Академический Документы
Профессиональный Документы
Культура Документы
Parctical ေ လ့လာလိုသူများအတွက်
Grade 3 Hacking စာအုပ်ကို ဖတ်ရှုရန်
လိုအပ်ပါသည်
aus;Zl;wifvTm
pma&;ol
Disclaimer
uRefawmf a&;om;aom Basic Hacking Guide (vG,fulavhvm tajccH
Hacking enf;ynm) pmtkyfonf uRefawmfwdkY EdkifiHwGif rMumrD vdktyfcsufwpfck
jzpfvmrnfh Security ydkif;qdkif&mtwGuf taxmuftyHh&&Sdap&ef Penetration
Tester tjzpf 0goemtavsmuf vkyfaqmifvdkonfh enf;ynm pdwf0ifpm;olrsm;
twGufom &nf&G,fa&;om;xm;jcif;jzpfygonf/
odkYjzpfí þpmtkyfyg taMumif;t&mrsm;ESifh tajccH enf;ynmrsm;onf
Educational Purpose Only omjzpfjyD; rnfonfh Cyber Security Breaches udkrQ
tm;ray;yg/ tu,fí vkyfaqmifyguvnf; þpmtkyfESifh roufqdkifygaMumif;
BudKwif today;tyfygonfcifAsm/
pma&;ol
DESCRIPTION
pm&Iol enf;ynmcspfoltaygif; r*FvmygcifAsm/ 'Dpmtkyfav;eJY
ywfoufjyD; trSmpm vdkY roHk;EIef;vdkwmaMumifh Description (azmfjycsuf)
taeeJYom xnfhoGif;vdkufyg&ap/ 'Dpmtkyfav;eJY ywfoufjyD; uRefawmfhtaeeJY
BudKwif aqG;aEG;p&mav;awG &SdaewmaMumifh 'DpmrsufESmav;awGudk jyD;qHk;wJhtxd
zwfay;zdkY awmif;qdkyg&apcifAsm/ 'Dpmtkyfav;udk uRefawmf a&;csifaewm tcsdef
awmfawmf MumygjyD/ taMumif;trsdK;rsdK;aMumifh ra&;jzpfcJhygbl;/
tcsdKUuawmh uRefawmfhudk wGef;tm;ay;Muygw,f/ Hacking qdkif&m
pmtkyfav;wpftkyf a&;zdkY taMumif;aygh/ 'gaMumifhyJ uRefawmfh tm;vyfcsdefav;
awGudk tenf;i,fpD zJhjyD; 'Dpmtkyfav;udk a&;jzpfcJhygw,f/ 'Dpmtkyfav;onf
rnfonfh Hacking pmtkyfudkrQ wdkuf&dkuf bmomjyefxm;wJh pmtkyf r[kwfyg/
'Dpmtkyfav; a&;zdkYtwGuf uRefawmfhtaeeJY udk;um;cJhwmawmh &Sdygw,f/
Hacking with Kali (James Broad & Andrew Binder) pmtkyfudk udk;um;cJhwmyg/
Chapter awGudkawmh EC council &JU CEH module awGudk twk,ljyD;
pDpOfcJhygw,f/ usef&SdwJh &Sif;vif;csufawGudkawmh Kali &JU Official Page jzpfwJh
offensive security &JU Documentation awGudk ,loHk;xm;ygw,f/
'Dpmtkyfav; a&;wJhtcgrSm uRefawmfhtwGuf tBuD;rm;qHk; tcuftcJ
awG BuHKcJh&ygw,f/ wpfcku oabmw&m;ydkif;yg/ (uRefawmf wufcJhzl;wJh Online
Training av;wpfck &Sdygw,f/ tcef; wpfckcsif;pDudk oabmw&m;ydkif;csnf;yJ
aqG;aEG;xm;wJh pmtkyf av;tkyfrSm wpftkyfudk pmrsufESm 500 0ef;usif &Sdygw,f/)
'Dae&mrSm uRefawmfhtwGuf tcuftcJu oabmw&m;ydkif;awGudk xnfhoGif;rvm;
z,fxm;rvm; qdkwm pOf;pm;&jcif; jzpfvmygw,f/
pmzwfol tawmfrsm;rsm;onf oabmw&m;ydkif;qdkif&m awGudk zwfzdkY
ysif;Muw,f vdkY uRefawmf xifrdygw,f/ 'gayr,fh tcsdKUaom oabmw&m;ydkif;
awGudk em;rvnfbl;qdk&if (oabmw&m;rygwJh vufawGYonf) wwfajrmufzdkY
cufygw,f/ rjzpfrae em;vnf oifhwJh taMumif;t&mawGudk od&Sdxm;rSomvsif
xdktaMumif;t&mawGay: rlwnf pOf;pm;&r,fh tajctae BuHKvmwJhtcg toHk;cs
Edkifygvdrfhr,f/ 'gaMumifh 'DpmtkyfxJrSm oabmw&m;awGvnf; ygap?
pmrsufESmt&vnf; tqifajyap qdkjyD; twdkcsKyf xnfhoGif;azmfjycsufawG
yg0ifaeygw,f/
'gaMumifh tcsdKUaom ae&mav;awGrSm wpfa,mufrusef oabmayguf
em;vnfwmrsdK; rjzpfbJ usefcsif usefaecJhEdkifwJh tm;enf;csufwpfck
jzpfoGm;ygw,f/ Oyrm ajym&&if Networking eJY ywfoufjyD; od&Sdem;vnf xm;ol
awGu uRefawmf twdkcsKyf ajymjyxm;ayr,fh zwfjyD; em;vnfEdkifayr,fh
networking eJY ywfoufjyD; avhvmxm;rI r&Sdao;olawGuawmh em;vnfzdkY
tenf;i,f BudK;pm;&r,fh tajctaeyg/ tJonftwGuf zwfoifhwJh pmtkyfawG
pdf awGudkvnf; Facebook Secret Group uae qufjyD; wifay;oGm;rSm
jzpfygw,f/ ,ckpmtkyfrSm yg0ifwJh Member Form rSm yHkpHav;jznfhjyD; ay;ydkYjcif;
tm;jzifh Facebook Secret Group udk 0ifa&mufEdkifrSm jzpfygw,f/
'kwd, tcuftcJwpfcku English tac:ta0:av;awGeJY ywfoufwm
yg/ tcsdKUaom a0g[m&awGudk jrefrmvdk ajymjyzdkY rvG,fwJhtwGuf 'Dwdkif;
xm;&ovdk jrefrmvdk ajymjyvdkY &wJh a0g[m&awGtwGufvnf; oHk;av;Budrfavmuf
jrefrmvdkeJY English vdk wGJjyD; azmfjyxm;ygw,f/ aemufydkif;rSm xdk tac:ta0:
awGudk t*FvdyfvdkyJ oHk;ygw,f/ bmaMumifhvJ qdkawmh Vulnerability udk jrefrmvdk
tm;enf;csuf qdkwJhtaMumif; tBudrfBudrf wGJjyD; azmfjyxm;ayr,fh uRefawmfh
oabmt& Vulnerability vdkYyJ ac:apcsifygw,f/ pm&IolawGvnf; tJovdkyJ
rSwfxm;apcsifygw,f/ bmaMumifhvJqdk&ifawmh msf xJrSm vulns vdk
vulnerabilities udk twdkaumuf oHk;&wmrsdK;awG BuHKwwfvdkY jzpfjyD; man awG help
awG azmfMunfhwJhtcgrSmvnf; xdkpum;vHk;awGudk em;vnfapcsifvdkYyg/
'gaMumifh uRefawmf BuHK&wJh 'kwd, tcuftcJonf a0g[m& (tac:
ta0:) ydkif; jzpfvmygw,f/ cke Oyrmtwdkif;yJ aqG;aEG;&&if pmtkyfwpftkyfvHk;rSm
tm;enf;csuf vdkYcsnf;yJ wGifwGif oHk;oGm;vdkY &ayr,fh t*FvdyfpmvHk;awGyJ jrif&wJh
ae&mawGrSm rrSwfrdawmhrSm pdk;rdwmaMumifh jrefrmvdk ac:vdkY &ayr,fhvnf;
t*FvdyfvdkyJ nSyfoHk;vdkufygw,f/ 'gaMumifh t*Fvdyfvdk pum;vHk;av;awG
nyfygaewmudk em;vnfay;MuygvdkY BudKwif yefMum;yg&ap/
'Dpmtkyfav;onf uRefawmfhtwGuf yxrqHk; tawGYtBuHK jzpfygw,f/
'gaMumifh tm;enf;csufawG &SdaeEdkifygw,f/ 'Dpmtkyfav;udk tajccHtjzpf
xkwfa0jcif;om jzpfjyD; Hacking e,fy,fonf us,fajymvGef;wJhtwGuf 'Dpmtkyf
wpftkyfwnf;rSmawmh enf;ynm tm;vHk;udk yg0ifatmif xnfhoGif;vdkufEdkifjcif;
r&SdcJhyg/ Oyrm - SQL Injection vdk tcef;rsdK;awGonf oD;oefY pmtkyf wpftkyf
a&;rSomvsif Manual vkyfaqmifEdkifzdkYtwGuf tqifajyrSm jzpfygw,f/ 'Dpmtkyf
xJrSmawmh tool awGeJY vkyfaqmifwJh tydkif;av;awGom xnfhoGif; aqG;aEG;cJh
Edkifygw,f/
2018 ar vavmufrSm Hacking Tool rsm;udk toHk;jyKjcif; ESifh Hacking
Trick rsm; qdkwJh pmtkyfav; wpftkyf xyfrH xkwfa0oGm;ygr,f/ xdkpmtkyftwGuf
tajccHtjzpf 'Dpmtkyfuav;udk avhvmxm;oifhygw,f/ 'DxJu vkyfaqmifcsuf
awGeJY oabmw&m;awGudk em;vnfvsif twdkif;twmwpfcktxd tajccHynm
vrf;aMumif;ay: ajccsEdkifr,fvdkYawmh ,HkMunfxm;ygw,f/
'Dpmtkyfav;xJrSm yg0ifwJh taMumif;t&mawGonf uRefawmfh&JU Blog
av; jzpfwJh www.khitminnyo.com rSm a&;om;azmfjy xm;wJh taMumif;t&m
awGudk jyefvnf pkpnf; xkwfxm;jcif;vnf; r[kwfyg/ uRefawmfh&JU blog
av;rSmvnf; avhvmvdkY &r,fh taMumif;t&mav;awGudk pDpOfxm;&Sday;ygw,f/
Kali Linux installer acG jyKvkyfenf;? Kali Linux udk wifjyD; toHk;jyKenf;?
