منتدي يوسف بدر
هل تريد التفاعل مع هذه المساهمة؟ كل ما عليك هو إنشاء حساب جديد ببضع خطوات أو تسجيل الدخول للمتابعة.

اذهب الى الأسفل
Youssef Badr
Youssef Badr
Admin
المساهمات : 223
تاريخ التسجيل : 15/11/2016
العمر : 21
الموقع : ادكو،البحيرة،مصر
https://thevirus.yoo7.com

كيف‏ ‏تكون‏ ‏هكر‏ ‏محترف‏ ‏وخطير Empty كيف‏ ‏تكون‏ ‏هكر‏ ‏محترف‏ ‏وخطير

الإثنين ديسمبر 05, 2016 8:36 pm
ﺗﻌﻠﻴﻢ ﺍﻟﻬﻜﺮ ﺩﻱ ﺍﻭﻝ ﺳﻠﺴﻠﺔ ﻣﻦ ﻟﻠﻤﺒﺘﺪﺋﻴﻦ ﻭﺍﻥ ﺷﺎﺀ ﺍﻟﻠﻪ ﺳﻠﺴﻠﺔ ﺑﺎﻟﻄﺮﻳﻘﺔ ﺍﻛﻮﻥ ﻗﺎﺩﺭ ﻋﻠﻰ ﺍﻳﺼﺎﻝ ﻧﺒﺪﺍ ﺑﻬﺎﻙ ﺍﻟﺼﺤﻴﺤﺔ .. ﺍﻟﻤﻌﻠﻮﻣﺎﺕ ﺍﻷﺟﻬﺰﺓ................ ﺍﻭﻝ ﺷﻲ ﻧﻮﻋﻴﻦ : - ﻫﺎﻙ ﺍﻻﺟﻬﺰﻩ ---------- ﻭ ﺻﻌﺐ ﻭ ﻫﺎﻙ ﺑﺎﻟﺜﻐﺮﺍﺕ : ﻣﻮﺿﻮﻉ ﻭ ﻳﺴﺘﺨﺪﻣﻪ ﺍﻟﺨﺒﺮﺍﺀ ﻃﻮﻳﻞ ﺷﻮﻱ ﻭ ﻗﻮﻱ ﻧﻮﻋﺎ ﻫﺎﻙ ﺑﺎﻟﺒﺎﺗﺸﺎﺕ : ﺳﻬﻞ ﻣﺎ ﻭ ﻋﺎﺩﻩ ﻣﺎ ﻧﺒﺪﺀ ﺑﻪ ﺑﺴﻴﻂ ﻭ ﺳﺮﻳﻊ ﻭ ﻛﻴﻒ ﻃﻴﺐ ﻫﻸ ﺍﻳﺶ ﻫﻲ ﺑﺮﺍﻣﺞ ﺑﺎﺗﺸﺎﺕ ﻓﻲ ﺗﻌﻤﻞ ﺍﻟﺒﺎﺗﺸﺎﺕ ﻫﺬﻩ ﻳﺤﺘﻮﻱ ﻋﻠﻰ 4 ﺍﺷﻴﺎﺀ ﺍﻱ ﺑﺮﻧﺎﻣﺞ ﺍﻟﺪﻧﻴﺎ ( ﻣﺜﻞ sub7 ( : ﻭﻫﻮ ﻣﻠﻒ ﺍﺭﺳﺎﻟﻪ ﻟﻠﻀﺤﻴﻪ ﻭ 1: ﻣﻠﻒ ﺍﻟﺒﺎﺗﺶ ﻣﻨﻔﺬ ﻳﺠﺐ ﻋﻠﻰ ﺍﻟﻀﺤﻴﻪ ﻓﺘﺤﻪ ﻳﺠﺐ ﺍﻳﻀﺎ ﺣﺘﻰ ﻳﻔﺘﺢ ﻋﻨﺪﻩ ( port ) 2: ﻣﻠﻒ ﺍﺧﺘﺮﺍﻗﻪ .. ﺛﻢ ﻧﺴﺘﻄﻴﻊ Edit server ﻟﻮﺿﻊ ﺍﻋﺪﺍﺩﺍﺕ : ﺍﻟﺒﺮﻧﺎﻣﺞ ﺍﻟﺒﺎﺗﺶ ﺍﻭ ﺗﻐﻴﻴﺮﻫﺎ .. ﻭﻫﻮ ﺍﻻﺳﺎﺳﻴﻮﻫﻮ ﺍﻝ client : 3 : ﻣﻠﻒ ﻭ ﺗﺘﺤﻜﻢ ﻓﻲ ﻭﻫﻮ ﺍﻟﺬﻱ ﺗﺘﺼﻞ ﺑﻪ ﺍﻝ dll ﻭ ﻏﻴﺮﻩ .. ﺟﻬﺎﺯﻩ .. ﻟﻠﻀﺤﻴﻪ ﻭ ﻃﺒﻌﺎ ﻻﺯﻡ ﻟﻤﺎ ﺗﺮﺳﻞ 4: ﻣﻠﻔﺎﺕ ﺭﺡ ﺗﺮﺳﻠﻬﺎ ﺍﻟﺒﺎﺗﺶ ﻻﺯﻡ ﺗﺘﺤﺎﻳﻞ ﻋﻠﻰ ﺍﻟﻐﺎﻟﺒﻴﺔ ﺻﺎﺭﺕ ﺗﺨﺎﻑ ﺍﻟﻄﺮﻳﻘﺔ ﺍﻟﻠﻲ .. ﻣﻦ ﻣﻠﻔﺎﺕ ﺍﻝ exe ﻏﻴﺮﻫﺎ ﻷﻧﻮ ﺍﻟﺒﺮﺍﻣﺞ ﻭﻣﻤﻜﻦ ﺗﻐﻴﺮ ﺍﻣﺘﺪﺍﺩ ﺍﻟﺒﺎﺗﺶ ﺍﻟﻤﺨﺘﺼﺔ ﻭﺗﺤﻮﻟﻬﺎ ﺍﻟﻰ ﻋﻦ ﻃﺮﻳﻖ ﺍﻭ ﺍﻱ ﺷﻰﺀ ﺛﺎﻧﻲ swf jpg ﺍﻟﺼﻮﺭ ﻣﺎ ﺗﻘﺪﺭ ﻭﻻ ﻳﺼﻴﺮ ﺍﺻﻼ ﻭ ﻣﺎﻋﺪﺍ ﺻﻴﻐﺔ exe ﺗﻘﻠﺒﻮﻝ ﻻﺗﺼﺪﻕ ﺍﺻﻼ ﺍﻧﻮﺍ ﺗﻘﺪﺭ ﻧﺨﺘﺮﻕ ﻝ jpg .... ﺗﺨﻠﻲ ﻣﻠﻒ ﺍﻝ .. ﻭﺍﺣﺪ ﻧﺤﺘﺎﺝ ﺍﻩ؟ ﻃﻴﺐ ﻟﻮ ﻋﺎﻳﺰﻳﻦ ﺿﺤﻴﻪ ﻧﺮﺳﻞ ﻟﻬﺎ ﺍﻟﺒﺎﺗﺶ 1: ﺑﺮﻧﺎﻣﺞ ﺍﻟﻀﺤﻴﻪ ﻭ ﻳﻤﻜﻦ ﻭﺗﻘﻮﻡ ﺑﻔﺘﺤﻪ 2: ﻣﻌﺮﻓﺘﻪ ﻋﻦ ﻃﺮﻳﻖ ﺍﻛﺜﺮ 3: ﺍﻳﺒﻲ ﺍﻷﻣﺮ ﻣﻦ ﻃﺮﻳﻘﺔ ﻣﻨﻬﺎ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﺸﺎﺕ ﺑﻮﺍﺳﻄﺔ netstat -n ﻣﻦ : ﺗﺄﻛﺪ ﻣﻦ ﻧﻈﺎﻡ ﻛﻴﻒ ﻧﺤﻤﻲ ﻧﻔﺴﻨﺎ ﺍﻟﻤﻠﻔﺎﺕ ﺍﻟﺘﻲ ﺗﺴﺘﻘﺒﻠﻬﺎ ﺍﻟﻬﻜﺮ ؟ 