and Ding Ke a list, which said Fang Xing, Wu Shi, TK, Yuan Ge, Killer... The names of these legendary hackers.

Later, Tencent's seven security labs were almost set up for these people.

Regarding Tencent and 360 and Ali robbing people, this is another story, please continue to pay attention to the new book "Boiling Letter Anzhi" in the history of boiling technology series.

Because he always ran Xcon, Wang Yingjian was gradually regarded as the convener of the hacker world martial arts conference, so he had a resounding name - Dumb God.

With the growing reputation of Xcon, Wang Yingjian looked for guest speakers, and also changed from an appointment to a patient reviewer, and even rejected a new generation of loophole kings - black brother.

After being rejected, The black brother did not give up, and then submitted the article again a year later, still trying to speak at Xcon, but still rejected.

However, Black Brother was not discouraged, because his main energy at that time was still in medicine.

Not long ago, Black Brother also said to Lei Feng Network: "In fact, I really love the profession of doctors, but as an undergraduate, my work in the city hospital has come to an end, and it is difficult to have room for development, so after having children, I was forced to change my hobby to the main job." ”

On the one hand, Black Brother is the king of vulnerabilities, the master of web security, on the other hand, he is also an outstanding surgeon in Yiyang People's Hospital, who has used countless jjs in his hands, and can be called a foreskin terminator.

During his time as a surgeon, Wu Hanqing invited him because he had dug up many Microsoft vulnerabilities, was the first to propose the CSRF Worm concept, and even went to Taobao to train the security team in penetration testing under web 2.0.

At first, The black brother refused to invite the big factory, so the Internet has been rumored that the black brother opened "Maserati".

In fact, the black brother earns a salary of three or four thousand a month, holding the child every day and saying pulled.

China Hacker Relationship Diagram

Black brother Zhou Jingping

In 2011, Black Brother had a child, felt that he needed more money, so he proposed three conditions to find a safety job, the most important thing is to work at home, and was soon mined by Zhao Wei, who knew Chuangyu, and became a CSO (Chief Security Officer) and 404 Laboratory Director, and the money doubled N times.

Coincidentally, the TK sect leader also jumped from NSF to Tencent because he had a child and needed more money.

It can be seen that children are the ladder of hacker progress.

The black brother is not only simple, but also kind-hearted, and even went on TV because of being a good person.

Black brother came home from work around 2011, and on the way saw a person with a heart attack, lying on the garage floor unable to move, if no one saved his life.

The black brother passed by and reached out to help, saving people's lives. In fact, at that time, the society was because of the impact of Peng Yu's case, the atmosphere was very cold, that is, before and after the black brother saved people, the "XiaoYueyue Incident" occurred somewhere (18 people passed by and did not save the 2-year-old girl).

Black brother to find loopholes on the Internet, treat patients in the hospital, save people on the road that no one sees, benevolence, such hackers even if they master the strongest attack technology is also reassuring.

However, Xcon didn't know if he could rest assured.

A year after Black Brother joined Know Chuangyu, He knew that Chuangyu created a hacking conference Kcon with a scale of 1,000 people, and it was held once a year.

Every time Xcon was later compared, the biggest object of comparison was Kcon.

After 2015, with the popularity of 4G, China's Internet industry has entered an explosive period, e-commerce, Internet finance, sharing economy, recommendation engines, community group buying have come, and the entire industry's pursuit of security has rapidly increased.

Security personnel, which were not popular, are suddenly in short supply, and the gap is very large.

Wang Yingjian and Cai Jingjing founded the "Mythical Action", under the sponsorship of Qi Xiangdong (founder of Qianxin), a group of outstanding students were trained. Later, these people became the elite in the field of information security.

In the eyes of hackers, now is a good era for the security industry, the state attaches importance to it, the technology is leading, and everyone has all kinds of opportunities.

6

postscript

In the 1990s, the term "hacker" appeared in Chinese environment, first appeared in academic journals, referring to highly skilled computer experts, a completely positive term, and did not refer to people who invaded other people's computers.