VirtualBox rSm toHk;jyKenf;? Live Mode taeeJY toHk;jyKEdkifzdkY USB stick rSm
xnfhoGif;enf; pwmawGudkvnf; Blog rSm pkpnf;ay;xm;ygw,f/ wifenf;udk
wpfa,mufcsif;pD twGuf uGefysLwm tajctaeay: rlwnfjyD; aqG;aEG;ay;oGm;rSm
jzpfwJhtwGuf BudKwifxm;p&mrvdkygcifAsm/ (wifjyD;om;olawGuawmh jyefvkyfp&m
rvdkavmufyg/ jyefwifzdkY vdk rvdk pwmawGudk aqG;aEG;Edkifygao;w,fcifAsm)
aemufwpfcktaeeJY 'DpmtkyfxJrSm yg0ifwJh Tools/Application awGudk
bit.ly/kmn-app qdkwJh vdyfpmav;udk Browser rSm &dkufxnfhvdkufwmeJY
emrnftvddkuf a'gif;,l&rSmawGudk pkpnf;ay;xm;wJh Page udk a&muf&Sdygr,f/
Latest Version awGcsnf;yJ pkpnf;ay;xm;ygw,f/ tjrJwrf; update version udk
&EdkifzdkYyg/
'Dpmtkyfonf tjcm;aom pmtkyfawGeJY EIdif;,SOfMunfh&if tacG rygygbl;/
tacGvkyfenf; eJY wifenf;awGudkyg rdrdbmom vkyfwwfapzdkY vrf;nTefay;wmu
tacGxnfhoGif;ay;wmxuf ydkjyD; oifhavsmfr,fvdkY xifrdwJhtwGuf jzpfygw,f/
rdrdbmom zefwD;jcif;tm;jzifh xnfhay;wJhtacGudk upgrade jyefvkyf&wmxuf
Updated Version udk &&SdaprSm jzpfygw,f/
uRefawmf 'Dpmtkyfav;udk p a&;pOfrSm Kali Linux onf 2017.1 om
&Sdao;aomfvnf; pmtkyfav; a&;jyD;vdkY 'D azmfjycsufav; a&;aepOfrSm 2017.3
jzpfoGm;ygjyD/ 'gaMumifh rdrdwdkYbmom Updated Version (Latest Version) udk &,l
oHk;pGJwwfzdkYudk ydkjyD; tav;xm;cJhjcif;jzpfygw,f/
azmfjycsufeJYwif tawmf &Snfvsm;oGm;jyDxifygw,f/ ed*Hk;csKyftaeeJY
'DpmtkyfxJu taMumif;t&mawGudk ausmfrzwfzdkY? vdkufvkyfzdkY vdktyfwJh ae&mawG
rSm vdkufvkyfMunfhjyD;rS a&SUqufzwfzdkY eJY avhusifhzdkY vdktyfwJhae&mawGrSm wpfydkif;
rjyD;cif (aocsm rvkyfwwfao;cif) aemufwpfydkif; rqufzdkY pwmav;awGudk
BudKwif rSmMum;&if;eJY 'Dpmtkyfav;eJY ywfoufwJh azmfjycsufav;awGudk
&yfem;yg&apcifAsm/
pma&;ol
acwfrif;ndK
khitminnyo@khitminnyo.com
CHAPTER 1: Introduction to Hacking
1. Hacking qdkwm
Hacking qdkwm bmvJqdkwmawGeJYywfoufjyD; uRefawmfwdkY Budrfzefrsm;pGm
odzl;zwfzl;jyD;jzpfaewmrdkY 'Dae&mrSm vdk&if;awGudkcsnf; azmfjyoGm;ygawmhr,f/
Hacking u ]]hack = ckwfxpfonf/ jzwfawmufonf/}} qdkwJh English Word
wpfckuae qif;oufvmwmjzpfjyD; uGefysLwme,fy,frSmawmh ]]gaining
unauthorized access to data in a system or computer}} vdkY zGifhqdkMuygw,f/
'gaMumifh enf;ynme,fy,frSmawmh Hacking qdkwm[m euf0yf
(odkYr[kwf) uGefysLwm (odkYr[kwf) pepf wpfckck\ cGifhjyKcsufay;rxm;aom
tcGifhta&;udk &,l oHk;pGJjcif;/ wpfenf;tm;jzifh tqdkyg euf0yfjzpfap?
uGefysLwmjzpfap? pepfwpfckckjzpfap twGif;odkY cGifhjyKcsufr&SdbJ 0ifa&mufjcif; vdkY
qdkvdkygw,f/
Cambridge Dictionary t&qdk&ifawmh Hacking qdkwmonf
uGefysLwmpepfwpfckcktwGif; odkavSmifxm;aom tcsuftvufrsm;udk
&,l&efjzpfap? xdkuGefysLwmpepfrsm;twGif; Adkif;&yfrsm; jyefYyGm;ap&efjzpfap ponfh
&nf&G,fcsufrsdK;jzifh uGefysLwmudk w&m;r0if toHk;jyKjcif; vdkY zGifhqdkygw,f/
2. Hacker qdkwm
Hacking udk vkyfaqmifol vdkY tvG,fqHk;ajymvdkY&ygw,f/
pepftrsdK;rsdK;twGif;udk xGif;azmuf0ifa&mufol? tjcm;olawG&JU uGefysLwmpepfawG
xJu ta&;ygwJh information (data) awGudk w&m;r0if &,l^zsufqD;ol?
qufoG,fa&;pepftrsdK;rsdK;udk Mum;jzwfem;axmifol (tcsuftvuf Mum;jzwf&,l
ol) ponfjzifh Hacker udk t"dyÜg,fzGifhqdkMuygw,f/
3. Hacker trsdK;tpm;rsm;
vkyfaqmifyHkeJY cH,lcsufawGay:rlwnfjyD; Hacker awGudk trsdK;tpm;
cGJjcm;Muygw,f/ t"dutkyfpk oHk;pkuawmh Black Hat Hacker, White Hat Hacker
eJY Grey Hat Hacker wdkY jzpfMuygw,f/
Black Hat Hacker awGrSmawmh aumif;rGefus,fjyefYwJh uGefysLwmqdkif&m
todynmawG &SdaeMujyD; olwdkY&JU todynmA[kokwawGudk Internet Security udk
ausmfjzwfcsdK;azmuf (Breach or Bypass) wJhae&mrSm toHk;jyKMuygw,f/ Black
Hat Hacker awGudk Cracker (or) Dark-site-hacker awGvdkYvnf;
ac:qdkMuygao;w,f/ uGefysLwmeJY euf0yfawGxJudk csdK;azmuf0ifa&mufol?
uGefysLwmAdkif;&yfawGudk zefwD; ysHUyGm;apolawG[m Black Hat Hacker awG
jzpfMuygw,f/ olwdkY[m olwdkY&JU vkyfaqmifrIaMumifh wpfbufrSm jzpfoGm;r,fh
qHk;&IH;epfemrIawGudk xnfhawG;avh r&Sdygbl;/ rdrdwdkYtusdK;pD;yGm;udkom MunfhwJh
vkyf&yfawGrsdK; vkyfaqmifavh&SdMuygw,f/ 'gaMumifh Black hat hacker awG[m
pdwfxm;raumif; vkyf&yfraumif;wJh vlqdk;awGvdkY rSwf,lEdkifygw,f/
Black Hat, White hat qdkwmawGu ]]The bad guys usually wore black
hats and the good guys wore white ones.}} qdkwJh taemufwdkif; a&S; qdk&dk;pum;
wpfckuae qif;oufvmwm jzpfygw,f/ oabmu vlaumif;rsm;onf OD;xkyfjzL
aqmif;MujyD; vlqdk;rsm;u OD;xkyfteuf aqmif;Muonf aygh/
White Hat Hacker awGuvnf; Black Hat Hacker awGvdkyJ
uGefysLwmpepfawG&JU tm;enf;csuf ,dkaygufawGudk &SmazGygw,f/ Black Hat
Hacker awGeJY rwlwmuawmh White Hat Hacker awGu &SmawGYvmwJh
tm;enf;csufawGay: tcGifhaumif;,ljyD; wdkufcdkufwmrsdK; rvkyfbJ
tJonftm;enf;csufawGudk b,fvdkjyefvnfjyKjyifjyD; aumif;rGefatmifzefwD;rvJ
qdkwmudk BuHpnfvkyfaqmifygw,f/ olwdkY&JU prf;oyfvkyfaqmifrIaMumifh rnfolYudkrQ
xdcdkufepfemaprIr&Sdapatmif BuHpnfvkyfaqmif&jcif;rdkY White Hat Hacker awG&JU
vkyfaqmif&rIawGu vufawGYrSm ydkcufcJygw,f/ jyD;awmh White Hat Hacker
awG[m pepfwpfckudk prf;oyfppfaq;zdkY vdktyfwJhtcg xdkpepf&JU ydkif&SifxH
cGifhawmif;jyD;rS xdkpepfudk xdcdkufapjcif;r&SdbJ Security t& tm;enf;csufawGudk
&SmazG&ygw,f/ tm;enf;csufawG &SmazGawGY&Sdyguvnf; ydkif&SifxH today;jcif; eJY
umuG,fEdkifrnfh enf;vrf; &SmazGjcif;awGudk vkyfaqmifMuygw,f/
av;pm;twk,lzG,f pdwfxm;eJY vkyf&yfrsm;udk vkyfaqmifMuolawGaygh/
Grey Hat Hacker uawmh white rus Black rus Hacker awG
jzpfygw,f/ Black hat awGvdk pepfawGudkvnf; rzsufqD;Muovdk White Hat
awGvdk ydkif&SifxHcGifhawmif;wmrsdK;vnf; rvkyfwwfMuygbl;/ White Hat awGvdk
cGifhrawmif;&ifawmifrS Black Hat awGvdk pepfawGudk xdcdkufysufpD;aprIr&Sdatmif
vkyfaqmif&ifawmh Grey Hat vnf; rqdk;wJhtxJrSm yg0ifvmEdkifygw,f/ 'gayr,fh
Grey Hat Hacker tawmfrsm;rsm;uawmh rdrdwdkY&JU prf;oyfrIaMumifh wpfbuf
System awG ysufpD;oGm;vnf; *&kpdkufavhr&SdMuygbl;/ 'gaMumifh pmzwfolu
White hat tjzpf r&yfwnfEdkif&ifawmif rdrdprf;oyfrItwGuf wpfzufpepfawG
ysufpD;roGm;apzdkY *&kpdkufvkyfaqmifr,fqdk&ifawmh vlqdk;pm&if;xJrSm yg0ifrSm
r[kwfawmhbl;aygh/
'gawGuawmh Hacker awG&JU cH,lcsufeJY tjyKtrlawGay: rlwnfjyD;
cGJjcm;jcif;om jzpfygw,f/ em;vnfwwfuRrf;rI Skill t& cGJjcm;wmawGvnf;
&Sdygao;w,f/ 'DrSmawmh tJonftaMumif; xnfhoGif;rajymawmhygbl;/
wu,fvdkYrsm; urÇmay:rSm Hacker awGom &Sdraebl;qdk&if ,aeY
uRefawmfwdkY toHk;jyKaewJh pepfawG[m ckvdk cdkifrmvHkjcHKvmr,frxifygbl;/ Black
Hat hacker awGu tm;enf;csufawG &SmazGwdkufcdkufw,f/ White Hat Hacker
awGu tm;enf;csufawGudk &SmazGumuG,fw,f/ 'Dawmh pepfrsdK;pHktwGuf
aumif;usdK;jyKwJh White Hat Hacker awG[m vdktyfcsufwpf&yf
jzpfvmygawmhw,f/
,aeYacwfudk jyefMunfhr,fqdk&if uRefawmfwdkYEdkifiHrSm tifwmeuf
toHk;jyKrIawG rsm;jym;vmw,f/ uGefysLwm toHk;jyKrIawGeJY uGef,uftoHk;csrIawG?