1 ( ﻻﻧﻬﺎ ﺍﻣﺘﺪﺍﺩ ﻻﺗﺴﺘﻘﺒﻞ ﺍﻱ ﺷﻲ exe ﺍﻟﻤﻠﻔﺎﺕ ﺍﻟﺘﺸﻐﻴﻠﻴﻪ. ﺍﻭ ﻭﻣﻮ ﺑﺮﻧﺎﻣﺞ ﻓﺤﺼﻬﺎ ﺍﺳﺘﻘﺒﻠﻬﺎ ﻭﻻ ﺗﻔﺘﺤﻬﺎ ﺍﻻ ﺑﻌﺪ ) ﺩﺧﻮﻟﻚ 3 : ﻧﺰﻝ ﺑﺮﻧﺎﻣﺞ ﺣﻤﺎﻳﻪ ﺣﻠﻮ ﺍﺑﺤﺚ ﻋﻠﻰ ﻣﻠﻒ 4:ﺩﺍﺋﻤﺎ ﻗﺒﻞ ﻷﻧﻮ ﻧﻬﺎﻳﺘﻪ *.pwl ﻣﻮﺟﻮﺩ ﻟﻸﻧﺘﺮﻧﺖ ﻳﺤﺘﻮﻱ ﻋﻠﻰ ﻛﺎﻓﺔ ﺑﺎﻟﺴﻲ ﻭﺃﺣﺬﻓﻪ ﺍﻟﺘﻲ ﺗﻌﺮﻑ ﺑﺎﺳﻮﺭﺩﺍﺗﻚ ﻭﺩﻩ ﺍﻫﻢ ﺍﻫﻤﻴﺔ ﺍﻟﺨﺎﺻﻴﺔ ﺩﻱ.. ﺧﻄﻮﺓ.. ﻭﺍﻟﻘﻠﺔ ﺍﻟﺘﻲ ﺗﻜﻮﻥ 5:ﺩﺍﺋﻤﺎ ﺍﺣﺬﻑ ﻣﻠﻔﺎﺕ ﺍﻝ ﻣﻮﺟﻮﺩﺓ ﺩﺍﺧﻞ ﻣﺠﻠﺪ ﺍﻝ cookies ﺣﺎﻭﻝ ﺍﻧﻚ ﺗﺴﻮﻱ windows update ﻟﻜﻞ ﺍﻟﺒﺮﺍﻣﺞ ﺍﻟﺘﻲ 6:ﺩﺍﺋﻤﺎ ﻭﺍﻟﻤﺘﺼﻔﺢ ﻷﻥ ﻋﻨﺪﻙ ﻭﺍﻫﻤﺎ ﺑﺮﺍﻣﺞ ﻋﻦ ﻫﻨﺎﻙ ﺛﻐﺮﺍﺕ ﺑﺎﻟﻤﺘﺼﻔﺢ ﺍﻟﺤﻤﺎﻳﺔ ﻃﺮﻳﻘﻬﺎ ﺩﻭﻥ ﺍﻟﺤﺎﺟﺔ ﻳﻤﻜﻦ ﺍﻥ ﺗﺨﺘﺮﻕ ﺍﻛﺜﺮ ﻣﻦ ﻃﺮﻳﻖ ﻷﺭﺳﺎﻝ ﺑﺎﺗﺶ.. ﺍﺧﺮﻯ ﻟﻠﺤﻤﺎﻳﺔ ﺳﺄﺫﻛﺮﻫﺎ ﻭﻫﻨﺎﻙ ﺑﺪﺭﺱ ﻣﻘﺒﻞ... =================== =================== ﺍﺧﺘﺮﺍﻕ ﺍﻟﻤﻮﺍﻗﻊ ======== ﺃﻳﻀﺎ ﻃﻮﻳﻞ --------------- ﺍﻟﻤﻮﺍﻗﻊ ﺛﻼﺙ ﻃﺮﻕ ﻻﺧﺘﺮﺍﻕ ﻣﻮﺿﻮﻉ ﺍﻟﺘﺸﻐﻴﻞ 1: ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﺜﻐﺮﺍﺕ ﻣﺜﻞ ﺍﻟﻴﻮﻧﻜﺲ ﻭ 2: ﺑﻌﺾ ﺃﻧﻈﻤﺔ ﺍﻟﻠﺴﺘﻪ : ﻭ ﻫﻲ ﺍﻟﻴﻮﻧﻜﺲ ﺍﻟﻘﻮﻳﻪ ﻋﻞ ﺍﻷﻃﻮﻝ ﻭﻟﻠﻤﺒﺘﺪﺃﻳﻦ 3: ﺑﺮﺍﻣﺞ ﺗﺤﺘﻮﻱ ﺍﻛﺒﺮ ﻭﺗﻌﺘﻤﺪ ﺑﺮﺍﻣﺞ ﺍﻟﻠﺴﺘﻪ ﻗﺪﺭ ﻣﻤﻜﻦ ﻣﻦ ﺍﻟﻜﻠﻤﺎﺕ ﻟﺴﺘﺔ ﻛﺒﻴﺮﻩ ﺍﻟﺬﻱ ﻳﺴﺘﺨﺪﻡ ﺑﺎﻻﺿﺎﻓﻪ ﺍﻟﻰ ﺍﻟﺒﺮﻧﺎﻣﺞ ﺍﻟﻠﺴﺘﻪ ﻓﻲ ﺗﺨﻤﻴﻦ ﻛﻠﻤﺔ ﺍﻷﺳﺎﺳﻲ =================== ﺍﻟﺴﺮ =================== ﺗﺪﻣﻴﺮ ﺍﻟﻤﻮﺍﻗﻊ ======== ﻋﻦ ﻃﺮﻳﻖ ﺑﺮﺍﻣﺞ -------------- ﺣﺘﻰ ping ﻭﻫﻲ ﺍﻟﺘﻲ ﺗﺒﻄﺊ ﻭﻫﻲ ﻳﺘﻮﻗﻒ ﻭﺗﻜﻮﻥ ﺍﻣﺎ ﻋﻦ ﺍﻟﻤﻮﻗﻊ ﻭ ﺗﺜﻘﻞ ﻣﻌﻴﻨﻪ ﻣﺜﻞ ﻃﺮﻳﻖ ﺍﻟﺪﻭﺱ ﺍﻭ ﺑﺮﺍﻣﺞ evil ping ﻭﺗﺤﺘﺎﺝ ﺍﻟﻰ ﻋﺪﺩ ﻛﺒﻴﺮ ﻣﻦ ﺣﺘﻰ ﻳﺄﺛﺮﻭﺍ ﺍﻟﻤﺸﺎﺭﻛﻴﻦ ﺗﺼﻞ ﺍﻟﻰ ﺍﻛﺜﺮ ﺑﺎﻟﻤﻮﻗﻊ.. ﻣﻦ 20 ﺷﺨﺺ =================== =================== ﺍﻟﺒﺮﻳﺪ ------------- ======= ﻋﺪﺩ ﻻﻧﻬﺎﺋﻲ ﻣﻦ ﺍﻟﻄﺮﻕ ﻭ ﺍﺧﺘﺮﺍﻕ ﺍﻟﺬﻛﺎﺀ ﻭﻟﻜﻨﻪ ﻟﻴﺲ ﺻﻌﺐ ﻭﻟﻜﻦ ﺍﻟﺤﻴﻞ ﻭﻣﻦ ﺍﺳﻬﻠﻬﺎ ﺍﻥ ﺗﺨﺘﺮﻕ ﻳﺤﺘﺎﺝ ﺍﻟﻰ ﺍﻟﻰ ﺟﻬﺎﺯ ﺍﻟﻀﺤﻴﻪ ﺑﺄﺣﺪ ﺑﺮﺍﻣﺞ ﻗﺎﺋﻤﻪ ﺍﻟﺒﺎﺳﻮﻭﺭﺩﺍﺕ ﺍﻷﺧﺘﺮﺍﻕ ﻭﺗﺬﻫﺐ ﺍﻟﻤﺤﻔﻮﺿﻪ ( ﺍﻟﺒﺎﺱ ﻭﻭﺭﺩ ﺭﺍﺡ ﺍﺫﺍ ﻛﺎﻥ ﺗﻠﻘﺎﻫﺎ ﻣﻊ ﺍﺳﻢ ﺑﺮﻳﺪﻩ ﺣﺎﻓﺾ ) ﻻﺯﻡ ﻣﻠﻒ ﺍﻟﺒﺎﺳﻮﺭﺩ ﺷﻔﺘﻮﺍ ﺍﻟﺤﻴﻦ ﻟﻴﺶ =================== ﻧﺤﺬﻑ =================== ﺗﺪﻣﻴﺮ ﻭ ﺗﻔﺠﻴﺮ ﺍﻟﺒﺮﻳﺪ ======== ﻭ ﺑﺴﻴﻂ ﻋﻦ -------------------- ﻭ ﻃﺮﻳﻖ ﺇﻏﺮﺍﻕ ﺍﻟﺒﺮﻳﺪ ﻭﻫﻮ ﺳﻬﻞ ﺗﺴﻬﻞ ﺗﻠﻚ ﺑﺈﺭﺳﺎﻝ ﺣﺘﻰ ﻳﺘﻮﻗﻒ ﺍﻟﻌﻤﻠﻴﺔ ﻫﻨﺎﻙ ﺑﺮﺍﻣﺞ =================== =================== ======== Nuke Programs ﺑﺮﺍﻣﺞ ﺗﻘﻮﻡ ﺑﻔﺼﻞ --------------- ﺻﺎﺣﺐ ﺍﻻﻳﺒﻲ ﻣﻦ ﺍﻻﺗﺼﺎﻝ ﻭﻫﻲ =================== =================== Spoofing ======== ------------------ Programs ﻣﻨﻬﺎ ﻓﻲ ﻭﻫﻲ ﺗﻐﻴﺮ ﺍﻻﻳﺒﻲ ﺍﻟﻰ ﺭﻗﻢ ﻭ ﺑﻌﺪ ﺍﻷﻭﻗﺎﺕ ﺁﺧﺮ ﻭ ﻳﺴﺘﻔﺎﺩ ﺗﺘﻮﻗﻒ ﻋﻠﻴﻬﺎ ﺍﻱ ﺑﻤﻌﻨﻰ ﺍﻻﺧﺘﺮﺍﻕ ﺍﻝ ip ﺍﺧﺮ ﻟﻠﺘﻤﻮﻳﻪ ﺣﺘﻰ ﻻ ﻳﺘﻤﻜﻦ ﺍﻟﺤﻘﻴﻘﻲ ﻟﺠﻬﺎﺯﻙ.. ﺍﺣﺪﺍ ﻣﻦ ﻣﻌﺮﻓﺔ =================== =================== Cookies -------- ======== ﻟﻤﺘﺼﻔﺤﻚ ﻫﻲ ﻋﺒﺎﺭﺓ ﻋﻦ ﻋﻦ ﻣﻠﻔﺎﺕ ﻭ ﻫﻲ ﻋﺒﺎﺭﻩ ﻋﻦ ﻣﻠﻒ ﻳﺮﺳﻠﻬﺎ ﺍﻟﻤﻮﻗﻊ ﺍﺋﺘﻪ ﻏﻴﺮ ﻫﺬﺍ ﻣﻜﺘﻮﺏ ﻻ ﻳﺴﺘﻄﻴﻊ ﺃﻱ ﺍﻟﻤﻮﻗﻊ ﻭ ﻗﺪ ﻳﻜﻮﻥ ﺑﻪ ﻣﻮﻗﻊ ﻗﺮ ﺳﺮ ﻣﻮﻗﻊ ﺃﻭ ﺍﺷﺘﺮﺍﻙ ... ﻛﻠﻤﺎﺕ ﺃﻧﻬﺎ ﻣﺜﻼ ﻭﻫﻲ ﻣﺰﻋﺠﻪ ﻓﻲ ﺑﻌﺾ ﻛﻞ ﺍﻟﻤﻮﺍﻗﻊ ﺍﻟﺘﻲ ﺍﻷﺣﻴﺎﻥ ﺣﻴﺚ ﻭ ﻣﺪﺓ ﺩﺧﻠﺘﻬﺎ ﻭ ﻛﻞ ﺍﻟﺼﻔﺤﺎﺕ ﺗﺴﺠﻞ ﻛﻞ ﺻﻔﺤﻪ ... ﺍﻟﺘﻲ ﺷﺎﻫﺪﺗﻬﺎ ﻟﺬﻟﻚ ﻓﻬﻲ ﺧﻄﻴﺮﺓ ﺟﺪﺍ .. ﻣﺸﺎﻫﺪﺓ ﻻﺯﻡ ﻧﺤﺬﻓﻬﺎ ﺷﻮﻓﺘﻮﺍ ﻫﻸ ﻟﻴﺶ ﻣﻠﻔﺎﺕ ﺍﻟﻜﻮﻛﻴﺰ =================== =================== -------- Ports ========= ﻟﺠﻬﺎﺯﻙ ﻭﻫﻲ ﺍﻟﻤﻨﺎﻓﺬ ﺍﻟﺘﻲ ﻳﺘﺴﻠﻞ ﻣﻨﻬﺎ ﺍﻟﻬﻜﺮﺯ =================== =================== ========= Port Scanner ﻭﻫﻲ ﺑﺮﺍﻣﺞ ﺗﻔﺤﺺ ------------- ﺗﺨﺒﺮﻙ ﻋﻦ ﺍﻟﻤﻨﺎﻓﺬ ﺍﻟﻤﻔﺘﻮﺣﺔ ﻟﺪﻳﻚ ﻭ ﺍﻟﺒﺮﻧﺎﻣﺞ ﺍﻟﻤﺴﺆﻭﻝ ﻋﻨﻬﺎ ﺗﺨﺒﺮﻙ ﺑﻬﺎ ﻭ ﻣﺜﻞ super scan ﻣﻤﺘﺎﺯ ﺑﺮﻧﺎﻣﺞ ﻋﻦ ﻃﺮﻳﻖ ﺍﺣﺪ xhack ﺑﺮﻧﺎﻣﺞ ﻣﺜﻞ ﺍﻟﻤﻮﺍﻗﻊ ﺍﻟﻠﺘﻲ ﻳﻔﺤﺺ ﻭﺍﻳﻀﺎ ----------- ﺟﻬﺎﺯﻙ ﻣﺠﺎﻧﺎ ----------- ﺍﻟﻔﻴﺮﻭﺳﺎﺕ ﺍﺧﻄﺮ ﺍﻷﺷﻴﺎﺀ ============= ﺗﺤﺪﺙ ﺍﻹﺻﺎﺑﺔ ﻋﻠﻰ ﺍﻟﺠﻬﺎﺯ ﻭﻫﻲ ﻣﻦ ﺑﺎﻟﻔﻴﺮﻭﺳﺎﺕ ؟ ﻛﻴﻒ ﺇﻟﻰ ----------------------------- ﻋﻨﺪﻣﺎ ﺗﻘﻮﻡ ﺑﻨﻘﻞ ﻳﺘﻨﻘﻞ ﺍﻟﻔﻴﺮﻭﺱ ﻣﻠﻒ ﻣﻠﻮﺙ ﺑﺎﻟﻔﻴﺮﻭﺱ ﺇﻟﻰ ﺟﻬﺎﺯﻙ ﺍﻭ ﺍﺛﻨﺎﺀ ﺟﻬﺎﺯﻛﺎﻭ ﻋﻨﺪ ﺯﻳﺎﺭﺓ ﺍﺣﺪ ﺍﻟﺴﻲ ﺩﻳﺎﺕ ﺍﻭ ﺍﻟﻤﻮﺍﻗﻊ ﺍﻟﻤﺸﺒﻮﻫﺔ ﻋﻨﺪ ﺍﻟﺪﻳﺴﻜﺎﺕ ﻣﻊ ﺍﻷﺻﺪﻗﺎﺀ ﻭ ﺗﺒﺎﺩﻝ ﻭﻳﻤﻜﻦ ﺍﻥ ﻳﻨﺸﻂ ﺍﻟﻔﻴﺮﻭﺱ ﻳﺼﻠﻚ ﺍﻳﻀﺎ ﻋﻦ ﻃﺮﻳﻖ ﻣﺤﺎﻭﻟﺔﻓﺘﺤﻪ ﻋﺒﺎﺭﺓ ﻋﻦ ﺍﻟﺒﺮﻳﺪ ﺍﻷﻟﻜﺘﺮﻭﻧﻲ.. ﺑﺮﻧﺎﻣﺞ ﺻﻐﻴﺮ ﻭ ﻟﻴﺲ ﻣﻦ ﺍﻟﻔﻴﺮﻭﺱ ﺻﻤﻤﻪ ﺷﺮﻃﺎ ﺃﻥ ﻳﻜﻮﻥ ﻟﻠﺘﺨﺮﻳﺐ ﺍﻟﻔﻠﺴﻄﻴﻨﻴﻴﻦ ﻓﻤﺜﻼ ﻫﻨﺎﻙ ﻓﻴﺮﻭﺱ ﻳﻔﺘﺢ ﻟﻚ ﻭﺍﺟﻬﻪ ﻭ ﻳﺒﻴﻦ ﺃﺣﺪ ﺍﻟﻤﻮﺍﻗﻊ ﺑﻌﺾ ﺍﻟﺸﻬﺪﺍﺀ ﺍﻟﻔﻠﺴﻄﻨﻴﻦ ﻋﻦ ﻓﻠﺴﻄﻴﻦ ... ﻭ ﻳﻌﻄﻴﻚ ﺑﻌﺾ ﺑﻄﺮﻕ ﻛﺜﻴﺮﻩ ﻭ ﻭﻳﻤﻜﻦ ﻋﻤﻞ ﻫﺬﺍ ﺑﺴﻴﻄﺔ ﺣﻴﺚ ﺍﻧﻚ ﻳﻤﻜﻦ ﺍﻟﻔﻴﺮﻭﺱ ﻣﺜﻞ ﺍﻝ ﺗﺼﻤﻴﻤﻪ ﺑﻠﻐﺎﺕ ﺍﻟﺒﺮﻣﺠﺔ visual basic c ﻭﻏﻴﺮﻫﺄﻭ ﺣﺘﻰ ﺍﻭ ﺍﻟﻔﻴﺮﻭﺳﺎﺕ ﺑﺎﺳﺘﺨﺪﺍﻡ Notpad ++ ================ ﺃﻧﻮﺍﻉ 1: ﻓﻴﺮﻭﺳﺎﺕ ﺍﻟﺘﺸﻐﻴﻞ ( Boot