Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
6Activity
0 of .
Results for:
No results containing your search query
P. 1
Lam the Nao de Tro Thanh Hacker

Lam the Nao de Tro Thanh Hacker

Ratings:

4.0

(1)
|Views: 633 |Likes:
Published by api-3741878
tro thanh Hacker
tro thanh Hacker

More info:

Published by: api-3741878 on Oct 15, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/18/2014

pdf

text

original

Nh\ue000ng hi\ue001u bi\ue002t c\ue003 b\ue004n nh\ue005t\ue006\ue001 tr\ue007 th\u00e0nh Hacker - Ph\ue008n 1 [10/11/2004 3:02:00 PM]

Nhi\ue009u b\ue00an Newbie c\u00f3 h\ue00bi t\u00f4i \u201c Hack l\u00e0 nh\ue00c th\ue002 n\u00e0o ? L\u00e0m sao\ue006\ue001 hack ?\u201d Nh\ue00cng c\u00e1c b\ue00an\ue006\u00e3 qu\u00ean m\ue005t m\ue00dt\ue006i\ue009u l\u00e0 c\u00e1c b\ue00an c\ue008n ph\ue004I c\u00f3 ki\ue002n th\ue00ec m\ue00dt c\u00e1ch t\ue00fng qu\u00e1t , hi\ue001u c\u00e1c thu\ue010t ng\ue000 m\u00e0 nh\ue000ng ng\ue00c\ue011i r\u00e0nh v\ue009 m\ue00ang hay s\ue012 d\ue013ng . Ri\u00eang t\u00f4i th\u00ec ch\ue00ca th\ue010t gi\ue00bi bao nhi\u00eau nh\ue00cng qua nghi\u00ean c\ue00eu t\u00f4i c\ue014ng\ue006\u00e3 t\ue00fng h\ue015p\ue006\ue00c\ue015c m\ue00dt s\ue016 ki\ue002n th\ue00ec c\ue003 b\ue004n , mu\ue016n chia s\ue017 cho t\ue005t c\ue004 c\u00e1c b\ue00an , nh\ue018m c\u00f9ng c\u00e1c b\ue00an h\ue019c h\ue00bi .

T\u00f4i s\ue000 kh\u00f4ng ch\ue001u tr\u00e1ch nhi\ue002m n\ue003u c\u00e1c b\ue004n d\u00f9ng n\u00f3\ue005\ue006 qu\ue007y ph\u00e1 ng\ue008\ue009i kh\u00e1c . C\u00e1c b\ue004n c\u00f3 th\ue006 copy ho\ue00ac post trong c\u00e1c trang Web kh\u00e1c nh\ue008ng h\u00e3y\ue005i\ue00bn ti\u00ean t\u00e1c gi\ue00c\ue00d d\ue008\ue00ei b\u00e0i , t\u00f4n tr\ue00fng b\u00e0i vi\ue003t n\u00e0y c\ue010ng ch\u00ednh l\u00e0 t\u00f4n tr\ue00fng t\u00f4i v\u00e0 c\u00f4ng s\ue011c c\ue012a t\u00f4i ,\ue005\ue013ng th\ue009i c\ue010ng t\u00f4n tr\ue00fng ch\u00ednh b\ue00cn th\u00e2n c\u00e1c b\ue004n . Trong n\u00e0y t\u00f4i c\ue010ng c\u00f3 ch\u00e8n th\u00eam m\ue014t s\ue015 c\u00e1ch hack , crack v\u00e0 v\u00ed d\ue016 c\ue017n b\ue00cn , c\u00e1c b\ue004n c\u00f3 th\ue006\ue011ng d\ue016ng th\ue018 v\u00e0 nghi\u00ean c\ue011u\ue005\ue00fc n\u00f3\ue005\ue006 hi\ue006u th\u00eam , r\ue013i khi b\ue019t g\ue00ap m\ue014t t\ue01a m\u00e0 c\u00e1c b\ue004n kh\u00f4ng hi\ue006u th\u00ec h\u00e3y\ue005\ue00fc b\u00e0i n\u00e0y\ue005\ue006 bi\ue003t , trong n\u00e0y t\u00f4i c\u00f3 s\ue018 d\ue016ng m\ue014t s\ue015 \u00fd c\ue012a b\u00e0i vi\ue003t m\u00e0 t\u00f4i th\ue01by r\ue01bt hay t\ue01a trang Web c\ue012a HVA , v\u00e0 c\u00e1c trang Web kh\u00e1c m\u00e0 t\u00f4i\ue005\u00e3 t\ue01ang gh\u00e9 th\ue017m . Xin c\ue00cm\ue01cn nh\ue01dng t\u00e1c gi\ue00c\ue005\u00e3 vi\ue003t nh\ue01dng b\u00e0i\ue01by . B\u00e2y gi\ue009 l\u00e0