Website zefwD;toHk;jyKrIawG pwmawG[m vufzuf&nfqdkifupvdkY
ukrÜPDawGtxd wdk;wuftoHk;jyKrIawGudk jrifawGUvm&jyDjzpfygw,f/ tifwmeuf
toHk;jyKrIawG ydkrdkrsm;jym;vmwmeJYtrQ tifwmeufqdkif&m qdkufbmvHkjcHKa&;awG
ta&;ygvmovdk bPfvkyfief;awG? EdkifiHwumeJY ywfoufqufqHwJh aiGay;aiG,l
udpöawGudkawmifrS zkef;av;wpfvHk;ay:uae vkyfaqmifEdkifaewJhacwfrSm
qdkufbm&mZ0wfrIawGvnf; ydkrdkrsm;jym;vmaewmaMumifh Cyber Security &JU
tcef;u@[m tvGefta&;ygvmygw,f/
Hacking udk pdwfr0ifpm;vsifawmifrS rdrdwdkY&JU vHkjcHKa&;twGuf
Knowledge awG &SdzdkY vdktyfvmygawmhw,f/ Hacking udk raumif;wJhtvkyfvdkY
w&m;ao owfrSwf,lqxm;wwfMuwJh tcsdKUaomolawGudk uRefawmfwdkY
ywf0ef;usifrSm jrifawGYzl;Muygvdrfhr,f/ uRefawmfaqG;aEG;cJhovdkygyJ/
aumif;wJhbufrSm toHk;csr,fh hacker awG uRefawmfwdkYEdkifiHrSm ta&;ay:
vdktyfvdkYaeygjyD/ rMumrD umvawGtwGif;rSm rjzpfraevdktyfcsufwpf&yf
jzpfvmygawmhr,f/
Hacking ay: tjrifrMunfolrsm;udk ajymjyvdkwmwpfcku Hacking qdkwm
vufeufwpfckygyJ/ aoewfwpfvuf &Sdw,fqdkygpdkY/ tJonfaoewfu
vlqdk;vufxJrSm &Sdae&if vlaumif;awGtwGuf pdk;&drfpdwfylp&mjzpfaeayr,fh
tJonfaoewfuyJ &JawGvufxJrSm&Sdae&ifawmh vlaumif;awG pdwfylp&m
rvdkawmhygbl;/ aoewfonf vludk aoapEdkifayr,fh xdkaoewfudk
udkifpGJxm;olay:rSm rlwnfjyD; oufa&mufrI uGmjcm;oGm;ygw,f/
'Doabmw&m;twdkif;ygyJ/ Hacking onf aoewfwpfvuf qdkMuygpdkY/
'g[m raumif;wJhtajctaewpfckr[kwfygbl;/ umuG,fa&;bufrSm
toHk;jyKwJhtcg xdkaoewfuyJ tm;vHk;twGuf aumif;usdK;awGudk zefwD;ay;EdkifpGrf;
w,fr[kwfvm;/
CHAPTER 2: Ethical Hacking (or)
Penetration Testing
1.Penetration Testing qdkwm
Ethical Hacking , Penetration Testing eJY White Hat Hacking wdkY[m
ac:a0:oHk;pGJrIjcif; uGJjym;ayr,fh qdkvdk&if;u wlnDMuygw,f/ Hacking udk
vkyfaqmifwJhae&mrSm Ethic qdkwJh udk,fusifhw&m; pHEIef;wpfck aygif;pyfvkduf
wJhtcg Ethical Hacking qdkwm jzpfay:vmygw,f/
Corporation awmfawmfrsm;rsm;[m olwdkY&JU umuG,fa&;twGuf
Security Professional awGudk iSm;&rf;toHk;jyKMuw,f/ umuG,fa&;rSm
tiftm;aumif;apzdkYtwGuf Security control awGudkvnf; xyfrH 0,f,l toHk;jyK
Muavh&Sdygw,f/ 'gayr,fh Skilled hacker awGudk umuG,fEdkifzdkYtwGuf olwdkY&JU
vkyfaqmifcsufawG[m pdwfauseyfp&m&Sdr&Sdqdkwmudk b,folu cdkifrmpGm
qHk;jzwfay;EdkifrvJ/ 'Dae&mrSm Penetration Testing &JU tcef;u@u
ta&;ygwJhae&muae yg0ifvmygawmhw,f/
Penetration Testing (Pen-testing) qdkwm umuG,fa&; r[mAsL[mudk
a&;qGJvkyfaqmifol Security Officer (or) Security Control awGuae usef&pfcJhwJh
vHkjcHKa&;qdkif&m tm;enf;csuf (Security Weakness) udk &SmazGEdkifapzdkYtwGuf
System ay:rSm Attack jyKvkyfMunfhjcif; jzpfygw,f/
xdkodkY Security Assessment jyKvkyfjyD; vkHjcHKa&;t& tm;enf;csufawGudk
&SmazG&mrSm Nessus Vulnerable Scanner udk toHk;jyKEdkifygw,f/ Pro eJY Manager
qdkjyD; version ESpfrsdK;&Sdonfhtjyif &uf 60 pm tcrJh toHk;jyKEdkifcGifh&SdrSmjzpfjyD;
WannaCry, NotPetya eJY tjcm; Ransomware Cyber Attack awGuae
umuG,fwm;qD;Edkifygw,f/ 'ghjyif &SmazGawGY&Sdvmaom tm;enf;csufawGudkvnf;
jyKjyifjyifqifvdkY vG,fulapzdkY taxmuftyHhay;ygw,f/
Nessus udk prf;oyf&,loHk;pGJvdkygu Browser's address bar wGif
bit.ly/nessus-aio [k &dkufxnfhjcif;tm;jzifh Download &,l&efae&modkY
a&muf&SdrnfjzpfjyD; ESpfouf&mAm;&Sif;tvdkuf a'gif;,lEdkifygw,f/
Nessus Vulnerable Scanner wGif Vulnerable rsm;tm; azmfjyyHk
2. Vulnerability Assessment
'Dtydkif;udkawmh Nexpose vdk tool udk toHk;jyK vkyfaqmifEdkifygw,f/
tm;vHk;od&SdjyD;jzpfwJh Metasploit udk zefwD;cJhonfh Rapid 7 uyJ Develop
jyKvkyfxm;wJh Nexpose [m Vulnerability assessment jyKvkyf&mrSm
tvGeftaxmuftuljyKygw,f/ oifhtaeeJY Nexpose udk prf;oyftoHk;jyKvdkygu
Google rSm nexpose download vdkY &dkuf&Smvdkuf&if tay:qHk;awGU&r,fh link uae
azmifjznfhjyD; a'gif;,lEdkifygw,f/ tcrJh prf;oyfoHk;pGJcGifhumvuawmh &uf 30
jzpfjyD; a&&SnfoHk;vdkygu 0,f,lxm;&rSmjzpfygw,f/
Nexpost u uRsefawmfwdkY&JU Network xJrSm &SdaewJh Device awG&JU
System ydkif;qdkif&m tm;enf;csufawGudk tcsdefwdkav;twGif;rSm &SmazG
azmfjyay;Edkifygw,f/ install jyKvkyfjyD; prf;oyfMunfhygu vG,fulpGm odEdkifwmrdkY
uRsefawmfhtaeeJYuawmh razmfjyvdkawmhyg/ Vulnerability Assessment udk
manual taejzifhvnf; vkyfaqmifEdkifygao;w,f/ prf;oyf&SmazG&r,fh
enf;vrf;awGudkawmh od&Sdxm;&rSmjzpfygw,f/
3. Area of Pentest
vlom;awG&JU qHk;jzwf vkyfaqmifcsuf (human behavior) rygbJawmh
penetration testing udk jyD;qHk;atmifjrifatmif vkyfaqmifEdkifrnfr[kwfyg/
sensitive information awG &&SdzdkYtwGuf taumif;qHk;enf;vrf;uawmh ,HkMunf&
avmufaom olu exploit jyKvkyfjcif;rsdK;yJ jzpfygw,f/ tJvdk
vkyfaqmifEdkifzdkYtwGuf attacker awGu target system xJrSm &SdaewJh 0efxrf;awG
udk toHk;csEdkifzdkY BudK;pm;wwfMuygw,f/
tJvdk vkyfaqmifEdkifzdkYtwGufvnf; Social Engineering udk
toHk;jyKavh&Sdygw,f/ wdkufcdkifrIwpfck &mEIef;jynfh atmifjrifoGm;jyD qdk&ifawmh
attacker u olYtwGuf user account wpfck topfxyfzGifhwmrsdK;? root (admin)
password awGudk ajymif;vJypfwmrsdK;? data awGudk ul;,lwmrsdK;? malware awGudk
xnfhoGif;wmrsdK;? data awGeJY system udk zsufqD;ypfwmrsdK; ponfjzifh
olvkyfcsif&mudk vkyfEdkifcGifh &oGm;aprSmjzpfygw,f/
Pen-tester awGu tvm;wl enf;ynmawGudk toHk;jyKjyD; Vulnerability
(tm;enf;csuf) awGudk &SmazG&ovdk tm;enf;csufawGaMumifh xdcdkufvmEdkifr,fh
jzpfEdkifajcawGudkvnf; BudKwif rSef;qxm;&ygw,f/ Sensitive information (data)
awGudkvnf; xm;&SdoHk;pGJwJh ae&m rSef rrSef? vkyfydkifcGifh &olawG&JU todynmydkif;
tajctae pwmawGudk xnfhoGif; pOf;pm;&ygw,f/tm;enf;csufawGudk &SmazG
awGU&Sdygu xdktm;enf;csufawGudk z,fvdkY &u z,f? umuG,fvdkY &ygu umuG,fjyD;
umuG,fwm;qD;vdkY r&wJh tm;enf;csufrsdK; jzpfyguvnf; xdktm;enf;csufrS
wdkufcdkufvmvsif xdcdkufrI r&Sdatmif (enf;atmif) vkyfaqmif&r,fh
enf;vrf;awGudkyg &SmazG &rSmjzpfygw,f/
rdrdwdkY wm0ef,l vkyfaqmifay;aewJh company (or) organization awGrSm
vuf&Sd vkyfudkifaeol 0efxrf;rsm; (txl;ojzifh uGefysLwmrsm;ESifh xdawGYae&olrsm;)
udk oufqdkif&m todynmay;jcif;rsdK;awG vkyfaqmif&rSmvnf; jzpfygw,f/
ck uRsefawmfwdkY aqG;aEG;cJhwmav;awGu Penetration Testing eJY
oufqdkiforQ Concept awG tm;vHk; r[kwfyg/ oabmobm0udk em;vnf&Hkom
tusOf;csKyf aqG;aEG;jcif;jzpfwmrdkY 'Dae&mrSmyJ acwÅcP &yfem;&atmifyg/
CHAPTER 3: Vulnerability Assessment
Introduction
1. Introduction to Linux
txufyg yHkt& Desktop ay:u test directory xJrSm test two qdkwJh
emrnfeJY folder wpfck wnfaqmufwmjzpfygw,f/ 'gayr,fh ckcsdefrSm Desktop
ay:rSm&SdwJh test folder udk zGifhMunfhr,fqdk&ifawmh
cke command line xJrSmyJ echo "I am learning Ethical Hacking." >
test2.txt
vdkY &dkufxnfhvdkufwmyg/ oabmu test2.txt zdkifudk txJu
pmom;ae&mrSm I am learning Ethical hacking vdkY jyifr,faygh/
Update
apt-get onf app & dependency awGudk install ay;Edkif&Hkomru install
xm;wJh package awGtwGuf update &&SdEdkifrI tajctaeudkyg azmfjyay;Edkifovdk
update vnf; jyKvkyfay;Edkifygao;w,f/ sources list xnfhoGif;jyD;onfhtcg jzpfap?
source wpfckck ajymif;vJonfhtcgjzpfap? jznfhoGif;vdkufwJh source topfudk
uRefawmfwdkY&JU pepfeJY csdwfqufEdkifzdkYtwGuf apt-get update command udk
toHk;jyK&ygw,f/ xdkYtwlygyJ/ uRefawmfwdkY&JU pepfxJrSm&SdwJh package awGtwGuf
upgrade &&SdEdkifrItwGufvnf; apt-get update eJY ppfaq;Edkifygao;w,f/
(rSwfcsuf/ / apt-get tpm; apt udkyJ toHk;jyKEdkifygw,f/Oyrm apt update,
apt install gimp, ...)