Sector Virus ) ﺍﻟﺬﻱ ﻳﻨﺸﻂ ﻓﻲ ﺃﻧﻮﺍﻉ ﻣﻨﻄﻘﺔ ﻧﻈﺎﻡ ﺍﻟﺘﺸﻐﻴﻞ ﻭﻫﻮ ﺣﻴﺚ ﺍﻧﻪ ﻳﻤﻨﻌﻚ ﻭﻫﻮ ﻣﻦ ﺍﺧﻄﺮ ﻣﻦ ﺗﺸﻐﻴﻞ ﺍﻟﺠﻬﺎﺯ ﺍﻟﻔﻴﺮﻭﺳﺎﺕ 2: ﻓﻴﺮﻭﺳﺎﺕ ﺍﻟﻤﺎﻛﺮﻭ ( Macro Virus ) ﺍﻟﻔﻴﺮﻭﺳﺎﺕ ﺍﻧﺘﺸﺎﺭﺍ ﻭﻫﻲ ﺗﻜﺘﺐ ﺣﻴﺚ ﺍﻧﻬﺎ ﺗﻀﺮﺏ ﺑﺮﺍﻣﺞ ﻣﻦ ﺍﻛﺜﺮ ﺍﻭ Notpad ﺍﻻﻭﻓﻴﺲ ﻭ ﻛﻤﺎ ﺃﻧﻬﺎ 3: ﻓﻴﺮﻭﺳﺎﺕ ﺍﻟﻤﻠﻔﺎﺕ ﺑﺎﻟﻮﺭﺩ ( File Virus ) ﻓﺘﺢ ﺃﻱ ﻭﻫﻲ ﺗﻨﺘﺸﺮ ﻓﻲ ﻣﻠﻒ ﻳﺰﻳﺪ ﺍﻧﺘﺸﺎﺭﻫﺎ .. ﺍﻟﻤﻠﻔﺎﺕ ﻭﻋﻨﺪ 4: ﺍﻟﻔﻴﺮﻭﺳﺎﺕ ﺍﻟﻤﺨﻔﻴﺔ ( Steath Virus ) ﺗﺤﺎﻭﻝ ﺁﻥ ﺗﺨﺘﺒﺊ ﻣﻦ ﻭﻫﻲ ﻭ ﻟﻜﻦ ﺳﻬﻞ ﺍﻟﺒﺮﺍﻣﺞ ﺍﻟﻤﻀﺎﺩﺓ ﺍﻟﺘﻲ ﺍﻟﻤﺘﺤﻮﻟﺔ ﺍﻹﻣﺴﺎﻙ ﺑﻬﺎ ﻟﻠﻔﻴﺮﻭﺳﺎﺕ 5: ﺍﻟﻔﻴﺮﻭﺳﺎﺕ ( Polymorphic virus ) ﻭﻫﻲ ﺍﻷﺻﻌﺐ ﻋﻠﻰ ﺑﺮﺍﻣﺞ ﻭﺗﺘﻐﻴﺮ ﻣﻦ ﺍﻟﻤﻘﺎﻭﻣﺔ ﺣﻴﺚ ﺍﻧﻪ ﺻﻌﺐ .. ﺟﻬﺎﺯ ﺇﻟﻲ ﺁﺧﺮ ﻓﻲ ﺍﻹﻣﺴﺎﻙ ﺑﻬﺎ ﻭﻟﻜﻦ ﻣﻜﺘﻮﺑﺔ ﺑﻤﺴﺘﻮﻯ ﻏﻴﺮ ﺃﻭﺍﻣﺮﻫﺎ ﻣﺘﻌﺪﺩﺓ ﺗﻘﻨﻲ ﻓﻴﺴﻬﻞ ﺇﺯﺍﻟﺘﻬﺎ ﺍﻟﻤﻠﻔﺎﺕ 6: ﻓﻴﺮﻭﺳﺎﺕ ( Multipartite Virus ) ﻣﻠﻔﺎﺕ .. ﻗﻄﺎﻉ ﺍﻟﺘﺸﻐﻴﻞ ﻭ ﺳﺮﻳﻌﺔ ﺗﺼﻴﺐ 7: ﻓﻴﺮﻭﺳﺎﺕ ﺍﻟﺪﻭﺩﺓ ﺍﻻﻧﺘﺸﺎﺭ ( Worm ) ﻋﻠﻰ ﻭﻫﻮ ﻋﺒﺎﺭﺓ ﻋﻦ ﻭ ﻳﺄﺗﻲ ﻣﻦ ﺧﻼﻝ ﺑﺮﻧﺎﻣﺞ ﻳﻨﺴﺦ ﻧﻔﺴﻪ ﻣﺮﺍﺕ ﺍﻟﺸﺒﻜﺔ ﻭ ﻳﻨﺴﺦ ﻧﻔﺴﻪ ﺍﻻﺟﻬﺰﻩ ﺣﺘﻰ ﻳﺒﻄﺊ ﺍﻟﺠﻬﺎﺯ ﻭﻫﻮ ﺑﺎﻟﺠﻬﺎﺯ ﻋﺪﺓ ﺍﻷﺟﻬﺰﺓ ﻣﺼﻤﻢ ﻹﺑﻄﺎﺀ ﺍﻟﺸﺒﻜﺎﺕ ﻻ ﻓﻴﺮﻭﺱ ﻭ ﺑﻌﺾ ﺍﻟﻨﺎﺱ ﺗﻘﻮﻝ ﺍﻣﻪ ﻣﺼﻤﻢ ﻟﻺﺑﻄﺎﺀ ﻻ ﻫﺬﺍ ﺍﻟﻨﻮﻉ ﻻﻳﻌﺘﺒﺮ ﻷﺯﺍﻟﻪ ﺍﻟﻤﻠﻔﺎﺕ ﻭ ﺗﺨﺮﻳﺒﻬﺎ .. ﺣﻴﺚ ﺍﻧﻪ 8: ﺍﻟﺒﺎﺗﺸﺎﺕ ( Trojans ) ﻋﺒﺎﺭﺓ ﻋﻦ ﺑﺮﻧﺎﻣﺞ ﺻﻐﻴﺮ ﻗﺪ ﻳﻜﻮﻥ ﻭﻫﻮ ﺃﻳﻀﺎ ﻋﻨﺪﻣﺎ ﻳﻨﺰﻟﻪ ﻣﺪﻣﺞ ﻣﻊ ﻣﻠﻒ ﺁﺧﺮ ﻳﻔﺘﺢ ﺷﺨﺺ ﻭ ﻳﻔﺘﺤﻪ ﻳﺼﻴﺐ ﻟﻠﺘﺨﻔﻲ ﻣﻨﺎﻓﺬ ﻣﻤﺎ ﻳﺠﻌﻞ ﺍﻝ Registry ﻭ ﻣﻦ ﺟﻬﺎﺯﻙ ﻗﺎﺑﻞ ﻟﻼﺧﺘﺮﺍﻕ ﻋﻨﺪﻙ ﺃﺫﻛﻰ ﺍﻟﺒﺮﺍﻣﺞ ﺑﺴﻬﻮﻟﻪ ﻭ ﻫﻮ ﻳﻌﺘﺒﺮ ﺍﻟﺘﻮﺭﺟﻦ ﻳﻔﻚ ﻓﻤﺜﻼ ﻋﻨﺪ ﻋﻤﻞ ﺳﻜﺎﻥ ﻧﻔﺴﻪ ﻋﻠﻰ ﻫﻴﺌﺔ ﻣﻠﻔﺎﺕ ﻫﻨﺎﻙ ﺑﻌﺾ ﺍﻟﺘﻌﺮﻑ ﻋﻠﻴﺔ ﻏﻴﺮ ﻣﺤﺪﺩﻩ ﻓﻴﻤﺮ ﻋﻠﻴﻬﺎ ﺛﻢ ﻳﺠﻤﻊ ﻧﻔﺴﻪ ﻣﺮﻩ ﺍﻟﺴﻜﺎﻥ ﺩﻭﻥ ﺑﺮﺍﻣﺞ ﺍﻟﻤﻘﺎﻭﻣﺔ ﺛﺎﻧﻴﻪ ﻭ ﻣﻦ ﻛﻴﻒ ﺗﻌﻤﻞ ؟ =============== ﻃﺮﻳﻘﺘﺎﻥ ﻓﻲ ﺍﻟﺒﺤﺚ ---------- ﺍﻟﻔﻴﺮﻭﺱ ﻋﻦ ﺍﻟﻔﻴﻮﺭﺳﺎﺕ ﻫﻨﺎﻙ ﻣﻦ ﻗﺒﻞ ﻓﺘﺒﺤﺚ 1: ﻋﻨﺪﻣﺎ ﻳﻜﻮﻥ ﺫﻟﻚ ﻋﻦ ﺍﻟﺘﻐﻴﺮ ﺍﻟﻤﻌﺮﻭﻑ ﻟﻬﺎ ﻣﻌﺮﻭﻑ ﺍﻟﻔﻴﺮﻭﺱ ﻣﺴﺒﻘﺎ ﺍﻟﺬﻱ ﻳﺴﺒﺒﻪ ﺷﺊ ﻏﻴﺮ 2: ﻋﻨﺪﻣﺎ ﻳﻜﻮﻥ ﺍﻟﻔﻴﺮﻭﺱ ﻓﻲ ﺍﻟﺠﻬﺎﺯ ﺣﺘﻰ ﺟﺪﻳﺪ ﻓﺘﺒﺤﺚ ﻋﻦ ﺗﺠﺪﻩ ﻭ ﺗﻌﺮﻑ ﺃﻱ ﺑﺮﻧﺎﻣﺞ ﻃﺒﻴﻌﻲ ﻏﺎﻟﺒﺎ ﺗﻈﻬﺮ ﻧﺴﺦ ﻣﺴﺒﺐ ﻟﻪ ﻭﺗﻮﻗﻔﻪ.. ﻋﺪﻳﺪﻩ ﻣﻦ ﺍﻟﻔﻴﻮﺭﺱ ﻭ ﻟﻬﺎ ﻭﺩﺍﺋﻤﺎ ﻭ ﺑﺴﻴﻄﺔ ﻧﻔﺲ ﺍﻟﺘﺨﺮﻳﺐ ﻣﻊ ﻓﺮﻭﻕ -------------- ﺍﺷﻬﺮ ﺍﻟﻔﻴﺮﻭﺳﺎﺕ ﺷﻴﺮﻧﻮﺑﻞ ﻭ ﺍﺷﻬﺮ ﺍﻟﻔﻴﺮﻭﺳﺎﺕ ﻋﻠﻰ ﻣﺎﻟﺴﻴﺎ ﻭ ﻓﻴﺮﻭﺱ ﺍﻟﺤﺐ ﺍﻹﻃﻼﻕ ﻫﻮ ﻫﻞ ﺟﻬﺎﺯﻙ ﻣﺨﺘﺮﻕ ؟ Love .. ----------------- Start ---> Run ----> System.ini ﺍﻟﻰ ﺍﻟﺘﺎﻟﻲ: ﺃﺫﻫﺐ star--->run--- >win.ini ﻭﺍﺑﺤﺚ ﻋﻦ ﺍﻟﻘﻴﻢ ﺍﻟﺘﺎﻟﻴﺔ run=xxx.exe ﺃﻭ run=xxx.dll ﺃﻭ load=xxx.exe ﺃﻭ load=xxx.exe ﺍﻥ xxx ﻫﻮ ﻋﻠﻰ ﺍﺳﻢ ﺍﻟﺨﺎﺩﻡ ﺃﻭ ﻣﻊ ﻣﻼﺣﻈﺔ ﻓﻘﻢ ﺑﺤﺬﻓﻬﺎ. ﺍﻟﺴﻴﺮﻓﺮ.ﻭﺇﺫﺍ ﻋﺜﺮﺕ ﺍﻱ ﻗﻴﻤﺔ ﻣﻨﻬﺎ Start ---> Run ----> System.ini ﺍﻟﺨﺎﻣﺲ ﻟﻮ ﻛﺎﻥ :- ﺃﺫﻫﺐ ﻟﻠﺴﻄﺮ User.exe=User.exe ﺳﻠﻴﻢ ﺃﻣﺎ ﻟﻮ ﻭﺟﺪﺗﻪ :- ﺟﻬﺎﺯﻙ User.exe=User.exe *** *** ﺍﺧﺘﺮﺍﻕ ﺇﺫﻥ ﺟﻬﺎﺯﻙ ﺗﻢ ﺍﺧﺘﺮﺍﻗﻪ *** ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﺜﻐﺮﺍﺕ ﻭﻟﻜﻦ ﺍﺯﺍ ﺗﻢ ﻓﻼ ﻳﻤﻜﻨﻚ ﻣﻌﺮﻓﺔ ﺍﻧﻪ ﺗﻢ ﺟﻬﺎﺯﻙ ﺍﻫﻤﻴﺔ ﺑﺮﺍﻣﺞ ﺍﺧﺘﺮﺍﻗﻚ ﺑﻬﺬﻩ ﺍﻟﻄﺮﻳﻘﺔ ﻛﺎ blackice ﻭ ﻟﺬﻟﻚ ﻧﺠﺪ ﻫﻨﺎ zonealarm ﻓﻲ ﺍﻧﻬﺎ ﺍﻟﺤﻤﺎﻳﺔ ﺟﻬﺎﺯﻙ ﻋﻦ ﺗﺨﺒﺮﻙ ﺍﺯﺍ ﻗﺎﻡ ﺍﺣﺪﻫﻢ ﻣﺎﺫﺍ ﻃﺮﻳﻖ ﺍﻟﺜﻐﺮﺍﺕ... ﺑﺎﺧﺘﺮﺍﻕ ﺍﻓﻌﻞ ﺗﻢ ﺍﺧﺘﺮﺍﻕ ﺟﻬﺎﺯﻱ ﻧﻔﺴﻚ -------------------------- ﺑﻌﺾ ﺍﻟﺒﺎﺗﺸﺎﺕ ﻓﺮﻣﺖ ﺍﻟﺠﻬﺎﺯ ﻭ ﺭﻳﺢ ﺍﻟﺘﻲ ﺗﻔﻚ ﻭ ﺗﺮﻛﺐ ﻧﻔﺴﻬﺎ ﻻﻡ ﻫﻨﺎﻙ ﺍﻟﺠﻬﺎﺯ ﺍﻣﺎ ﺍﺫﺍ ﺃﺭﺩﺕ ﺍﻧﺎ ﻻ ﺗﻔﺮﻣﺖ The ﺍﺫ1 ﻋﻠﻴﻚ ﺍﻥ ﺗﻨﺰﻝ ﺑﺮﻧﺎﻣﺞ Cleaner Zone ﻭ ﻭ alarm Ad ﻭ ﺍﻻﻭﻝ ﺗﻌﻤﻞ ﺑﻪ ﺳﻜﺎﻥ ware ﻟﻠﺤﻤﺎﻳﻪ ﺍﺯﺍﻟﺘﻬﺎ ﻟﻠﺠﻬﺎﺯ ﻟﻜﺸﻒ ﺍﻟﺒﺎﺗﺸﺎﺕ ﺍﻧﺘﻲ ﻓﺎﻳﺮﻭﺱ ﻭ ﻭ ﺍﻟﺜﺎﻧﻲ firewall ﻣﻠﻔﺎﺕ ﺍﻋﻤﻞ ﺑﻪ ﺳﻜﺎﻥ ﺃﻳﻀﺎ ﻭ ﻧﺰﻝ ﻫﻲ ﺍﻟﺒﺮﺍﻣﺞ ﺃﻳﻬﻤﺎ ﺍﻓﻀﻞ ﻟﻜﺸﻒ ﻟﺬﻟﻚ ﺍﻡ ﺍﻟﻨﺘﻲ ﺍﻟﺒﺎﺗﺸﺎﺕ ﻫﻞ ﻓﺎﻳﺮﻭﺱ؟ ﺍﻟﻤﺘﺨﺼﺼﺔ ----------------------------- ----------------------------- ﻻﻧﻪ ﺍﻻﻛﺜﺮ ------------------ ﺍﻧﺘﺸﺎﺭﺍ ﻭ ﻳﺘﻢ ﺗﺤﺪﻳﺜﻪ ﺍﻻﻧﺘﻲ ﻓﺎﻳﺮﻭﺱ ﺑﺎﺗﺶ ﺍﺧﺮ ﺑﺴﺮﻋﻪ ﺍﻛﺒﺮ ﻣﻦ ﺍﻱ ﺷﺊ ﺑﻌﺪ ﺛﻼﺙ ﺳﺎﻋﺎﺕ ﻓﺎﺫﺍ ﺗﻢ ﻇﻬﻮﺭ ﺍﻱ ﺍﻟﻤﻀﺎﺩ ﻣﺜﻼ ﺗﻜﻮﻥ ﺍﻟﺸﺮﻛﻪ ﻗﺪ ﺟﺪﻳﺪ ﻛﻴﻒ ﺍﺣﻤﻲ ﻧﻔﺴﻲ؟ ﺟﻬﺰﺕ ﻟﻪ 1: ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﻧﻈﺎﻓﺔ -------------- ﺗﺸﻐﻴﻠﻴﻪ ﺍﻟﻤﻠﻔﺎﺕ ﻗﺒﻞ ﻓﺘﺤﻬﺎ ﻣﺜﻞ ﺍﺭﺳﻠﻚ ﻭﺍﺣﺪ ﺷﻲ exe ﻻﻧﻬﺎ ﻣﻠﻔﺎﺕ exe ﻣﻌﻨﺎﻩ ﻭﻫﻮ ﻣﺎﻫﻮ ﺑﺮﻧﺎﻣﺞ ﻭﺍﺫﺍ ﻋﻠﻰ ﻣﻤﻜﻦ ﻳﻜﻮﻥ ﻓﻴﺮﻭﺱ ﻭﺍﻣﺘﺪﺍﺩﻩ ﻛﻞ ﺛﻼﺙ ﺍﻳﺎﻡ 2: ﻋﻤﻞ ﺳﻜﺎﻥ ﻛﺎﻣﻞ 3: ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﺗﺤﺪﻳﺚ ﺍﻻﻧﺘﻲ ﺍﻟﺠﻬﺎﺯ ﺍﻻﻗﻞ ﻓﺎﻳﺮﻭﺱ ﻛﻞ ﺍﺳﺒﻮﻉ ﻋﻠﻰ ( ﺗﺤﺪﻳﺚ ﻛﻞ ﻳﻮﻡ ﺍﻭ ﺷﺮﻛﺔ ﻧﻮﺭﺗﻮﻥ ﻳﻮﻣﻴﻦ ﺗﻄﺮﺡ ) ﻭﺿﻊ Firewall ﺟﻴﺪ 5: ﻭﺿﺢ 4: Anti-Virus