v\ue01bn
\ue005\ue00b
ch\u00ednh
.
1
.
)
Ta
c\ue008n
nh\ue000ng
g\u00ec
\ue006\ue001
b\ue01at
\ue006\ue008u?
C\u00f3 th\ue006 nhi\ue00bu b\ue004n kh\u00f4ng\ue005\ue013ng \u00fd v\ue00ei t\u00f4i nh\ue008ng c\u00e1ch t\ue015t nh\ue01bt\ue005\ue006 th\ue01ec t\ue007p l\u00e0 c\u00e1c b\ue004n h\u00e3y
d\u00f9ng H\ue01fH Window 9X , r\ue013I\ue005\ue003n c\u00e1c c\u00e1i kh\u00e1c m\ue004nh h\ue01cn\ue005\u00f3 l\u00e0 Linux ho\ue00ac Unix , d\ue008\ue00eI
\ue005\u00e2y
l\u00e0
nh\ue01dng
c\u00e1i
b\ue004n
c!n
c\u00f3

: + M\ue014t c\u00e1i OS ( c\u00f3 th\ue006 l\u00e0 DOS , Window 9X , Linux , Unit \u2026.) + M\ue014t c\u00e1i trang Web t\ue015t ( HVA ch"ng h\ue004n hi`hi` greenbiggrin.gif greenbiggrin.gif ) + M\ue014t b\ue014 tr\u00ecnh duy\ue002t m\ue004ng t\ue015t ( l\u00e0 Nescape , IE , nh\ue008ng t\ue015t nh\ue01bt c\u00f3 l\ue000 l\u00e0 Gozzila ) +

M\ue014t
c\u00f4ng
c\ue016
chat
t\ue015t
(
mIRC
,Yahoo
Mass
\u2026..)
+
Telnet
(
ho\ue00ac
nh\ue01dng
c\u00e1i
t\ue008\ue01cng
t\ue01e
nh\ue008
nmap

\u2026) + C\u00e1i quan tr\ue00fng nh\ue01bt m\u00e0 b\ue01bt c\ue011 ai mu\ue015n tr\ue00d th\u00e0nh m\ue014t hacker l\u00e0\ue005\ue00bu ph\ue00cI c\u00f3 m\ue014t ch\u00fat ki\ue003n th\ue011c v\ue00b l\ue007p tr\u00ecnh ( C , C++ , Visual Basic , Pert \u2026..)

2
.
)
Th\ue002
n\u00e0o
l\u00e0
m\ue00dt
\ue006\ue01ba
ch\ue01c
IP
?

_\ue01f\ue001a ch# IP\ue005\ue008$c chia th\u00e0nh 4 s\ue015 gi\ue00ei h\ue004n t\ue01a 0 - 255. M%i s\ue015\ue005\ue008$c l\ue008u b\ue00di 1 byte - > !P c\u00f3 kicks th\ue008\ue00ec l\u00e0 4byte,\ue005\ue008$c chia th\u00e0nh c\u00e1c l\ue00ep\ue005\ue001a ch#. C\u00f3 3 l\ue00ep l\u00e0 A, B, v\u00e0 C. N\ue003u\ue00d l\ue00ep A, ta s\ue000 c\u00f3 th\ue006 c\u00f3 16 tri\ue002u\ue005i\ue004 ch#,\ue00d l\ue00ep B c\u00f3 65536\ue005\ue001a ch#. V\u00ed d\ue016:& l\ue00ep B v\ue00ei 132.25,ch\u00fang ta c\u00f3 t\ue01bt c\ue00c c\u00e1c\ue005\ue001a ch# t\ue01a 132.25.0.0\ue005\ue003n 132.25.255.255. Ph!n l\ue00en c\u00e1c\ue005\ue001a ch#\ue00d l\ue00ep A ll\u00e0 s\ue00d h\ue01du c\ue012a c\u00e1c c\u00f4ng ty hay c\ue012a t' ch\ue011c. M\ue014t ISP th\ue008\ue009ng s\ue00d h\ue01du m\ue014t v\u00e0i

\ue005\ue001a ch#l\ue00ep B ho\ue00ac C. V\u00ed d\ue016: N\ue003u \ue005\ue001a ch# IP c\ue012a b\ue004n l\u00e0 132.25.23.24 th\u00ec b\ue004n c\u00f3 th\ue006x\u00e1c
\ue005\ue001nh
ISP
c\ue012a
b\ue004n
l\u00e0
ai.
(
c\u00f3
IP
l\u00e0

132.25.x.) _ IP l\u00e0 t\ue01a vi\ue003t t\ue019t c\ue012a Internet Protocol, tr\u00ean Internet th\u00ec\ue005\ue001a ch# IP c\ue012a m%I ng\ue008\ue009i l\u00e0 duy nh\ue01bt v\u00e0 n\u00f3 s\ue000\ue005\ue004I di\ue002n cho ch\u00ednh ng\ue008\ue009I\ue005\u00f3,\ue005\ue001a ch# IP\ue005\ue008$c s\ue018 d\ue016ng b\ue00di c\u00e1c m\u00e1y t\u00ednh kh\u00e1c nhau\ue005\ue006 nh\ue007n bi\ue003t c\u00e1c m\u00e1y t\u00ednh k\ue003t n\ue015i gi\ue01da ch\u00fang.\ue01f\u00e2y l\u00e0 l\u00ed do t\ue004i sao b\ue004n l\ue004i b\ue001 IRC c\ue01bm,

v\u00e0
l\u00e0
c\u00e1ch
ng\ue008\ue009i
ta
t\u00ecm
ra
IP
c\ue012a
b\ue004n.
\ue01f\ue001a ch# IP c\u00f3 th\ue006d( d\u00e0ng ph\u00e1t hi\ue002n ra, ng\ue008\ue009i ta c\u00f3 th\ue006l\ue01by \ue005\ue008$c qua c\u00e1c c\u00e1ch sau :
+
b\ue004n
l\ue008\ue00et
qua
m\ue014t
trang
web,
IP
c\ue012a
b\ue004n
b\ue001
ghi
l\ue004i
+
tr\u00ean
IRC,
b\ue01bt
k\u00ec
ai
c\ue010ng
c\u00f3
th\ue006
c\u00f3
IP
c\ue012a

b\ue004n + tr\u00ean ICQ, m\ue00fi ng\ue008\ue009i c\u00f3 th\ue006 bi\ue003t IP c\ue012a b\ue004n, th\ue007m ch\u00ed b\ue004n ch\ue00fn ``do not show ip`` ng\ue008\ue009i ta

v)n
l\ue01by
\ue005\ue008$c
n\u00f3
+ n\ue003u b\ue004n k\ue003t n\ue015i v\ue00ei m\ue014t ai\ue005\u00f3, h\ue00f c\u00f3 th\ue003 g\u00f5 ``systat \u2013n ``, v\u00e0 bi\ue003t\ue005\ue008$c ai\ue005ang k\ue003t n\ue015i
\ue005\u00ean
h\ue00f
+ n\ue003u ai\ue005\u00f3 g\ue018i cho b\ue004n m\ue014t email v\ue00ei m\ue014t\ue005o\ue004n m\u00e3 java t\u00f3m IP, h\ue00f c\ue010ng c\u00f3 th\ue006 t\u00f3m
\ue005\ue008$c
IP
c\ue012a
b\ue004n
(
T\u00e0i
li\ue002u
c\ue012a
HVA
)
3 . ) L\u00e0m th\ue002 n\u00e0o\ue006\ue001 bi\ue002t\ue006\ue00c\ue015c\ue006\ue01ba ch\ue01c IP c\ue01da m\u00ecnh ?
_
Trong
Window
:
v\u00e0o
Start
*Run
\ue005\u00e1nh
l\ue002nh
\u201cwinipcfg\u201d
.
_ Trong mIRC : k\ue003t n\ue015I\ue005\ue003n m\u00e1y ch\ue012 sau\ue005\u00f3\ue005\u00e1nh l\ue002nh \u201c/dns \u201d
_
Th\u00f4ng
qua
m\ue014t
s\ue015
trang
Web
c\u00f3
hi\ue006n
th\ue001
IP
.
4
.
)
IP
Spoofing
l\u00e0
g\u00ec
?