Upgrade
rnfonfh pepfrQ tNrJwrf; jyD;jynfhpHkraeyg/ t"du Operating System
udk wdk;wufatmif jyKvkyfwm? oHk;&ydkrdkvG,fulatmif zefwD;wm?
wdk;wufaumif;rGefatmifvkyfwm? patch management awG? new feature awG
xnfhoGif;wm? bugs awGudk rSefaumifatmif jyKjyifwm pwmawGtwGuf tpOftjrJ
development state rSm &Sdaeygw,f/
uRefawmfwdkY&JU Kali Linux rSm xnfhoGif;toHk;jyKxm;wJh package
awGtwGuf new version awG&&SdwJhtcg upgrade jyKvkyfEdkifr,fh command
udkvnf; apt-get (or) apt eJY toHk;jyK&ygw,f/ upgrade jyKvkyfp&m&SdaewJhtcg
(qdkvdkwmu application wpfck Am;&Sif;topf xGufwJhtcg) apt-get update (or)
apt update vkyfMunfh&if 'Dvdk ay:ygr,f/
txufyg yHkxJutwdkif; twdtusawmh ay:rSmr[kwfyg/ rdrdwdkY pwif
toHk;jyKwJhtcsdefeJY package awG uGmjcm;Edkifygw,f/ ck yHkrSmMunfh&if 399 packages
can be upgraded. Run 'apt list --upgradable' to see them. qdkjyD; awGY&ygvdrfhr,f/
upgrade jyKvkyfEdkifwJh package aygif; 399 ck &Sdw,fqdkwJhtaMumif;
azmfjyxm;ovdk apt list --upgradable udk toHk;jyKjyD; upgrade jyKvkyfEdkifr,fh list udk
MunfhEdkifwJhtaMumif; azmfjyay;xm;wmyg/
Distribution Upgrade
'Dtydkif;uawmh apt upgrade wdkYvdk rMumcP &&SdEdkifwmawmh
r[kwfygbl;/ Kernel Version jrifhoGm;wmrsdK;? 'grSr[kwf system version topf
xyf&wmrsdK; (Oyrm- Android Version 5 uae 6, 7 xd jrSifhEdkifwmrsdK;) awGtwGuf
rSom vkyfaqmiftoHk;jyKEdkifrSmjzpfygw,f/ Oyrm - uRefawmfwdkYu Kali Linux
2016.2 udk Install jyKvkyfxm;w,f/ ck ('Dpma&;aewJhcsdefrSm) Kali Linux Version
u 2017.1 xd a&muf&SdoGm;ygjyD/ 'Dawmh uRefawmfwdkYtaeeJY topfjyefwif
&rSmvm;/ rvdkygbl;/ tJonf tajctaetwGuf uRefawmfwdkY toHk;jyKEdkifr,fh
command av;wpfck &Sdygw,f/ tJ'guawmh apt dist-upgrade (or) apt-get
dist-upgrade yJ jzpfygw,f/
ajymzdkY arhoGm;w,fAsm/ apt command (apt update, apt upgrade, apt
install, apt dist upgrade) awGudk toHk;jyKr,fqdk&if tifwmeufawmh
vdktyfygw,f/ tifwmeufvdkif; csdwfqufxm;rSom vkyfaqmifvdkY &ygr,fAs/
Removing Packages
install taMumif; odjyDqdkawmh uninstall udk qufaqG;aEG;ygr,f/ install
& remove yJ uGmjyD; vkyfaqmif&wmawmh wlnDygw,f/ Oyrm - gimp udk
jyefjzKwfcsif&if apt remove gimp (or) apt-get remove gimp qdkjyD;
toHk;jyKEdkifygw,f/ yHkeJYawmh vkyfrjyawmhbl;aemf/
Auto-removing
uRefawmfwdkY&JU Operating System xJu package (application) awGudk
upgrade jyKvkyfvdkufwJhtcg xdk package awG&JU old version awG[m rvdktyfbJ
usef&Sdaeygawmhw,f/ 'gawGudk z,f&Sm;ay;zdkY vdktyfygw,f/ upgrade (or)
dist-upgrade jyKvkyfjyD;wdkif; vkyfoifhw,f qdkygawmh/ ay;&r,fh command u
awmh apt autoremove jzpfygw,f/ autoremove udk cGJra&;ygbl;/
Purge
purge udkawmh linux user tcsdKUu rodMuovdk tcsdKUu
a&SmifMuygw,f/ remove eJY purge rwlnDygbl;/ bmuGmvJqdkawmh apt remove
pkg u package wpfckudkom uninstall vdkufwmjzpfjyD; configuration file awGudk
zsufroGm;ygbl;/ aemufwpfBudrf vdktyfwJhtcg jyefvnftoHk;jyKapEdkifzdkY
pufxJrSmyJ xm;xm;cJhygw,f/ purge uawmh configuration file awGudkyg tm;vHk;
zsufvdkufygw,f/ 'gqdk bmvdkY purge udk oHk;aeao;vJ vdkY ar;p&m
&Sdaumif;&Sdygr,f/
olYudk app wpfckudk vHk;0 reinstall jyefvnfjyKvkyfvdkwJhtcg oHk;ygw,f/
configuration file xJrSm rSm;,Gif;oGm;wm? jyifrdvdkufjyD; arhoGm;vdkY program
tvkyfrvkyfawmhwm pwJhtajctaersdK;twGufvnf; apt purge pkg-name udk
toHk;jyKygw,f/ Oyrm gimp udk tm;vHk;ukefpifatmif jzKwfjyD; jyefxnfhoHk;csif&if
apt purge gimp eJYjzKwfjyD; apt install gimp eJY jyefoGif;aygh/
Clean
uRefawmfwdkYawG apt install pkg eJY install jyKvkyfwJhjzpfpOfrSm package
awGudk oufqdkif&m sources uae download &,lygw,f/ jyD;wJhtcg unpackage
vkyfjyD; install w,faygh/ install jyD;oGm;wJhtcg rvdktyfawmhwJh package awG[m
uRefawmfwdkY&JU system xJrSm usefae&pfcJhygw,f/ tJovdkeJY rsm;jym;vmwJh
tcgrSmawmh HDD space awG avsmhenf;ukefygawmhw,f/ 'gaMumifh olwdkYudk
clean vkyfay;zdkY vdktyfjyD; tJonftwGuf apt clean (or) apt-get clean udk
toHk;jyKEdkifygw,f/
Auto clean
clean eJY vkyfaqmifyHkcsif; wlwJh autoclean udkawmh apt upgrade eJY apt
dist-upgrade awG vkyfjyD;wJhtcsdefawGrSm oHk;ygw,f/ app wpfck version opf
upgrade jyD;wJhtcg version ta[mif;udk &Sif;ay;w,fvdkY rSwfxm;Edkifygw,f/ olYudk
toHk;jyKyHkuawmh apt autoclean (or) apt-get autoclean jzpfygw,f/
Tarballs
uRefawmfwdkY odMuwJh zip, rar wdkYvdk file archives vkyfwJh program
wpfckyg/ Tape Archives udk twdkaumufjyKjyD; TAR vdkY ac:qdkygw,f/ zdkifawG
trsm;BuD;udk pkpnf;EdkifwJhtwGuf zip wdkY rar wdkYvdkyJ tarball format udkvnf;
toHk;jyKMuygw,f/ Linux package awGrSm t"du toHk;jyKMuygw,f/
vuf&Sd terminal rSmyJ rm udk oHk;jyD; 1.txt eJY 2.txt qdkwJh zdkifawGudk
zsufvdkufygw,f/ ls eJYMunfhwJhtcg rawGYawmhygbl;/ cke tar awGudk
jyefjznf&atmif/
2.Hacking Lab
'DtaMumif;eJY ywfoufjyD;awmh tao;pdwfazmfjy&if pmrsufESmawG
rsm;jyD; usefwJh t&mawGtwGuf pmrsufESm rusefrSmpdk;wmaMumifh
jyKvkyfenf;awGudk azmfrjyawmhbl;aemf/ www.khitminnyo.com rSm Hacking Lab
zefwD;jcif;enf;vrf;awGudk Munfh&IEdkifygw,f/ hacking Lab qdkwmuawmh
uRefawmfwdkYtaeeJY Hacking avhvm&if; uRefawmfwdkY&JU prf;oyfrIawGudk
prf;oyfvkyfaqmifwJhtcg rnfolYudkrQ rxdcdkufapbJ vkyfaqmifEdkifapzdkYtwGuf
uRefawmfwdkYpufxJrSmwif wnfaqmufxm;wJh Virtual Laboratory udk
qdkvkdygw,f/
t"dutm;jzifhawmh hacking lab tjzpf VirtualBox (or) VMWare udk
toHk;jyKMuygw,f/ tJonfrSm t"du wifavh&SdwmawGuawmh uRefawmfwdkY&JU
Host OS ay: rlwnf uGmjcm;Edkifygw,f/ uRefawmfwdkYu Windows udk Host tjzpf
oHk;xm;w,fqdk&ifawmh VM awGtjzpf Kali Linux, Windows (prf;oyf&ef) ,
Metasploitable, DVWA pwmawG jzpfygw,f/ uRefawmfwdkYu Host tjzpf Kali
udk toHk;jyKxm;w,fqdk&ifawmh VM rSm Windows, Metasploitable, DVWA
pwmawGudk Hacking Lab taeeJY xnfhoGif;xm;Edkifygw,f/
rdrdwdkY puf\ RAM ESifh HDD memory t& bmawG b,fvdk wifjyD;
toHk;jyKoifhvJqdkwmudk uRefawmfwdkY&JU Facebook Group uaejzpfap? viber uae
jzpfap aqG;aEG;Edkifygw,fcifAsm/
CHAPTER 7: Penetrating Testing Life-cycle
Phase 1. Reconnaissance
trIwpfck jzpfw,f qdkMuygpdkY/ xdktrIrSm rouFmzG,f tkyfpk (group)
wpfckudk awGYw,fqdkMuygpdkY/ uRefawmfwdkYu Oya'bufawmfom;awG taeeJY
awG;Munfh&atmif/ yxrqHk; bmvkyfrvJ/ xdk tkyfpkudk wdkuf&dkuf oGm;zrf;rvm;/
'Dae&mrSm uRefawmfwdkYpOf;pm;&rSmu bmtcsuftvufrS &Sdrxm;bJeJY oGm;zrf;&if
udk,fh&SL;udk,fywfjyD; udk,fhbuf jrSm;OD;jyefvnfvmrSmjzpfovdk ta&;BuD;aom
uGif;qufawGyg jywfoGm;rSmjzpfygw,f/
'Dawmh uRefawmfwdkY bmvkyfMurvJ/ xdk rouFmzG,ftkyfpkudk apmifhMunfh
&ygr,f/ olwdkYtaMumif; &atmif t&if pHkprf;&ygr,f/ olwdkYu bmawGvkyfaqmif
MuvJ/ bmawGudk toHk;jyKaeMuvJ/ olwdkYrSm bmvufeufawG &SdrvJ/ olwdkYawG&JU
aemufuG,frSm bmawG&Sdao;vJ/ ponfjzifh uRefawmfwdkY target xm;wJh tkyfpkeJY
ywfoufqufEG,forQ tcsuftvuftm;vHk;udk &SmazGpkaqmif;&rSm jzpfygw,f/
xdkYtwlygyJ/ Penetrating Testing (Hacking) wpfckck vkyfaqmifr,f