But over the years, the meaning of the word has changed, which makes it necessary to discuss the "hacking spirit".

Wu Hanqing said in "White Hats on Web Security": "The purest hacker spirit is essentially dead. ”

China Hacker Relationship Diagram

Wu Hanqing

Zhang Xundi's slogan for the security focus was: "From the internet for the internet." ”

Fang Xing said: "The spirit of hacking is innovation and self-discipline. The greatest value of hackers is to discover something valuable but unknown. Because hackers have the ability to attack and control network devices, it is easy to use this ability to obtain benefits and cause greater harm, so they must use these capabilities with restraint. ”

Yang Jilong said: "The spirit of hackers has four points, one is to explore the unknown, the second is to never shrink back, the third is reverse thinking, and the fourth is to have a righteous heart. ”

In order to describe the "hacker spirit" in Zhihu, Ouyang Meiwen wrote a wonderful quote, which is the content of the "Eight Parts of the Heavenly Dragon" describing the storm and evil:

"The man in black stood on the canoe bridge, his body was as immobile as a mountain, and he was actually a man with superior martial arts skills. The countryman who picked up the dung was just an ordinary person, and although he was born strong and strong, he could not do any martial arts.

The more I looked at it, the more strange it became, and I wondered: This man in black was so skilled in martial arts that he only had to stretch out a little finger, and he pushed this countryman into the river with the dung burden, but he did not use martial arts at all...

The man in black was poured with dung in his mouth, and if he wanted to kill the countryman, he would only raise his hand. Even if he refuses to kill people casually, then it is natural to punch him a few times, but he is not arrogant. This person's temperament is indeed a little special, and it can be said that it is very rare in the martial forest... Can a person like this be considered a good friend and a good man? ”

The network security industry is very similar to the martial arts jianghu, there are sect organizations, there are jianghu drinking numbers, there are martial arts conferences, there are desperate plans and treasures, and they are all few heroes and many evil thieves, and even the control methods of the imperial court are very similar.

In this atmosphere, there was such a group of strange people.

In the most difficult years, they can only lower the moral bottom line a little, and they can eat and clothe without worry, but they do not;

They have the most superb technology, but they take half or even lower salaries in the traffic industry, and they can get out of trouble with a little gray production, but they don't;

They endure social doubts and bear the negativity brought by industry hooligans, but still adhere to the technological innovation they love.

Until now, they have finally waited for their own time.

In 2018, Defcon China, the world's top hacking conference, was held in China, the first time it had left Las Vegas in its twenty-five years of existence. Baidu Majie and Wang Yingjian have made a lot of efforts together. This story is wonderful enough that we will also write it in "Boiling Letter Creation".

Although the vast majority of Defcon's hosting team were very opposed, founder Jeff Moss was very insistent.

Jeff Moss is said to have been impressed by this sentence:

"Defcon's development in the United States has come to an end. We in China now have the largest user base and the largest group of security technology enthusiasts. You have no better choice than China. ”

precisely:

The heroes of the world are out of my generation, and once they enter the rivers and lakes, they are urged.

The dust is like a tide of people like water, and the rivers and lakes are just a few people back.

This is a warm-up article, since the 2021 revision of the "Boiling Fifteen Years" chronicle of the history of the Internet and the "Boiling New Decade" of the history of the mobile Internet were published, the boiling science and technology history series has been widely welcomed. Leifeng Network has launched the visit and writing of another new book on the history of science and technology, "Boiling Letter and Anzhi".

In recent years, China's Internet industry has become more and more mature, and the information security industry has also entered a dividend period, but all this is inseparable from the painstaking efforts of information security practitioners in the past 20 years. "Boiling Xin'anzhi" not only wants to record the early development opportunities of the information security industry, but also wants to show the style of the contributors when the industry is in progress, and also wants to remember the many imaginations of technological innovators for the future.

END

Read on