_ M\ue014t s\ue015 IP c\u00f3 m\ue016c\ue005\u00edch\ue005\ue006 x\u00e1c\ue005\ue001nh m\ue014t thi\ue003t b\ue001 duy nh\ue01bt tr\u00ean th\ue003 gi\ue00ei. V\u00ec v\ue007y tr\u00ean m\ue004ng m\ue014t m\u00e1y ch\ue012 c\u00f3 th\ue006 cho ph\u00e9p m\ue014t thi\ue003t b\ue001 kh\u00e1c trao\ue005'i d\ue01d li\ue002u qua l\ue004i m\u00e0 kh\u00f4ng c!n ki\ue006m

tra
m\u00e1y

ch\ue012. Tuy nhi\u00ean c\u00f3 th\ue006 thay\ue005'i IP c\ue012a b\ue004n, ngh+a l\u00e0 b\ue004n c\u00f3 th\ue006 g\ue00di m\ue014t th\u00f4ng tin gi\ue00c\ue005\ue003n m\ue014t m\u00e1y kh\u00e1c m\u00e0 m\u00e1y\ue005\u00f3 s\ue000 tin r,ng th\u00f4ng tin nh\ue007n\ue005\ue008$c xu\ue01bt ph\u00e1t t\ue01a m\ue014t m\u00e1y n\u00e0o\ue005\u00f3 (t\ue01bt nhi\u00ean l\u00e0 kh\u00f4ng ph\ue00ci m\u00e1y c\ue012a b\ue004n). B\ue004n c\u00f3 th\ue006 v\ue008$t qua m\u00e1y ch\ue012 m\u00e0 kh\u00f4ng c!n ph\ue00ci c\u00f3 quy\ue00bn\ue005i\ue00bu khi\ue003n m\u00e1y ch\ue012\ue005\u00f3.\ue01fi\ue00bu tr\ue00d ng\ue004i l\u00e0\ue00d ch% nh\ue01dng th\u00f4ng tin ph\ue00cn h\ue013i t\ue01a m\u00e1y ch\ue012 s\ue000\ue005\ue008$c g\ue00di\ue005\ue003n thi\ue003t b\ue001 c\u00f3 IP m\u00e0 ch\u00fang ta\ue005\u00e3 gi\ue00c m\ue004o. V\u00ec v\ue007y c\u00f3 th\ue006 b\ue004n s\ue000 kh\u00f4ng c\u00f3

\ue005\ue008$c s\ue01eph\ue00cn h\ue013i nh\ue01dng th\u00f4ng tin m\u00e0 m\u00ecnh mong mu\ue015n. C\u00f3 l\ue000 \ue005i\ue00bu duy nh\ue01bt m\u00e0 spoof IP
c\u00f3 hi\ue002u qu\ue00c l\u00e0 khi b\ue004n c!n v\ue008$t qua firewall, tr\ue014m account v\u00e0 c!n d\ue01bu th\u00f4ng tin c\u00e1 nh\u00e2n!
(
T\u00e0i
li\ue002u
c\ue012a
HVA
)
5
.
)
Trojan
/
worm
/
virus
/
logicbomb
l\u00e0
c\u00e1i
g\u00ec
?