qdkygu uRefawmfwdkY Target xm;wJh company (or) organization eJY ywfouf
qufEG,fwJh information wdkif;udk pkaqmif;xm;zdkY vdktyfygr,f/ xdkodkY information
pkaqmif;wJhtcg tifwmeufuae &SmazGpkaqmif;Edkifwm&Sdovdk jyifyrSm &SmazG
pkaqmif;&wmawGvnf; &SdEdkifygw,f/ tJonfawmh uRefawmfwdkYtaeeJY yxrqHk;
vkyfaqmif&r,fhtqifhu Reconnaissance (or) Information Gathering (or)
Footprinting jzpfygw,f/
tao;pdwfudk oufqdkif&mtcef;awGrSm xyfrH aqG;aEG;oGm;ygr,f/
Phase 2. Scanning
Phase 3. Exploitation
Phase 5. Reporting
Introduction
Website Mirroring
Google Search
'Dcgawmh uRefawmfwdkY trsm;pk toHk;rjyKjzpfMuwJh google search
taMumif;av; aqG;aEG;ygr,f/ Google Search rsm; igwdkY oHk;aeusyguGmvdkY
ajymcsifwJholvnf; &Sdaumif; &Sdygvdrfhr,f/ uJ Munfh&atmifaemf/
uRefawmfwdkYawG[m taMumif;t&mwpfckudk &SmazGcsifwJhtcg internet
search engine awGudk toHk;jyKMuygw,f/ Search engine toHk;jyKrIydkif;[m
uRefawmfwdkYeJY rpdrf;Muygbl;/ Oyrm - uRefawmfwdkY Facebook oHk;Muygw,f/
Account wpfckck (odkYr[kwf) taMumif;t&mwpfckckudk tjref&SmazGcsifwJhtcg
uRefawmfwdkY zkef;xJu Facebook Application xdyfrSm&SdwJh vufudkifrSefbDvl;0dkif;
uav;udk ESdyfjyD; Search vkyf &SmazGMuygw,f/ Oyrm - MPT, MRTV 4, Telenor
Myanmar, ... ponfjzifhaygh/ tJonftcg tqdkyg Search terms awGeJY
oufqdkif&m Page, account, post, movie, ... pwmawG ay:vmygawmhw,f/
'g[mvnf; Search Engine toHk;jyKjcif;ygyJ/
'gaMumifh Search toHk;jyKjcif;[m uRefawmfwdkY tm;vHk;eJY rpdrf;Muygbl;/
xdkYtwlyJ Facebook rSmwifomru tifwmeufrSm &Sd&SdorSsxJu &SmazGcsif&ifawmh
Google, Yahoo, Bing pwJh Search Engine awGudk toHk;jyKMuavh&Sdygw,f/
Google uawmh toHk;trsm;qHk; Search Engine wpfrsdK;ygyJ/ uRefawmfwdkYvnf;
Google search udk oHk;zl;Muygw,f/ ck azmfjyr,fh Searching udkawmh
vltenf;i,fu omvsif toHk;jyKMuwmyg/ bmawGuGmvJ Munfh&atmif/
yxrqHk;taeeJY uRefawmfwdkY&JU browser rSm 'Dvdyfpmav; &dkufxnfh
&ygr,f/ www.google.com/advanced_search yg/ txufygtwdkif;
&dkufxnfhvdkufr,fqdk&ifawmh ckvdkrsdK; ay:vmygr,f/
yHkt& jrifuGif;u ao;aeygw,f/ 'gaMumifh aocsmjrifEdkifzdkYtwGufawmh
rdrdwdkY uGefysLwm&JU Browser (Firefox or Chrome) uae 0ifa&mufMunfhyg/
'Dae&mrSmawmh wpfydkif;csif;pDudk acgif;pOfwpfckpDtaeeJY azmfjyay;oGm;ygr,f/
yxrqHk; box u All These Words yg/ 'D field udk rdrd&SmazGvdkwJh t"du
pum;vHk;awGtwGuf toHk;jyKygw,f/ Oyrm - rdrdu Ethical Hacking vdkY
a&;vdkufr,f qdkygpdkY/ Ethical Hacking vdkY tpOfvdkufjzpfap? ethical wpfae&m
hacking wpfae&mjzpfap web page &JU rnfonfhtpdwftydkif;rSmrqdk awGYwmudk
azmfjyay;rSmjzpfygw,f/ wpfenf;ajym&&if 'g[m uRefawmfwdkY yHkrSef &Smaeus
twdkif;ygyJ/
Safe Search rSmawmh options ESpfck &SdjyD; show most relevant results u
yHkrSeftwdkif;jzpfjyD; filter explicit uawmh sexually explicit video awGeJY image
awGudk search result rSm a&mufrvmatmif filter vkyfay;ygw,f/
aemufxyf option wpfckjzpfwJh File Type uawmh &Sif;rjyawmhbl;aemf/
udk,f&SmazGvdkwJh zdkiftrsdK;tpm;tvdkuf a&G;p&mawG ay;xm;ygw,f/ yHkrSef search
rSm file type udk xnfh&Smcsifw,fqdk&ifawmh (Oyrm - pdf udk &Smr,fqdkygu)
filetype:pdf qdkjyD; xnfh&SmEdkifygw,f/
Social Media
'Dacgif;pOfav; awGYvdkufwmeJYwif uRefawmfwdkY tm&HkrSm bmudk
jrifa,mifrdygovJ/ Facebook udk jrifa,mifrdol trsm;qHk;jzpfMur,fvdkY ,HkMunfrd
ygw,f/ Social Media awG[m ,aeYacwfrSm vlawG&JU aeYpOfb0rSm
wpfpdwfwpfydkif;u yg0ifaeygw,f/ uRefawmfwdkY EdkifiHrSmawmh Facebook &
Instagram oHk;ol trsm;qHk;jzpfjyD; Twitter eJY Linked In oHk;ol tawmf
enf;ygao;w,f/ Fb vdk social media profile uae tcsdKUaom tcsufftvufawG
&,lEdkifovdk rdrdwdkY Target &JU 0goemudk cefYrSef;yHkazmfEdkifygw,f/
LinkedIn uawmh uRefawmfwdkYqDrSm oHk;ol enf;ao;ayr,fh
Organizational chart awG? email awGtjyif tjcm; Sensitive Information (e.g.
JD) awGudkyg &&SdEdkifwJh Social media wpfck jzpfygw,f/ txufyg Social Media
awG &Sdaejcif;uvnf; hacker awGtwGuf Social Engineering udk toHk;jyKzdkY
tcGifhtvrf;awG ydkrdkvmapygw,f/
Zone Transfer
nslookup vdk Program rsdK;udk toHk;jyKjyD; information tawmfrsm;rsm;udk
pkaqmif;&&SdEdkifovdk Zone transfer ukd oHk;jyD;vnf; information tawmfrsm;rsm;udk
pkaqmif;Edkifygao;w,f/ toHk;jyKwJh command yHkpHuawmh dig @[name server]
[domain] axfr jzpfygw,f/
[name server] ae&mrSm nslookup eJY &SmcJhwJh result u name server udk
xnfhoGif;Edkifygw,f/ [domain] uvnf; odjyD;om; jzpfwmrdkY tay: yHkav;rSm
Munfh&if erlemjyxm;wmudk awGYjrifEdkifygw,f/
Information Gathering Tools in Kali Linux
Introduction
Definition (Vocabulary)
'Dtcef;rSm yg0ifr,fh terms tcsdKUeJY ywfoufjyD; BudKwif azmfjy
xm;csifwmav;awGudk pkpnf;vdkufwmyg/ rodao;wJholawGtwGuf tqifajyap
zdkY jzpfygw,f/ wpfckcsif;pDyJ t&if MunfhoGm;&atmif/
Network Traffic
enf;vrf;rsdK;pHkeJY csdwfqufqufoG,fxm;wJh uGefysLwmpepfawGMum;u
electronic communication udk network traffic vdkY owfrSwfac:qdkEdkifygw,f/
Firewalls
network system wpfckudk umuG,fzdkYtwGuf toHk;jyKwJht&mvdkY
vlodrsm;wJh firewall &JU rlv t"dyÜg,fu rD;cHeH&H^rD;umeH&H jzpfygw,f/ computing
e,fy,frSmawmh firewall u network twGuf *dwfapmifh wpfOD;taeeJY vkyfaqmif
ay;ygw,f/ *dwfapmifh qdkwJhtwdkif; t0iftxGuf apmifhMunfhr,f/ access control
uae csrSwfxm;wJh criteria eJY udkufnDrI&SdwJh traffic udkom jzwfoef;cGifhjyKrSmjzpfjyD;
udkufnDrI r&SdwmawGudkawmh ydwfxm;rSmjzpfygw,f/ 'gaMumifh firewall [m
inbound traffic (ingress) eJY outbound traffic (egress) wdkYudk pdppfí vufcHjcif;
jiif;y,fjcif; pwmawG vkyfaqmifzdkYtwGuf port awGudk zGifh^ydwf vkyfEdkifygw,f/
Ports
Port qdkwmuawmh computer to computer communication twGuf
toHk;jyKwJh communication channel awGudk qdkvdkygw,f/ communication
twGuf toHk;jyKEdkifwJh TCP port 65,535 ports &SdjyD; UDP port aygif;uvnf;
63,535 ports &Sdygw,f/ port awG trsm;BuD; &Sdwmayr,fh wu,fwrf; wduswJh
vkyfaqmifcsuftwGuf owfrSwfvkyfaqmifEdkifwJh port tenf;i,fom &Sdygw,f/
olwdkYudkvnf; 'gtwGufyJvdkY uefYowfxm;wmawmh r[kwfygbl;/ Oyrm &Sif;jy&&if
TCP port 80 udk HTTP (Hyper Text Transfer Protocol) ESifhtwl normal web
traffic utilizing twGuf toHk;jyKavh&Sdayr,fh tjcm;aom traffic awGuvnf;yJ
port 80 udk jzwfoef;oGm;Edkifygw,f/
Port eJY ywfoufjyD; ydkem;vnfatmif ajym&&if BuD;rm;jyD;
tcef;aygif;rsm;pGm yg0ifwJh &Hk; taqmuftOD;BuD;wpfckudk jrifa,mifMunfhyg/
tcef;wdkif; tcef;wdkif;rSm wHcg;awG &SdMuovdk rwlnDwJh function awGudk
vkyfaqmif&wJh 0efxrf;awGvnf; tcef;wdkif;rSm &SdaeMuygw,f/ xdk&Hk;rSm web eJY
ywfoufwJht&mwdkif;udk suit 80 u udkifwG,fvkyfaqmifw,f qdkygpdkY/ tqdkyg suit
80 u tjcm;&Hk; wpf&Hk;odkY ajymif;a&TUoGm;onfjzpfap? wm0efajymif;vJoGm;onf
jzpfapaygh/ olY&JU rlvvkyfief;awGudk tjcm;wpfXmerSm vTJajymif;ay;tyfcJh&rSm
jzpfygw,f/ olY&JU hand over udk suit 8080 udk vTJtyfcJhw,f qdkygpdkY/ 8080 onf ol