ﺟﻴﺪ ﺍﻟﻤﻠﻔﺎﺕ :- 6: ﺍﻳﻘﺎﻑ ﺧﺎﺻﻴﺔ ﻣﺸﺎﺭﻛﺔ control panal / network / configuration / file and print sharring i want to be able to give others access to my files ﺛﻢ ok ﺍﻟﻐﻲ ﺍﻟﺘﺤﺪﻳﺪ ﺑﺤﻴﺚ ﻟﻮ ﺍﻥ 7: ﻻ ﺗﻈﻞ ﻣﺪﺓ ﻃﻮﻳﻠﺔ ﺩﺧﻞ ﻋﻠﻴﻚ ﻣﺎ ﻳﻈﻞ ﻣﺘﺼﻞ ﺑﺎﻟﺸﺒﻜﺔ ﻳﺨﺮﺏ ﻓﻴﻚ ﻭ ﻋﻨﺪ ﺧﺮﻭﺟﻚ ﻭﺍﺣﺪ ﻣﺮﻩ ﺍﺧﺮﻯ ﻟﻠﺸﺒﻜﺔ ﻳﻐﻴﺮ ﻭ ﺩﺧﻮﻟﻚ ﺍﻟﻤﻮﻗﻊ ﻳﻔﺤﺺ ﺍﺧﺮ ﺭﻗﻢ ﻣﻦ ﺍﻻﻳﺒﻲ ﺟﻬﺎﺯﻙ ﻭ ﻳﺨﺒﺮﻙ ﺑﻨﻘﺎﻁ 8: ﻭ ﻫﺬﺍ ﻛﻠﻤﺎﺕ ﺍﻟﻤﺮﻭﺭ ﺍﻟﻀﻌﻒ ﻭ ﺍﻟﺤﻠﻮﻝ ﻛﻠﻤﺎﺕ ﺍﺳﺮ ﻋﻠﻰ ﺟﻬﺎﺯﻙ 9: ﻻ ﺗﺨﺰﻥ ﺍﻭ ( ﻓﻲ ﺍﻻﻧﺘﺮﻧﺖ ﺍﻭ ﻣﺜﻞ ﻛﻠﻤﺔ ﺍﻟﻤﺮﻭﺭ ﺍﻟﺒﺮﻳﺪ ﺍﻟﻜﺘﺮﻭﻧﻲ ﺍﻭ ... ﻻﺷﺘﺮﺍﻛﻚ ) ﻋﻠﻰ ﺑﺮﻳﺪﻙ 10: ﻻ ﺗﻔﺘﺢ ﺍﻱ ﻣﻠﻔﺎﺕ ﺍﻻ ﺑﻌﺪ ﺍﻟﺘﺄﻛﺪ ﻣﻦ ﻧﻈﺎﻓﺘﻬﺎ ﺗﻜﻮﻥ ﻭﺻﻠﺔ ﻓﻲ 11: ﺍﺫﺍ ﻻﺣﻈﺖ ﺣﺪﻭﺙ ﺍﻱ .. ﺍﻭ ﺧﺮﻭﺝ ﻭ ﺷﺊ ﻏﺮﻳﺐ ﻣﺜﻞ ﺣﻠﻞ ﺩﺧﻮﻝ ﺍﻟﺴﻲ ﺩﻱ ﺍﻓﺼﻞ ﺍﻱ ﺑﺮﺍﻣﺞ ﻧﻈﺎﻓﺔ ﺍﻟﺠﻬﺎﺯ ﺍﻻﺗﺼﺎﻝ ﻓﻮﺭﺍ ﻭ ﺗﺄﻛﺪ ﻣﻦ =================== =================== ============ =================== =================== ﺍﻟﺒﺮﺍﻣﺞ ===== ============ ﺑﺮﺍﻣﺞ ﺍﻟﻬﺎﻙ ------------- ﺍﻓﻀﻞ ﻫﺎﻙ ﺍﻻﺟﻬﺰﻩ ============ ----------------- ﺑﺮﺍﻣﺞ Sub 7 , Bo2k , Netbus , net devil.dos,,lithium , nova, ﻣﻦ ﺍﻟﻜﺜﻴﺮ ,ﻭﻏﻴﺮﻩ executer unicode,tafek, vampire,ftp,winshell ﻭﺍﻻﻓﻀﻞ Bo2k ﺍﻻﻛﺜﺮ ﺍﻧﺘﺸﺎﺭﺍ ﻭﻟﻜﻦ Sub7 ﻋﻦ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻲ ﺍﻧﺎ ﻻ ﺍﺣﺒﺬ ﺍﻟﺜﻐﺮﺍﺕ ﻭﻟﻚ ﺍﻟﺒﺮﺍﻣﺞ ﺍﺣﺐ ﺍﻷﺧﺘﺮﺍﻕ ﺍﻟﺸﻰﺀ ﻟﻠﺒﺮﺍﻣﺞ ﺍﻫﻤﻴﺘﻬﺎ ﺑﻌﺾ ﻃﺮﻳﻖ ﺑﺮﺍﻣﺞ ﺗﺪﻣﻴﺮ ﺍﻟﺒﺮﻳﺪ ------------------ Aenima , Kaboom , euthan , emailbomber , Death & Destruction Email Bomber v4.0 Aenima ﺍﻻﻓﻀﻞ ﻭ - ﺍﻻﺳﺮﻉ aenima_V20 haktek Euthan V1.5 Death & Destruction Email Bomber v4.0 Bounce Spam Mail V1.4 AnonyMail =================== =================== ============ =================== =================== ﺑﺮﺍﻣﺞ ﺍﻛﺘﺸﺎﻑ ﺛﻐﺮﺍﺕ ===== ﺍﻟﻤﻮﺍﻗﻊ --------------------------- Voideye , Shadow Scan Security (SSS ) SSS ﻭﻫﻮ ﻳﻌﺘﺒﺮ ﻣﻜﺘﺒﺔ ﺑﺮﺍﻣﺞ ﻫﺎﻙ ﻣﺘﻜﺎﻣﻠﻪ ﻭﺍﻻﻓﻀﻞ Shadow ﻭ ﺳﻨﺘﻜﻠﻢ ﻋﻨﻪ ﻻﺣﻘﺎ Scan Security V.3.7 Crack V.3.7 Crack V.2.7 Voideye V.1 Voideye V.2 =================== =========BlAcK_ ============WoLf =================== ﺑﺮﺍﻣﺞ ﺍﻟﻠﺴﺘﻪ ========== ( ﻭ ﺍﻟﻤﻮﺍﻗﻊ ﻟﻠﺒﺮﻳﺪ ) ----------------------------- ﻫﺬﺍ ﺍﻟﻘﺴﻢ ﻟﻤﺸﺎﻫﺪﺓ ﺍﻟﻮﺻﻼﺕ -- ﻳﺠﺐ ﺃﻥ ﺗﻜﻮﻥ ﻟﺪﻳﻚ 1 ﻭﺍﻟﺼﻮﺭ ﻓﻲ ﻣﺸﺎﺭﻛﺎﺕ ﺃﻭ ﺃﻛﺜﺮ. ﺃﻧﺖ ﺃﻥ ﺍﻵﻥ ﺗﻤﻠﻚ 0 ﻣﺸﺎﺭﻛﺔ. webcracker , MungaBunga ﺍﻻﻗﻀﻞ MungaBunga Brut us A2 GoldenEye V1.0 =================== =================== ============ =================== =================== ﺑﺮﺍﻣﺞ ﺍﻟﺤﻤﺎﻳﺔ ===== ( ﻓﻴﺮ ﻭﻭﻝ ) Zone ------------------------ alarm , Tiny Personal Firewall 2.0.14 , Noewtach ﻭ BlackICE Defender v2.5 ﺍﻻﻓﻀﻞ co Zone alarm Norton Internet Security 2001 v 2.5 Family Edition Tiny Personal Firewall 2.0.14 Zone alarm S/N dk68s-vfgfv- wh0jt- wnm68g- kx0w00 LOCKDOWN Millennium V8.1.1 LOCKDOWN Millennium V8.1.1 Intruder Alert '99 =================== =================== ============ =================== =================== ﺑﺮﺍﻣﺞ ﻣﻘﺎﻭﻣﺔ ﺍﻟﻔﻴﺮﻭﺳﺎﺕ ===== Norton ----------------------- Anti-Virus , Mcafee , Pc- ﻣﺒﻴﺮ ﺍﻓﻀﻞ ﻋﻨﺪﻣﺎ ﻳﻜﻮﻥ ﻋﺪﺩ cillin ﺍﻣﺎ ﺍﺫﺍ ﻋﺪﺩ ﻗﻠﻴﻞ -Pc ﺍﻟﻔﻴﺮﻭﺳﺎﺕ Norton ﺍﻻﻓﻀﻞ cillin AntiViral Toolkit Pro (AVP) Gold AntiViral [url="http://202.101. 237.103/f/jwjjt/ soft6/ nav751ce.zip"] Norton Anti-Virus 2001 Cleaner V.3.2 =================== =================== ============ =================== =================== ------------ ﺑﺮﺍﻣﺞ ﺍﻟﺒﻨﺞ ===== evil ping Dorrah =================== =================== ============ =================== =================== ===== Spoofing ﺑﺮﺍﻣﺞ --------------- DC Internet Services Pack Windows Spoofer 97 =================== =================== ============ =================== =================== ===== Cookies -------- Cookie Crusher v2.6 =================== =================== ============ =================== =================== ===== Port Scanner ------------ Sphere Netscan Superscan netspyhunter wgatescan HeMSCaN v1.1 FastScan v2.0 FTP Scan =================== =================== ============ =========== ﻧﻴﻮﻙ ﻓﻲ ﻣﻠﻒ ------ Nukes ﻭﺍﺣﺪ 60 ﺑﺮﻧﺎﻣﺞ nsnuke nukeit X-flood Win nuke V.4 Click V.2.2 Die V.3 Bs Icmp Superkod Winbnc =================== =================== ============ =================== =================== ﺍﺧﺘﺮﺍﻕ ﺍﻟﻤﻮﺍﻗﻊ ===== --------------- WebCrack V.4 ﻛﺎﺷﻒ ﻛﻠﻤﺎﺕ ﺍﻟﺴﺮ Unsecure ---------------- Ratcracker1.40 ﻟﻜﺸﻒ ﻛﻠﻤﺎﺕ ﺍﻟﺴﺮ ﺍﻟﻤﻮﺿﻮﻋﻪ ﻋﻠﻰ ﻭﻳﺴﺘﺨﺪﻡ ﻣﻠﻔﺎﺕ ﺍﻝ dll ﺍﻟﺒﺎﺗﺸﺎﺕ ﻣﻜﺘﺒﺔ ﻣﻠﻔﺎﺕ dll -------------- ﻣﻀﻐﻮﻁ 40 ﻣﻠﻒ dll ﻓﻲ ﻣﻠﻒ =================== ﻭﺍﺣﺪ =================== ============ =================== =================== ﻛﺮﺍﻙ ﻭ ﺳﺮﻳﺎﻝ ===== ﻣﺎ ﺗﺮﻳﺪ ﻣﻦ ﻛﺮﺍﻙ ﺍﻭ ------------- ﺳﺮﻳﺎﻝ ﻛﻞ =================== =================== ============ =================== =================== ﺗﻜﻮﻥ ﻣﻠﻤﺎ ﺑﻠﻠﻐﺔ ===== ﺗﻜﻮﻥ ﻣﻠﻤﺎ ﺑﻤﻌﻈﻢ ﺍﻷﻧﺠﻠﻴﺰﻳﺔ. 1:ﺍﻥ ﻭﺍﻟﺘﻰ ﺍﻧﻈﻤﺔ ﺍﻟﺘﺸﻐﻴﻞ ﻭﺧﺎﺻﺔ 2:ﺍﻥ ﻋﻨﻬﺎ ﺑﺄﺧﺘﺮﺍﻕ ﺍﻟﻴﻮﻧﻜﺲ ﻭﺍﻟﻠﻴﻨﻜﺲ ﻣﻠﻤﺎ ﺑﺄﻭﺍﻣﺮ ﺍﻝ ﺍﻟﻤﻮﺍﻗﻊ. ﻻ ﻏﻨﻰ ﻣﻠﻤﺎ ﻋﻠﻰ regestry 3:ﺍﻥ ﺗﻜﻮﻥ ﺍﻷﻗﻞ ﺑﺄﺭﺑﻊ ﻟﻐﺎﺕ ﺑﺮﻣﺠﺔ 4:ﺍﻥ ﺗﻜﻮﻥ ﺟﺎﻓﺎ ﻭ perl ﻛﻠﻐﺔ php ﺍﻭ visual ﺗﺘﺎﺑﻊ ﺍﺧﺮ ﺍﺧﺒﺎﺭ ﻭﻏﻴﺮﻫﺎ.. basic ﺍﻭ ﺗﺘﺎﺑﻊ ﺍﻟﻤﻮﺍﻗﻊ ﺍﻟﻐﺮﺑﻴﺔ ﺍﻟﺜﻐﺮﺍﺕ. 5:ﺍﻥ % ﻣﻤﺎ ﻷﻥ ﺍﻟﻤﻮﺍﻗﻊ ﺍﻟﻌﺮﺑﻴﺔ ﻟﻤﺎ 6:ﺍﻥ ﺗﻮﺻﻞ ﻟﻪ ﺍﻟﻐﺮﺏ.. ﺗﺼﻞ ﺳﻮﺍ ﻻﻯ 10 ﻭ10 % 8: ﻳﺠﻲ ﺍﻥ ﺗﻌﻠﻢ ﺍﻥ ﺍﻟﻬﺎﻙ ﻣﻠﻤﺎ ﺑﺎﻝ ftp ﺑﺮﺍﻣﺞ 80% ﻣﺦ ﻭﺫﻛﺎﺀ telnet ﻭﺍﻝ Dosﻷﻥ 9:ﺍﻥ ﺗﻜﻮﻥ ﻻ ﺍﻟﻬﺎﻙ ﺑﺪﺃ ﻣﻨﻬﺎ ﻭﻫﻲ ﺍﻗﻮﻯ ﻭﺍﻝ ﺑﻌﻜﺲ ﻣﻦ ﺍﻟﺒﺮﺍﻣﺞ ﻭﺍﺳﺘﺨﺪﺍﻣﻬﺎ ﺍﻟﺒﺮﺍﻣﺞ ﺍﻟﺠﺎﻫﺰﺓ ﺍﻟﻠﻲ ﻻ ﻳﻀﺮ ﺑﺠﻬﺎﺯﻙ ﺍﻥ ﻓﻴﻬﺎ.. ﺗﻌﻠﻢ ﻣﺎﺫﺍ ﻳﻜﻮﻥ ﻣﺪﻣﻮﺝ ﻭﺍﻷﻳﻤﻴﻼﺕ 10:ﻳﺠﻲ ﺍﻥ ﺗﻌﻠﻢ ﺍﺻﺒﺤﺖ ﻣﻦ ﺍﻟﻌﺎﺏ ﺍﺧﺘﺮﺍﻕ ﺍﻷﺟﻬﺰﺓ ﻭﺍﻟﻴﺮﻓﺮﺍﺕ ﺍﻷﻃﻔﺎﻝ ﻳﺠﻲ ﺍﻥ ﺗﺘﺠﻪ ﺍﻟﻰ ﺍﻟﺴﺎﺑﻖ ﻭﺍﻟﺸﺒﻜﺎﺕ.. ﺍﺧﺘﺮﺍﻕ ﺍﻟﻤﻮﺍﻗﻊ ﺍﻥ ﺗﻘﻮﻝ ﻋﻦ ﻧﻔﺴﻚ ﻋﻨﺪﻣﺎ ﺗﺘﻄﺒﻖ ﺍﻟﻨﻬﺎﻳﺔ ﺍﺗﻤﻨﻰ ﺍﻧﻲ ﺍﻥ ﻫﺎﻛﺮ ... ﻳﻤﻜﻦ ﺍﻛﻮﻥ ﻭﻓﻘﺖ ﻓﻲ ﺃﻓﺎﺩﺗﻜﻢ ﻓﻲ
الرجوع الى أعلى الصفحة
مواضيع مماثلة
صلاحيات هذا المنتدى:
لاتستطيع الرد على المواضيع في هذا المنتدى