_ Trojan : N\u00f3i cho d( hi\ue006u th\u00ec\ue005\u00e2y l\u00e0 ch\ue008\ue01cng tr\u00ecnh\ue005i\ue002p vi\u00ean\ue005\ue008$c c\u00e0i v\u00e0o m\u00e1y c\ue012a ng\ue008\ue009I kh\u00e1c \ue005\ue006 \ue017n c\ue019p nh\ue010ng t\u00e0i li\ue002u tr\u00ean m\u00e1y\ue005\u00f3 g\ue018I v\ue00b cho ch\ue012 nh\u00e2n c\ue012a n\u00f3 , C\u00e1i m\u00e0 n\u00f3\ue017n c\ue019p c\u00f3 th\ue006 l\u00e0 m\ue007t kh-u , accourt , hay cookie \u2026\u2026\u2026. tu. theo \u00fd mu\ue015n c\ue012a ng\ue008\ue009I c\u00e0i n\u00f3 . _ virus : N\u00f3i cho d( hi\ue006u th\u00ec\ue005\u00e2y l\u00e0 ch\ue008\ue01cng tr\u00ecnh v\ue00eI nh\ue01dng m\u00e3\ue005\ue00ac bi\ue002t\ue005\ue008$c c\u00e0i ( ho\ue00ac l\u00e2y lan t\ue01a m\u00e1y kh\u00e1c ) l\u00ean m\u00e1y c\ue012a n\ue004n nh\u00e2n v\u00e0 th\ue01ec hi\ue002n nh\ue01dng y\u00eau c!u c\ue012a m\u00e3\ue005\u00f3 ,\ue005a s\ue015 virut\ue005\ue008$c s\ue018 d\ue016ng\ue005\ue006 ph\u00e1 ho\ue004I d\ue01d li\ue002u ho\ue00ac ph\u00e1 ho\ue004I m\u00e1y t\u00ednh . _ worm :\ue01f\u00e2y l\u00e0 ch\ue008\ue01cng tr\u00ecnh\ue005\ue014c l\ue007p c\u00f3 th\ue006 t\ue01e nh\u00e2n b\ue00cn b\ue00cn th\u00e2n n\u00f3 v\u00e0 l\u00e2y lan kh\ue019p b\u00ean trong m\ue004ng .C\ue010ng gi\ue015ng nh\ue008 Virut , n\u00f3 c\ue010ng c\u00f3 th\ue006 ph\u00e1 ho\ue004I d\ue01d li\ue002u , ho\ue00ac n\u00f3 c\u00f3 th\ue006 ph\u00e1 ho\ue004I b\u00ean trong m\ue004ng , nhi\ue00bu khi c\u00f2n l\u00e0m down c\ue00c mang\ue005\u00f3 . _ logicbomb : L\u00e0 ch\ue008\ue01cng tr\u00ecnh g\ue018i m\ue014t l\u00fac nhi\ue00bu g\u00f3i d\ue01d li\ue002u cho c\u00f9ng m\ue014t\ue005\ue001a ch# , l\u00e0m

ng\ue007p l\ue016t h\ue002 th\ue015ng , t\ue019t ngh\ue000n\ue005\ue008\ue009ng truy\ue00bn ( tr\u00ean server ) ho\ue00ac d\u00f9ng l\u00e0m c\u00f4ng c\ue016\ue005\ue006
\u201ckh\ue012ng
b\ue015\u201d
\ue005\ue015I
ph\ue008\ue01cng
(
bom
Mail
)
;)
.
6
.
)
PGP
l\u00e0
g\u00ec
?

_ PGP l\u00e0 vi\ue003t t\ue019t c\ue012a t\ue01a \u201cPretty Good Privacy\u201d ,\ue005\u00e2y l\u00e0 c\u00f4ng c\ue016 s\ue018 d\ue016ng s\ue01e m\u00e3 ho\u00e1 ch\u00eca kho\u00e1 c\u00f4ng c\ue014ng\ue005\ue006 b\ue00co v\ue002 nh\ue01dng h\ue013 s\ue01c Email v\u00e0 d\ue01d li\ue002u , l\u00e0 d\ue004ng m\u00e3 ho\u00e1 an to\u00e0n cao s\ue018 d\ue016ng ph!n m\ue00bm cho MS_DOS , Unix , VAX/VMS v\u00e0 cho nh\ue01dng d\ue004ng kh\u00e1c .

7
.
)
Proxy
l\u00e0
g\u00ec
?