vTJajymif;&,lvdkufwJh web ydkif;qdkif&mawGudk wm0ef,l vkyfaqmif&awmhrSmjzpf
ygw,f/
'DtajctaerSm 80 xH vma&mufolawG[m ydwfxm;wJh tcef; or
toHk;rjyKwJh tcef;tjzpfom jrifawGY&rSmjzpfjyD; web ydkif;qdkif&mudk qufvuf pHkprf;
Munfhr,fqdk&ifawmh 8080 rSm &&SdEdkifwmudk od&rSm jzpfovdk 80 rSm r&Edkifawmhbl;
qdkwmudkyg od&SdoGm;rSm jzpfygw,f/ 'gaMumifh 8080 eJY rSefuefwJh vdyfpmudk &&Sd
xm;olawGu web request xH rSefuefpGm a&muf&SdoGm;Edkifayr,fh 80 udkom
od&Sdxm;olawGtwGufawmh rSm;,Gif;wJh qufoG,frIaMumifh tcsdefydkMumjyD; tcuf
tcJawGudk &ifqdkif&Edkifygw,f/ 'gu jrifomatmif Oyrm av; azmfjyay;jcif;yg/
IP Protocols
Protocols qdkwm uGefysLwme,fy,frSma&m wu,fh real life rSma&m
rules udk udk,fpm;jyKygw,f/ oHwrefawG? EdkifiHa&;orm;awGeJY high-level office
awGrSm protocol issue udk udkifwG,fajz&Sif;zdkY txl;0efxrf;awG cefYxm;wwfMu
ygw,f/ message awGudk oifhawmf rSefuefpGm ay;ydkY vufcHEdkif&JUvm;? &mxl;
tqifhtvdkuf od&r,fht&mawGa&m rSefuef&JUvm; ponfudk protocol issue
twGuf cefYtyfxm;wJh tJonf 0efxrf;awGuyJ wm0ef,l BuD;Muyf&ygw,f/
uGefysLwme,fy,frSmvnf; xdkYtwlygyJ/ system awG Mum;rSm BudKwifowfrSwfxm;
wJh rules awGtwdkif; jzpfzdkY vkyfaqmif&ygw,f/
TCP
TCP qdkwmu Network communication twGuf toHk;jyKwJh main
protocol awGxJu wpfck jzpfygw,f/ connection-based communication
protocol wpfckjzpfvdkY communication channel wpfbufpDrSm &SdaeMuwJh
uGefysLwmawG&JU qufoG,frI session awGudk zGifhjyD; tcsuftvufawG ay;ydkY
vufcHEdkifzdkY pwmawGtwGuf toHk;jyKEdkifygw,f/
zkef;ajymwJh Oyrmav;eJY quf&atmif/ zkef;jrnfoHwpfck Mum;&jyD qdkygpdkY/
Mg Mg: "hello"
Caller: "Hi, udk armifarmif &Sdygovm;cifAsm/ udkarmifarmifeJY
pum;ajymcsifvdkYyg"
Mg Mg: " ckpum;ajymaewm armifarmifygAs"
txufyg zkef;ajymjcif; Oyrmudk Munfh&if TCP &JU Three ways
hand-shake eJY qifwlwmudk awGY&ygr,f/ TCP communication rSm uGefysLwm
wpfvHk;eJYwpfvHk; csdwfqufpOf yxrqHk; communication pwifpOfrSm packet
exchange oHk;ck jzpfay:ygw,f/
yxrqHk;taeeJY PC-A u PC-B xH reliable connection wpfck
wnfaqmufvdkaMumif; SYN packet awG ay;ydkYtaMumif;Mum;ygw,f/ PC-B
uvnf; PC-A xH acknowledgment & synchronization ESpfckvHk; xnfhoGif;jyD;
(SYN/ACK) response jyefygw,f/ acknowledgment &JU &nf&G,fcsufu source
u ay;ydkYwJh SYN packet udk vufcH &&SdwJhtaMumif;? connection wnfaqmufzdkY
twGuf destination &JU SYN flag udk vufcHaMumif; jyefMum;zdkYtwGuf jzpfygw,f/
xdk TCP packet udkawmh SYN/ACK vdkY ac:qdkoHk;EIef;ygw,f/ wwd,taeeJY
PC-A u SYN/ACK udk vufcH&&SdwJhtcg ACK flag udk TCP header xJrSm
xnfhoGif;jyD; ACK packet udk ay;ydkY taMumif;jyeftjyD;rSmawmh connection wpfck
wnfaqmufjyD; jzpfjyDrdkY qufoG,fvdkY &jyD jzpfygw,f/
UDP
'D UDP uawmh TCP vdk reliable rjzpfwJh connection protocol
wpfrsdK;yg/ tao;pdwfawmh razmfjyawmhyg/
erlem vkyfMunfhaygh/
Traceroute
destination qDodkY oGm;a&mufvm vrf;wpfavQmuf&Sd routers' IP address
awGudk list vkyfay;wJh tool wpfcku traceroute yg/ traceroute pm ICMP's Ping
command udk toHk;jyKygw,f/ windows rSm oHk;wJh Traceroute command u
tracert jzpfygw,f/
nmap udk default twdkif;yJ oHk;&if stealth scan tjzpf scan zwfygw,f/
option awGeJY toHk;jyKyHkawGudk Munfhcsif&ifawmh xHk;pHtwdkif;yJ manual
(#man nmap) eJY help option (#nmap -h <or> nmap --help) eJY Munfh&IEdkifygw,f/
-sS Stealth Scan
stealth scan -sS u nmap &JU default scan option jzpfw,fqdkwm azmfjy
cJhjyD;ygjyD/ olu target eJY ywfoufjyD; TCP connection wpfckudk
pwifvkyfaqmifEdkifygw,f 'gayr,fh three-ways handshake udkawmh jynfhpHkatmif
aqmif&GufEdkifjcif; r&Sdygbl;/
'guawmh website
wpfck&JU IP address udk erlem &Smjyxm;wm
jzpfygw,f/ UDP ports ESpfckawGY&rSmjzpfjyD; closed jzpfaewmudk awGY&rSmyg/
T0 to T5 (summary)
T0 udk paranoid vdkY ac:ygw,f/ ydkjyD; xda&mufrI&Sdayr,fh tcsdefawG
t&rf; MumjrifhrSmjzpfvdkY stealth vdktyfwJhtcgrSmjzpfap? tcsdefat;at;aq;aq;
&wJhtajctaerSmjzpfap toHk;jyKEdkifygw,f/
-T0 or --timing paranoid vdkY toHk;jyKEdkifygw,f/ tay:rSm ESpfrsdK;vHk;
erlem jyxm;ygw,fAs/ prf;MunfhMuyg/ xl;jcm;rIawGudk apmifhMunfhyg/ rSwfom;yg/
ydkjyD; uGJjym;pGm awGYjrifvm&ygvdrfhr,f/ tcsdefawmh ay;&r,f/ pdwf&Snf&r,fAs/
T1
jyD;awmh T2 aygh/ T1 xuf ydkjrefygw,f/ T2 udk polite vdkY
ac:Muygw,f/
Selecting Ports
port awGudka&G;cs,f scan zwfwJhtaMumif; aqG;aEG;cJhygw,f/ 'gaMumifh
'Dae&mrSm trsm;BuD; xnfh raqG;aEG;awmhygbl;/ olYudk atmufyg yHkpHrsdK;awGeJY
oHk;Edkifygw,f/
-p 1-100 u port 1 uae 100 xdtwGif; zwfr,f/ -p 1,21,... ponfjzifh
('kwd,yHk)uawmh a&G;cs,fjyxm;wJh port awGudkyJ scan r,faygh/ aemufqHk;wpfck
-p 1-100,137,161,162 uawmh port 1 uae 100 tjyif 100 ausmfwJhxJuqdk
137,161,162 udkyg xnfhzwfr,fvdkY qdkvdkjcif; jzpfygw,f/ txufyg oHk;rsdK;xJu
a&G;cs,foHk;Edkifygw,f/ eHygwfawGuawmh Oyrm ay;jcif;oufoufom/
Output Options
a&SUrSmvnf; output option taMumif; enf;enf;av; ajymjyD;ygjyD/
ckawmh options av;cktaMumif;udk wpfckpD aqG;aEG;&atmif/ yxrqHk; -oN u
normal output yg/ other program awGrSm result jyef,loHk;EdkifzdkY output file taeeJY
odrf;qnf;Edkifygw,f/ Oyrm - test vdkY emrnfeJY odrf;r,fqdkygawmh/
HPING3
Hping qdkwm manually craft packets awGudk network ay:rSm
xm;&SdEdkifzdkYtwGuf toHk;jyKwJh application wpfck jzpfygw,f/ 'D manual precess
[m nmap engine u packet awGudk tvdktavsmuf zefwD;yHkrsdK;eJY qifwlygw,f/
Hping3 udk -S flag eJY wGJoHk;avh&Sdygw,f/
Settings
rSm tqifajy&mjznfh Plugins awGjznfhjyD; save vdkufygu Scan
vkyf&eftajctaewpfck toifh jyKvkyfjyD; jzpfygjyD/
nmbuftpGefrSm&SdwJh > oauFwav;udk ESdyfjyD; launch vkyfygu
a&G;cs,fxm;cJhwmawGudk scan pwifwmudk awGY&ygr,f/ scan vkyfwmu udk,fh
target awGay:rlwnfjyD; tcsdefMumygr,f/
Types of Scanning
uRefawmfwdkYtaeeJY hacking &JU phase 2 onf Scanning
jzpfw,fqdkwmudk od&SdjyD;ygjyD/ vufawGYvkyfaqmifcJh&mrSm uRefawmfwdkYtaeeJY
owdxm;rdEdkifwm&Sdygw,f/ tJ'guawmh network eJY port qdkjyD; jzpfygw,f/
tJonfawmh uRefawmfwdkYawG scan zwfw,fajymMuw,f/ bmawGudk scan vJvdkY
ar;&if cGJjcm;ajzp&m tajz ESpfck &Sdygw,f/ tJ'gu types of scanning ygyJ/
Scanning jyKvkyfwJhae&mrSm Network Scanning eJY Port Scanning qdkjyD; yHkpH ESpfrsdK;
cGJjyD; jrifMunfhEdkifygw,f/ wpfckcsiff;pD azmfjyaqG;aEG;oGm;ygr,f/
hacker wpfa,muftaeeJY network system wpfckudk
xGif;azmuf0ifa&mufEdkifzdkY BudK;pm;w,fqdkygpdkY/ private network xJrSm b,f
system & service awG run aew,fqdkwmawG? IP address awG? toHk;jyKaewJh OS
awG pwJh tajccHtcsuftvufawG r&SdygbJvsufawmh b,fvdk information
rsdK;ukdrQ hack ,lEdkifrSmr[kwfygbl;/
'DtajctaerSm scanning &JU tcef;u@u ta&;ygvmygawmhw,f/
scanning jyKvkyfrIay: rlwnfjyD; network scanning eJY port scanning vdkY
cGJjcm;owfrSwfEdkifayr,fh ESpfckvHk;onf ta&;ygwJhtydkif;awGcsnf;om jzpfygw,f/
Network Scanning
Scanning vkyf&mrSm Network Scanning & Port Scanning qdkjyD; ESpfrsdK;
