You are on page 1of 15



 

      

(6 % 5 ..
%&3 12 
0   -./ *)( +,
%&
"! #  
..  8

.  ;
% F  D%E ABC ? > 6 :; 9#&

.   IK
& L  :; (K 2 8  2 " .% ,  H8  IJ%
(DJ  8% 2 8
/K 

Here's a Hint :
Think Like a Hacker and avoid being HACKED !

Author :
Mohammed Nasser Al-Mawri

;*
:
2!2 -


 - 12
%&3

 12K
 S -
%&3 / 2 8   K).


J/ - .. SE?* )(  . >2

 --, .. :8 V .. W E%; D .

 -/K -,   *+ 


%. *+
# /  Y  . SE

 -.% 
12K
%&3 8 ..-,

 2 - 6 *? >-" Z  2C


%.  L [EV

 -> "J :CC I

 2!2
IB,
8" .. 9_3 2 : HK > a/%" 8" Y
 "  K
 9 A 12HK
*2 .. I > a/% ] * K
E; .. [ 12
 2 12 e %
2 . >V  
12
 " %
12,; F
[0 12  .. 9% A
E 12  ;L,
[0 f C 12
 .. 9% g

 C K 2
&j
E .. 12 (6
EV >k 12 23   Z
%. EC

 .. : 12
%&3 /E . *C ?C 2
.. kids [V3 .. Hacker'z I
E 12
" A 
+ .. Trojan /
# C-( .. 3 back door /  J.

> (6  % FJC : .. 12K


E , -Z 12K
 C
%&, ] > .. 12K
E [
a-
12K
  1C
%&, ..   f0"2 *
 .. S / patch

(6
E 12  
HK A *E  I a/ !"
#  nK   I 
aI
 :*;.. 
%. 2 % *+ :; >2 -!C" , . , " !


 - 12
%&3 .


 5%. 12
%&, C  >!K 
 A K E *+ 2  Y *+ A 
%.
" A Y .% E 6 "  % >!K %0 K E   .. ]  ;
0 *

.. [  Y

_ 9
E 12  % ..   (+ %" :%.% *2bifrost , spy-net , trukjan , : :
pison .. Etc

" + 
 2
k 12
%&3 ..* FJK A n C .. (
J : client to-
server

8" , 2 (6 ! (
J

k2 :

!2 :.% .. nK
%K3 (6  :; (
J 
] >k2 12  Esay-caf n;  :K
[ Dway_

 2 12( ! .. : 
8;  ? .. r

 > . 
%. ]  .. [ server / 9 ] nK .. [ client /

r 0% , ,.% ?*  , 2 .. server" r 0% 


;

2 I%EZ/K
J2 *+ A .. .. g>  (
;  %" I]  .. [ 92 0 sD-. * %" :%
 
12K !*.. A
I 6 
%. 2 %  .. *? 9% B J ;!  sD-.
; " :%  
12K

%&3 ..

! Get it
( 6
; : 
12
%&3 ..

 12K
 S -
%&3 / 2 8 .   K).
 .. ! C *2 0!K [L K K :; C E" .. C :" )*+   A E/
..   EC8"6* >J% 
 > .. Tcp/ip 
 > >!K J  * E!%" Y

E > & ip address rL  >J% ?* ..j *+ .%"
&j .. nK
%K3"%

a6
Z . ?* ! 2C ! r0   I - .. 8( (
2&
%" ..
 5%.2 ip address IC2 .. f

v E%" / A 6 !

r 0%" 5 
%. "*+ :; % ..
a% nZ Z Z ip address .  : AE% 
%. r 0%" ,&
% :Z %;
82 f"
#  , ip address .  :!

.. :
 .. C-w A" 2 I C 8

 >EZ :; .. f8% :K2  [L  SE .. >8" 5

 !" .. /K , ] 12K


E /
a-
 Z C .. *
.%x 
12K *
k2 bifrost
- / Trojan / SE
#j( [ .."  ; rY ip address .  
%. / F
. 3 .. I A y!; >8" SE K E *+ 2  Y *+ A 
%. ..

A"  % K E !

. [ V .. *+ A 
%. .. ] [ ip 6   8L&> >
" : .. SE 2 8
*+ 2  Y A ?* 6 "> I !; ip. y

2 :*"E v  E!%  I K E  * .. 


12K
%&3

k2 :


12K
%&3 :3

: Trojan / SE3

 " Mr.Mo0oha& C


E >-; %" 2C
a%" ip address  .. 8( 
?2 ! 6* ..  " % 
%. 2&
% *+ D! 3 z  :  + ; : SE
 5%.2 [EVz  : .  
%.  8J0K  ! %" 5 ! I

 .. C  %!"
# I C2 
%. .. % L !J" , : ..

 - " static-ip I% (


a ", ip .. ne D

 - " d-ip**** I% ip >-JC . : (6 |8 0!C :/ .

! 
B
; % ..  EC+6 C 2 2. z  : .. :w [V
%" } 
E8% *+ r2 >28%  A 6 z  " : .. " :3 %" , 82 >28%

BE2 ..

%" 5 ! I

2
/ ! :% (6 2.no-ip :

*8Z 2
 : www.no-ip.com

_
 ..
k

"! *
 :; > ?%  .. rZ8 " %/K & .. 5 Y%2 / host 

 - " %/K 5 Y%2 / host


% - >E!% K E 
 2 *+ nK A I .. host   k2

MrMo0oha.no-ip.com

.. 2 / z  : :,z !