_Proxy cung c\ue01bp cho ng\ue008\ue009i s\ue018 d\ue016ng truy xu\ue01bt internet v\ue00ei nh\ue01dng host\ue005\ue01cn. Nh\ue01dng proxy server ph\ue016c v\ue016 nh\ue01dng nghi th\ue011c\ue005\ue00at bi\ue002t ho\ue00ac m\ue014t t\ue007p nh\ue01dng nghi th\ue011c th\ue01ec thi tr\u00ean dual_homed host ho\ue00ac basion host. Nh\ue01dng ch\ue008\ue01cng tr\u00ecnh client c\ue012a ng\ue008\ue009i s\ue018 dung s\ue000 qua trung gian proxy server thay th\ue003 cho server th\ue007t s\ue01e m\u00e0 ng\ue008\ue009i s\ue018 d\ue016ng c!n giao ti\ue003p. Proxy server x\u00e1c\ue005\ue001nh nh\ue01dng y\u00eau c!u t\ue01a client v\u00e0 quy\ue003t\ue005\ue001nh\ue005\u00e1p\ue011ng hay kh\u00f4ng\ue005\u00e1p\ue011ng, n\ue003u y\u00eau c!u\ue005\ue008$c\ue005\u00e1p\ue011ng, proxy server s\ue000 k\ue003t n\ue015i v\ue00ei server th\ue007t thay cho client v\u00e0 ti\ue003p t\ue016c chuy\ue006n ti\ue003p\ue005\ue003n nh\ue01dng y\u00eau c!u t\ue01a client\ue005\ue003n server, c\ue010ng nh\ue008\ue005\u00e1p\ue011ng nh\ue01dng y\u00eau c!u c\ue012a server\ue005\ue003n client. V\u00ec v\ue007y proxy server gi\ue015ng c!u n\ue015i trung gian gi\ue01da server v\u00e0 client . _ Proxy cho user truy xu\ue01bt d\ue001ch v\ue016 tr\u00ean internet theo ngh+a tr\ue01ec ti\ue003p. V\ue00ei dual host homed c!n ph\ue00ci login v\u00e0o host tr\ue008\ue00ec khi s\ue018 d\ue016ng d\ue001ch v\ue016 n\u00e0o tr\u00ean internet.\ue01fi\ue00bu n\u00e0y th\ue008\ue009ng kh\u00f4ng ti\ue002n l$i, v\u00e0 m\ue014t s\ue015 ng\ue008\ue009i tr\ue006 n\u00ean th\ue01bt v\ue00fng khi h\ue00f c\u00f3 c\ue00cm gi\u00e1c th\u00f4ng qua firewall, v\ue00ei proxy n\u00f3 gi\ue00ci quy\ue003t\ue005\ue008$c v\ue01bn\ue005\ue00b n\u00e0y. T\ue01bt nhi\u00ean n\u00f3 c\u00f2n c\u00f3 nh\ue01dng giao th\ue011c m\ue00ei nh\ue008ng n\u00f3i chung n\u00f3 c\ue010ng kh\u00e1 ti\ue002n l$i cho user. B\ue00di v\u00ec proxy cho ph\u00e9p user truy xu\ue01bt nh\ue01dng d\ue001ch v\ue016 tr\u00ean internet t\ue01a h\ue002 th\ue015ng c\u00e1 nh\u00e2n c\ue012a h\ue00f, v\u00ec v\ue007y n\u00f3 kh\u00f4ng cho ph\u00e9p packet

\ue005i tr\ue01ec ti\ue003p gi\ue01da h\ue002th\ue015ng s\ue018d\ue016ng v\u00e0 internet. \ue005\ue008\ue009ng \ue005i l\u00e0 gi\u00e1ng ti\ue003p th\u00f4ng qua dual
homed host ho\ue00ac th\u00f4ng qua s\ue01e k\ue003t h$p gi\ue01da bastion host v\u00e0 screening rounter.
(
B\u00e0i
vi\ue003t
c\ue012a
Z3RON3
\u2013
t\u00e0i
li\ue002u
c\ue012a
HVA
)
8
.
)
Unix
l\u00e0
g\u00ec
?

_ Unix l\u00e0 m\ue014t h\ue002\ue005i\ue00bu h\u00e0nh ( gi\ue015ng Window ) .N\u00f3 hi\ue002n l\u00e0 h\ue002\ue005i\ue00bu h\u00e0nh m\ue004nh nh\ue01bt , v\u00e0 th\u00e2n thi\ue003t v\ue00ei c\u00e1c Hacker nh\ue01bt . N\ue003u b\ue004n\ue005\u00e3 tr\ue00d th\u00e0nh m\ue014t hacker th\ue007t s\ue01e th\u00ec H\ue01fH n\u00e0y kh\u00f4ng th\ue006 thi\ue003u\ue005\ue015i v\ue00eI b\ue004n . N\u00f3\ue005\ue008$c s\ue018 d\ue016ng h% tr$ cho l\ue007p tr\u00ecnh ng\u00f4n ng\ue01d C .

9
.
)
Telnet
l\u00e0
g\u00ec
?

_ Telnet l\u00e0 m\ue014t ch\ue008\ue01cng tr\u00ecnh cho ph\u00e9p ta k\ue003t n\ue015I\ue005\ue003n m\u00e1y kh\u00e1c th\u00f4ng qua c'ng ( port ) . M\ue00fI m\u00e1y t\u00ednh ho\ue00ac m\u00e1y ch\ue012 ( server )\ue005\ue00bu c\u00f3 c'ng , sau\ue005\u00e2y l\u00e0 m\ue014t s\ue015 c'ng th\u00f4ng d\ue016ng : +

Port
21:
FTP
+
Port
23:
Telnet
+
Port
25:
SMTP
(Mail)

Activity (6)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
insider_truong liked this
gyg1993 liked this
gyg1993 liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->