&SdwJhteuf yxrwpfcku Network Scanning yg/ network scanning vdkY jcHKiHkajym
ayr,fh trsm;pku private network scanning udkom vkyfaqmifMuygw,f/
technique trsm;pkudk internally scan jyKvkyfEdkifzdkYtwGuf zefwD;xm;wmjzpfjyD;
tenf;pkuomvsif public network awGudkyg scan vkyfEdkifum reliable result udk
&&SdEdkifygw,f/
aumif;jyD/ 'gqdk hacker awGu uRefawmfwdkY&JU internal network awGudk
b,fvdk scan MuygovJ/ xdk tenf;i,faom tool awGudk toHk;jyKjyD; uRefawmfwdkY
&JU public IP address awGudk scan Muygw,f/ jyD;awmh uRefawmfwdkY&JU umuG,fa&;
(defenses) pepfawGudk ausmfjzwfEdkifapzdkYtwGuf tm;enf;csufawGudk
&SmazGygw,f/
txufrSmvnf;yJ scan jyKvkyfenf;awGudk aqG;aEG;cJhygw,f/ ckawmh
tay:rSm raqG;aEG;&ao;wJh scanning tool wpfckeJY qufvuf jznfhpGuf
aqG;aEG;&atmif/ bm tool vJqdkawmh ICMP udk toHk;jyKxm;wJh Angry IP
Scanner yg/ angryip.org/download vdkY Browser rSm&dkufxnfhjyD;
a'gif;,lEdkifygw,f/ oluawmh Linux, Mac, Windows awGrSm toHk;jyKEdkifygw,f/
cke vdyfpmuae oGm;wJhtcg windows, Mac & Linux qdkjyD; a&G;p&m
oHk;ckxJurS uRefawmfuawmh Kali Linux udk toHk;jyKrSmjzpfvdkY Linux udkyJ
a&G;cs,fvdkufygw,f/
Introduction to Exploitation
Remote Exploit
Computer, network device, mobile phone or service pwmawGudk
network/ Operating System &JU jyifyuae jyKvkyfEdkifaom exploit rsdK;udk remote
exploit vdkY ac:qdkygw,f/ tcsdKUu network exploit vdkYvnf; ac:Muygao;w,f/
b,fvdkac:ac:yg/ ta&;BuD;wmu local exploit r[kwf&if remote exploit
jzpfw,fqdkwmygyJ/ remote exploit [m computers, servers eJY network
equipment awGudkomru web services & applications, databases, printers,
mobile phones pwJh network eJY csdwfquf vkyfaqmifxm;wJh t&m&mwdkif;xd
exploit vkyfavh&Sdygw,f/ remote exploit awGudk &SmazGMunfhvdkygu
atmufygtwdkif; &SmMunfhEdkifygao;w,f/
Metasploit
Metasploit qdkwmudkawmh hacking avhvmr,fholawGtwGuf rpdrf;wJh
pum;vHk;wpfvHk; jzpfygw,f/ metasploit [m pen-tester awG&JU powerful tool
tjzpf wnf&Sdaeygw,f/ Metasploit twGuf tus,fazmfjy&if pmtkyf
wpftkyfpmxuf rsm;pGm ausmfvGefoGm;Edkifygw,f/ 'gaMumifh vdk&if;av;awGyJ
ajymyg&ap/
Metasploit pro eJY Metasploit free qdkjyD; Version ESpfrsdK; vmovdk
security team awGeJY Government agency awGuawmh reporting, group
collaboration, compliancy checking, advanced wizards for precision & control
awG yg0ifwJh pro version udk 0,f,ltoHk;jyKavh&SdMuygw,f/ Exploit Module
awGu twlwlyJjzpfwmaMumifh omref toHk;jyKr,fh uRefawmfwdkYtwGufawmh
0,foHk;p&m rvdkygbl;/ :)
olY&JU framework av;udk Munfh&atmif/ olYrSm t"dutm;jzifh modules
type 5ck yg0ifygw,f/
1. Exploit Modules
2. Auxiliary Modules
3. Payloads
4. Listeners
5. Shell code
qdkjyD; jzpfygw,f/ Armitage vdk category awGudkyg xnfhoGif;jyD; 6th
Categories vdkYvnf; ajymMuygao;w,f/ aemuf Metasploit Chapter a&mufrS
qufvuf aqG;aEG;oGm;ygr,f/ ckuawmh Overview taeeJYom aqG;aEG;cJhjcif;yg/
What is IP Address?
Why do people want to know our IP address and who know our IPs?
ar;cGef;&JU yxrdkif;udk t&ifajzygw,f/ uRefawmfwdkY&JU public IP address
udk odvdkMuwJh taMumif;t&mawGxJu trsm;pkuawmh uRefawmfwdkY&JU location
udk odcsifwmaMumifhygyJ/ OyrmtaeeJYajym&&if ypönf;a&mufrS aiGay;acs&wJh
online shop BuD;awGrSmqdk&if (r&dk;ajzmifhwJholawGu wrif npfavh&SdwmaMumifh)
location odzdkYu ta&;ygvmygw,f/ ydkjyD; em;vnfatmif ajym&&if MDY uyg
qdkjyD; rSm,laewJh customer wpfa,mufu IP location rSm MDY r[kwfbJ YGN
jzpfaew,fqdkygpdkY/ 'gqdk 'g[m vdrfnmjcif;wpfrsdK;om jzpfwmrdkY 'D customer onf
&dk;ajzmifhrIr&Sdbl;qdkwm odEdkifygw,f/ aemufwpfcku vdyfpmyg/
a&SUrSm erlem jycJhjyD;jyDaemf/ IP lookup rSm Location udk teD;uyfqHk;
jrifawGYEdkifw,fqdkwm/ (jrefrmEdkifiHrSmawmh jrdKUBuD;awGavmufyJ vrf;awG
rSefuefygao;w,f/ jrdKUi,fawGrSmawmh vrf;emrnfawG rrSefao;ovdk
rygao;wJhvrf;awGvnf; jrdKUBuD;awGrSmawmif &Sdwwfygw,f/)
ar;cGef;&JU 'kwd,ydkif;u b,folawGu uRefawmfwdkY&JU IP address udk
odaeEdkifvJqdkwm jzpfygw,f/ IP address rSm tydkif; ESpfydkif; yg0ifwmrdkYvdkY
wpfydkif;pD azmfjyygr,f/ Private IP (local IP address) udkawmh same network udk
toHk;jyKaewJh user awGxJu (IP address)awG taMumif; od&SdolawGom odEdkifyg
w,f/ tjcm;olawGu oifh&JU Private IP address udk odzdkY rvG,fulyg/ 'gaMumifh
Same Network Access udk &,lEdkifzdkY BudK;pm;Muwm jzpfygw,f/ tu,fírsm;
oifh&JU target u Public Wifi awGudk oHk;avh&Sdolqdk&ifawmh oifhtwGuf same
network access &&SdzdkYu cufcJrSm r[kwfawmhygbl;/
Public IP address udkawmh od&SdaeEdkifolawG rsm;pGm &SdMuygw,f/ Oyrm
oifhtaeeJY pmwkdufuae pmwpfapmif xnfhr,fqdkygawmh/ oifhqD
jyefpma&mufEdkifzdkYtwGuf oifhvdyfpmudk jyefxnfhay;&rSmjzpfygw,f/
'Doabmtwdkif;ygyJ/ website wpfckuae taMumif;t&mwpfckudk oif
zGifhMunfhwJhtcg tqdkyg website xH oifMunfhvdkwJhtaMumif;t&mudk request
jyKvkyfygw,f/ xdk site uae oifh&JU public IP twdkif; jyefvnfay;ydkYvmwJh
tcsuftvufudk oif jyefvnf vufcH&&SdrSmjzpfygw,f/ 'gaMumifh oif toHk;jyKwJh
website wdkif;onf oifh&JU IP address udk odaeEdkifygw,f/
aemuf oifh&JU public IP udk tjrJwrf; odaeEdkifrSmu oiftoHk;jyKaewJh
ISP yg/ Oyrm oifu zkef;u'feJYom toHk;jyKolqdk&if oifh&JU ISP u (MPT,
Telenor, Ooredoo, MEC,...) pwmawGaygh/ olwdkYyJodrSmvm;qdk&ifawmh
r[kwfao;ygbl;/ Oyrm - oifu tjcm;ol&JU gmail (or) Facebook account
wpfckckudk forget password uaewpfqifh recovery vkyfzdkY BudK;pm;wJhtcgrSm
vnf;yJ oifh&JU IP address u tqdkyg Account ydkif&SifxH report taeeJY
a&muf&SdoGm;rSmjzpfygw,f/
'gawGtjyif oifhuGefysLwmudk iSm;oHk;wJhtcgrSmjzpfap? uRefawmfwdkY&JU
network udk tjcm;wpfpHkwpfa,mufudk toHk;jyKcGifh ay;wJhtcgrSmjzpfap? oHk;aeus
Facebook wdkYvdk social media awG&JU admin awGu jzpfap? IP tracking
vkyfEdkifzdkYtwGuf zefwD;xm;wJh Link awGudk ESdyfrdjcif;ujzpfap? pwJhtcsufawG
uaevnf; oifh&JU Public IP address udk od&SdapEdkifygw,f/
Static Vs Dynamic IP addresses
'Dcgawmh Static eJY Dynamic IP address awGtaMumif; tenf;i,f
aqG;aEG;ygr,f/ tm;vHk;odwJhtwdkif;ygyJ/ Static IP u udef;aojzpfygw,f/
ajymif;vJrI r&SdwmaMumifh Public IP address rSm Static IP address qdk&ifawmh
tawmfhudk raumif;wJht&mygyJ/ Dynamic IP address uawmh wpfBudrfeJYwpfBudrf
tvSnfhus ajymif;vJaewmaMumifh yxrwpfBudrf tifwmeufzGifhcsdefeJY
aemufwpfBudrf zGifhoHk;wJhtcsdefrSm IP class csif; wlwmuvGJ&if IP address onf
vHk;0 ajymif;vJoGm;rSmjzpfygw,f/ 'gaMumifh zkef;eJYoHk;olawGqdk&if zkef;udk restart
jyKvkyfvdkufvsifjzpfap? tifwmeufvdkif; ydwfxm;jyD;aemuf jyefzGifhwJhtcgrSmjzpfap
whatismyipaddress.com rSm oGm;Munfh&if ajymif;vJaewmudk
awGYjrif&rSmjzpfygw,f/ rsm;aomtm;jzifhawmh ISP awG[m Dynamic IP address
udk toHk;jyKavh&SdMuygw,f/
'gaMumifh oifhtaeeJY Public IP address udk tjref ajymif;vJvdkygu
zkef;udk reboot vkyfvdkuf&HkygyJ/ jyefyGifhvmwmeJY oifh&JU Public IP address u