MrMo0oha.no-ip.com .. [ V

. .  >28%  5 
%. r2 host .  .."A/C -   *+( *+

/  (
;  :% I host

.! .
/ 

 %" .. 12K *+ A E 


%. .. : % % C  >V  host
 }  V  K A I *  %" n *
BE2 *+ A 
%. ..

  AC nV ( : (
J

V( .. [ L %


J/ - .. SE?* )( .

, .. %"
k ." 
12 " 2 > 6 !


k ?"  2.%
 A 12 "  *K : >   6!C.. :3

2&
E ! I 6

 12K
 : EC "  >k" , 2 % 0 " .. 2 >Z I" .. Y :!E%
"    J  I*; A %8
%&, ..2 
%K+ / 3 ..  J. %" Z :%
*+ :; *% Ek  .. I !. * I


 .. 9C?% 12 " "! 
%.  ]
J/% - / Trojan / back door / SE

#( [
8%" , : ..   
12K " " %282 % ;
2;
 I%D
% ,]  K
HK  / I a/
E 12 
.. [   E" %   ? r  8 "
" :%] /K
J2 :; ("+
"?
% //K J2 / dll E!% K E 

E [ tcp/ip
..
J/  K3 I 12K
  .. SE " !

12K
 / " F> :B !

 --, .. :8 V .. W E%; D .


 !"
#  ! Ce-, :8.%x :   rZ ! :% (6 >k2 .. 2.
www.no-ip.com rZ 2" Y/K E!%w host K E 
  , e 2 *
*+ A *
..
r + / ()*+,  :% %" .. * ; SE   *K A6 *  .. n>-  e 2
(6 2 8 *+ A *
..

V( : [ L %

 -/K -,   *+ 


%. *+
# /  Y 
. SE
r +
0 v A! 2


# 5%.  2 SE
%;
82 9 ..
&j A& :; 
E6 *Y8E; ..
23
" >a%   % L %2 J ..
r 0%" , jpg a V   ) % !!! exe
( 6 :   C  YJ *
:/  * F :% ..
 " " Z Y + *
8" "L ..  2 
 E" ;
8 2& .2.. +
 8" , *C , ! >   J
%&, .. %" 5
> *
 %2 52 E" Exe  I/
 A y!; %8" .. I 6  ..
" !%8 6 ! S
 >
" Z *
%2 52 ; Jpg " 0" :a " IB 6  " Z 5 !! S

 z ; : .. 00)+ W V r + J / [E- Z ..


 J2 nK doc , .pdf .. etc.  E%2
J2 _mp , rmv , wmv etc :K
J2 V jpg , jpeg , gif ,bmp etc

 Z *8 +  J2 ] - / Trojan


#j( . [ patch /

8%
#  SE : (
k6 :J%
* : *C2

 f"
#  - e ] " /
?C2 [ :E" /

 -: 2 a2 y

2 " :C8 a2 y ! ..


" :C8 *
Z .. 
; 2 JV r/K( Z  .. *  >"8%
 .. %" 5 SE *+ A  2C&> (6 J-
 ] J-
 y  a [
k2
www.SiLvRcod.com/about.htm
www.SiLvRcod.com/Me.jpg

 a V %2  .. 5 * ; :
 y  a ..
 !" 2C *
 A >"8% (6 .. J-"
; (
2 *8&
!" .. 
ae ;L
ae 2
 .. [J-%  [J-% 6 " 2.%_ 9   2.% D %" I 6 IE
ae rL EC2
[ (6 52 >")C% (
ak ?2 :; SE  / Startup > a/ %" : .. > a/% SE
> 8 .. % ?* ..
Y  F( ;! Startup 52 y  " .% (
ak
 .%2 ... L 2 n : " Ck, !

 - 12  SE 
12&

/K ; : "%C !

A 9?" I 6 ? r 6 2 J 2 *  %" :% .. nK


%K, % -2 2 *K
.. Z e 2

..  2
k
0  J%.   C% v :% ; "*K : 0 A&
% *+ ..

 -.% 
12K
%&3 8 ..-, .

  .. SE*+ :;  a/ ..  Y E!% K E 


 2 SE A

12K
%&3 ;*+ : *
..
*6 
%&3 %00

 !
 2  & 12K
 sD-
%&w ..  
k2 biforst 12K

V( biforst 12K
 sD-& / [ L %

r + . ..  j%2 sD-& 5%. 8E#> 


 12K..
&z

 2 - 6 *? >-" Z  2C


%.  L [EV
> 
>  I sD-.
; " :% 
12K
%&3 *
!! ..
" r 0% *
6 JC ..  2

" ;L, Y I r + A r 0%" .. sD-. *


;
; r ..*+ A * a/ ..
v  I
J
L A :; *2 r0Z ?* *C2  / * / Etc .. 1 8

I nEV nK*+ "  " E8 *


* %" ... B J ..
K

 -> "J :CC I

 J IC" rE0 .. I


"   :; [-C +  I/ &
% >-J ..   D*K nC ?* .. 2 C"82  e 2rL
>. :%.. nE V

:C8" , . 6 nZ

# J
%&, ; : nZ  .. :

 ..

  L .. *
B % " ?* 2
%&3 .. B 

.. :Kk 3  D)? .. " ()*+3


%&   K 2 " L 2 :*%C" C A

.. L  6
B :; n!; Z AC
.. 0 / :JK 2  ;0&  2 f ;  ;nEV

.. (
Ja  
 j :    ,

      

Notes .. H 2 *

==============================

6 ,!>
K "? , Mr.Mo0oha = SiLvr CoD :  J2 ! r + . -
! .. ! J y!; .. ( F - A 6 " > 3 -

Author :
Mohammed Nasser Al-Mawri

You might also like