Professional Documents
Culture Documents
ميكانيكية إختراق الأجهزة الشخصية من الألف للياء
ميكانيكية إختراق الأجهزة الشخصية من الألف للياء
(6 % 5 ..
%&3 12
0 -./*)( +,
%&
"! #
.. 8
. ;
% F D%E ABC ?> 6 :; 9#&
. IK
& L :; (K 2 8 2 " .% , H8 IJ%
(DJ 8% 2 8
/K
Here's a Hint :
Think Like a Hacker and avoid being HACKED !
Author :
Mohammed Nasser Al-Mawri
;*
:
2!2 -
- 12
%&3
12K
S -
%&3 /2 8 K).
J/ - .. SE?*)( . >2
-.%
12K
%&3 8 ..-,
2!2
IB,
8" .. 9_3 2 : HK >a/%" 8" Y
" K
9 A 12HK
*2 .. I >a/% ] * K
E; .. [ 12
2 12e %
2 . >V
12
"%
12,; F
[0 12 .. 9% A
E 12 ;L,
[0 fC 12
.. 9%g
C K 2
&j
E .. 12 (6
EV >k 12 23 Z
%. EC
.. : 12
%&3 /E . *C ?C 2
.. kids [V3 .. Hacker'z I
E 12
" A
+ .. Trojan /
# C-( .. 3 back door / J.
(6
E 12
HK A *E Ia/ !"
# nK I
aI
:*;..
%. 2 %*+ :; >2 -!C" , . , " !
- 12
%&3 .
5%. 12
%&, C >!K
AKE *+ 2 Y*+ A
%.
" A Y .% E 6 " % >!K %0KE .. ] ;
0*
.. [ Y
_ 9
E 12 % .. (+ %" :%.% *2bifrost , spy-net , trukjan , : :
pison .. Etc
" +
2
k 12
%&3 ..* FJK A nC .. (
J : client to-
server
8" , 2 (6! (
J
k2 :
!2 :.% .. nK
%K3 (6 :; (
J
] >k2 12 Esay-caf n; :K
[ Dway_
2 12( ! .. :
8; ?.. r
>.
%. ] .. [ server / 9 ] nK .. [ client /
%&3 ..
! Get it
( 6
; :
12
%&3 ..
12K
S -
%&3 /2 8 . K).
.. ! C *2 0!K [L K K :; CE" .. C :" )*+ AE/
.. EC8"6* >J%
> .. Tcp/ip
> >!KJ *E!%" Y
E > & ip address rL >J% ?* ..j *+ .%"
&j .. nK
%K3"%
a6
Z. ?* ! 2C ! r0 I- .. 8( (
2&
%" ..
5%.2 ip address IC2.. f
v E%" / A6 !
r0%" 5
%. "*+ :; % ..
a% nZ Z Z ip address. : AE%
%. r0%" ,&
% :Z %;
82 f"
# , ip address. :!
.. :
.. C-w A" 2 IC 8
. [V ..*+ A
%. .. ] [ ip6 8L&> >
" : .. SE2 8
*+ 2 Y A?* 6 "> I !; ip. y
k2 :
12K
%&3 :3
: Trojan / SE3
.. C %!"
# IC2
%. .. %L !J" , : ..
!
B
; % .. EC+6 C 22. z : .. :w [V
%" }
E8%*+ r2 >28% A 6 z " : .. " :3 %" ,82 >28%
BE2 ..
%" 5! I
2
/ ! :% (6 2.no-ip :
*8Z 2
: www.no-ip.com
_
..
k
"! *
:; >?% .. rZ8 " %/K & .. 5Y%2 / host
% - >E!%KE
2 *+ nK A I .. host k2
MrMo0oha.no-ip.com
.. 2 / z : :,z !
MrMo0oha.no-ip.com .. [V
. . >28% 5
%. r2 host. .."A/C - *+( *+
/ (
; :% I host
.! .
/
AC nV( : (
J
V( .. [L %
J/ - .. SE?*)( .
, .. %"
k ."
12" 2 > 6 !
k?" 2.%
A 12" *K :> 6!C.. :3
2&
E ! I6
12K
: EC" >k" , 2 % 0" .. 2 >Z I" .. Y:!E%
" J I*; A %8
%&, ..2
%K+ / 3 .. J.%" Z :%
*+ :; *%Ek .. I !. * I
.. 9C?% 12" "!
%. ]
J/%- / Trojan / back door / SE
#( [
8%" , : ..
12K" " %282 % ;
2;
I%D
%,] K
HK / Ia/
E 12
.. [ E" % ? r8 "
" :%] /K
J2 :; ("+
"?
% //K J2 / dll E!% KE
E [ tcp/ip
..
J/ K3 I 12K
.. SE" !
12K
/" F> :B !
V( : [L %
# 5%. 2 SE
%;
82 9 ..
&j A& :;
E6 *Y8E; ..
23
" >a% %L %2 J ..
r0%" , jpg aV )% !!! exe
( 6 : C YJ *
:/ * F :% ..
" " Z Y +*
8" "L .. 2
E" ;
8 2& .2.. +
8" , *C ,!> J
%&, .. %" 5
> *
%2 52 E" Exe I/
A y!; %8" .. I6 ..
" !%8 6 ! S
>
" Z*
%2 52 ; Jpg " 0" :a " IB 6 " Z 5 !! S
8%
# SE : (
k6 :J%
* : *C2
f"
# -e ] " /
?C2 [ :E" /
-: 2 a2 y
aV %2 .. 5* ; :
y a ..
!" 2C *
A >"8% (6 .. J-"
; (
2 *8&
!" ..
ae ;L
ae 2
.. [J-% [J-%6 " 2.%_ 9 2.% D %" I6 IE
ae rL EC2
[ (6 52 >")C% (
ak ?2 :; SE / Startup >a/ %" : .. >a/%SE
> 8 .. % ?* ..
Y F( ;! Startup 52 y " .% (
ak
.%2 ... L 2 n : " Ck, !
- 12 SE
12&
/K ; :"%C !
.. 2
k
0 J%. C%v :% ; "*K :0 A&
% *+ ..
-.%
12K
%&3 8 ..-, .
!
2 & 12K
sD-
%&w ..
k2 biforst 12K
V( biforst 12K
sD-& / [L %
:C8" , . 6 nZ
# J
%&, ; : nZ.. :
..
L .. *
B % " ?* 2
%&3 .. B
.. L 6
B :; n!; Z AC
.. 0/ :JK 2 ;0& 2 f; ;nEV
.. (
Ja
j : ,
Notes .. H 2 *
==============================
6 ,!>
K "? , Mr.Mo0oha = SiLvr CoD : J2 ! r+ . -
! .. ! J y!; .. ( F - A 6"> 3 -
Author :
Mohammed Nasser Al-Mawri