ajymif;vJaewmudk awGY&ygr,f/ Static IP address udkawmh Local Address jzpfwJh
Private IP address awGrSm awGY&wwfygw,f/ olwdkYuawmh 'D Network
xJrSm&SdaeorSs 'Dpufu 'DeHygwftwdkif;ygyJ/ tjcm; network rSm ajymif;oHk;rSom
ajymif;rSmjzpfygw,f/
Network Types
toHk;jyKrI {&d,may: rlwnfjyD; network type oHk;rsdK;&Sdygw,f/
odjyD;olawGu ydkrsm;r,fxifygw,f/ 'gaMumifh rodao;ol tenf;i,ftwGuf
tusOf;csKyfuav; aqG;aEG;ay;oGm;ygr,f/
1.LAN (Local Area Network)
&Hk;? ausmif; eJY university awG? Super-market vdk ae&mawGrSm
uGefysLwmawG tcsif;csif; csdwfquftoHk;jyKwJh computer network trsdK;tpm;
wpfckjzpfygw,f/ Limited area twGif;om toHk;jyKEdkifygw,f/ Cable awG? wifi
awGudk toHk;jyKcsdwfqufEdkifjyD; tifwmeuf rvdktyfbJ tcsuftvufawGudk
rQa0Edkifygw,ff/ (internal Only) yg/
What do we Attack/hack
Hacking jyKvkyfwJhtcgrSm uRefawmfwdkYtaeeJY target xm;MuwmawGudk
jyefMunfhwJhtcg Phishing jyKvkyfjcif;rsdK;? access stealing jyKvkyfjcif;rsdK; pwmawGeJY
cdk;,lEdkifzdkY BudK;pm;avh&SdMuwJh Accounts (e.g. gmail, facebook, ...) qdkif&m? web
(sites & application) qdkif&m? System udk csdK;azmufjyD; information
0ifa&muf&,lwJh System qdkif&m ponfjzifh t"dutydkif;awGudk
cGJjcm;jrifawGY&rSmjzpfygw,f/ 'gaMumifh aemufydkif; Chapter awGrSm Exploit &
Attacks awGudk qufvufazmfjyay;oGm;rSmjzpfygw,f/ odrSwfxm;&rSmu
Exploitation acgif;pOfatmufrSmr[kwfayr,fh olwdkYawGvnf; exploitation
awGygyJ qdkwmyg/ tm;vHk; tqifajyMuvdrfhr,fvdkY arQmfvifhygw,fcifAs/
CHAPTER 12: Social Engineering & Toolkit
Introduction
&vmwJh Link udk copy ,ljyD; same network rSm twloHk;aewJh tjcm;
user (my victim) xH ydkYvdkufygw,f/ Viction u zGifhvdkufjyDqdk&ifawmh
1) Social-Engineering Attacks
tay:rSm erlemtaeeJY Attack wpfckudk wpfqifhpD azmfjyay;jyD;oGm;jyD
jzpfvdkY vdkufvHvkyfaqmifMunfhygu em;vnfvdrfhr,fvdkY ,lqygw,f/
tqifhav;awGudk em;vnfoGm;jyDqdk&ifawmh Menu wpfckcsif;pD avhvmzdkYtwGuf
rcufawmhygbl;/ ck yxrqHk; Menu udk avhvm&atmifyg/
Social-Engineering Attacks xJudk 0ifa&mufvdkufyg/
Conclusion
'Dtcef;rSmawmh odoifhwJh tajccHuswJh tcsufuav;awGudk
jcHKiHkrdatmif azmfjyaqG;aEG;cJhygw,f/ Setoolkit wpfckvHk;udk wpfckrusef
azmfjyaqG;aEG;zdkYqdk&ifawmh oD;oefY pmtkyfpmtkyfBuD;wpftkyfpm jzpfaer,fqdkwm
menu awGudk Munfh&ifyif odEdkifygw,f/
'gaMumifh setoolkit xJu tjcm;aom taMumif;t&mawGudkvnf;
rdrdwdkYbmom qufvuf prf;oHk;MunfhEdkifr,fvdkY ,lq&if; 'Dae&mrSm
&yfem;yg&apcifAsm/ Setoolkit \ usef&Sdonfh toHk;jyKyHkrsm;udk Facebook Group
wGif qufvuf azmfjyay;oGm;rSmjzpfvdkY 'DpmtkyfrSmygwJh Member Form udk
jznfhpGufjyD; ay;ydkYvdkuf&HkeJY Facebook Group Member tjzpf qufvuf
avhvmEdkifOD;rSjzpfygw,fcifAsm/
CHAPTER 13: Authentication System
Introduction
Authentication Protocols
Security & Usage rwlnDwJh authentication protocol rsm;pGmudk
ESpfaygif;rsm;pGmtwGif;rSm toHk;jyKcJhMuygw,f/ Oyrmajym&&if corporate network
wpfckudk wpfae&muae connect vkyfEdkifzdkYtwGuf PPP vdkYac:wJh Point-to-Point
Protocol udk toHk;jyKcJhMuygw,f/ PPP rSm user udk authenticate vkyfEdkifzdkYtwGuf
PAP eJY tjcm;enf;vrf;awGudk toHk;jyKMuygw,f/ PAP qdkwmuawmh Password
Authentication Protocol jzpfygw,f/ vHkjcHKa&; tm;enf;wmaMumifh
roHk;oifhygbl;/
PAP tpm; CHAP udk toHk;jyKEdkifygw,f/ Challenge-Handshake
Authentication Protocol (CHAP) [m Client a&m Server a&m ESpfbufvHk;rSm
vQdKU0SufjyD; sharing jyKvkyfay;ygw,f/ xdk secret udk tifwmeufay: transmit
vkyfrSmr[kwfygbl;/ MS-CHAP uawmh CHAP udkyJ Microsoft uae rGrf;rHzefwD;
xm;wm jzpfygw,f/ Client a&m Server uae Secret key awGudk
odp&mrvdkawmhwJh enf;yg/
CHAP Vs MS-CHAP
a&SUrSm aqG;aEG;cJhovdkygyJ/ CHAP rSmu Client a&m Server a&m
ESpfbufvHk;rSm Secret key udk odaezdkY vdktyfygw,f/ client & server Mum; link
wpfck csdwfqufqufoG,fjyD; yxrtqifhtaeeJY server u challenge key wpfck
zefwD;ay;ydkYygw,f/ client u One-Way hash function udk oHk;jyD; key awGudk
share ygw,f/ jyD;awmh Server qD jyefydkYay;ygw,f/ server uvnf; same hash
algorithm udkoHk;jyD; challenge hash value eJY shared key udk wGufcsufygw,f/
response ESpfckudk EIdif;,SOfjyD; match jzpf&if authentication udk grant
ay;vdkufygw,f/ match rjzpf&ifawmh ay;r0ifawmhbl;aygh/
MS-CHAP udkawmh Windows uGefysLwmawGMum; wpfae&mpDuae
csdwfqufEdkifatmifvdkY Microsoft uae zefwD;xm;cJhwmjzpfygw,f/ MS-CHAP eYJU
&dk;&dk; CHAP Mum;rSm uGmjcm;rIawG &Sdygw,f/ MS-CHAP rSm plain-text (or)
password awGudk odkavSmifzdkY authenticator rvdktyfawmhygbl;/ MS-CHAP onf
Authenticator-controlled authentication retry eJY password changing
mechanism wdkYudkyg axmufyHhay;xm;ygw,f/
MS-CHAP &JU 'kwd, version udk January, 2000 rSm xkwfoHk;cJhygw,f/
mutual authentication udk vkyfaqmifEdkifvmwmrdkY client & server ESpfbufvHk;u
wpfbufeJYwpfbuf tjyeftvSef authenticate vkyfEdkifvmygw,f/ Authentication
server uae verificcation request udk client xH ay;ydkYygw,f/ client u user
name eJY response vkyf&ygw,f/ Secure Hash Algorithm (SHA) onf &vmwJh
challenge string udk hash jyKvkyf&ygw,f/ Authentication server onf Client &JU
response udk ppfaq;jyD; success (or) failure jzpfaMumif; notification
jyefydkYay;&ygw,f/
NTLM
NTLMv1 udk Windows NT 4.0 eJY a&SUydkif; version awGrSm oHk;cJhygw,f/
LM eJY NT udk hashing algorithm tjzpf oHk;xm;wmaMumifh tawmfhudk vHkjcHKa&;
tm;enf;ygw,f/ NTLMv2 uawmh ydkrdkvHkjcHKrI&SdvmjyD; ,aeYxd oHk;aeqJ
jzpfygw,f/ NTv2 eJY LMv3 hashing tjyif RC4 cipher udkyg oHk;xm;wmaMumifh
NTLMv1 xuf tqaygif;rsm;pGm vHkjcHKrIydkoGm;wm jzpfygw,f/ NTLM
Authentication u atmufygtwdkif; vkyfaqmifygw,f/
1/ user onf client computer uae domain name, user name eJY password awG
jznfhoGif;&ygw,f/ tJvdk jznfhoGif;wJhae&mrSm actual password udk y,fzsufvdkufjyD;
cryptographic hash tjzpf ajymif;vJvdkufygw,f/
2/ client onf user name udk plain-text tjzpf server xH ay;ydkYygw,f/
3/ server u challenge vdkYac:wJh 64byte random number udk xkwfjyD; client xH
ay;ydkYygw,f/
4/ client u server &JU password hash awGeJYtwl challenge udk encrypt vkyfjyD;
server xH jyefydkYygw,f/ 'gudk response vdkY owfrSwfygw,f/
5/ server onf user name &,f? client xH ay;ydkYvdkufwJh challenge &,f? client
qDu jyefvmwJh response &,f (3ckvHk;)udk domain controller xH
ay;ydkY&jyefygw,f/
6/ Domain controller onf SAM (Security Account Manager) xHrS user &JU
password hash awGudk user name eJY wdkufqdkif&SmazGjyef,lvmjyD; challenge udk
encrypt vkyfzdkYtwGuf xdk hash awGudk toHk;jyK&ygw,f/
7/ Domain controller uyJ Step 6 rSm &vmwJh encrypted challenge eJY step 4 rSm
&vmwJh response udk EIdif;,SOf&ygw,f/ wpfxyfwnf;usw,fqdk&ifawmh
Authentication onf successful jzpfjyD jzpfygw,f/
Microsoft &JU MS-CHAP onf vHkjcHKrI&Sdonfqdkaomfjim;vnf; smart
card awG PEAP awGavmufawmh vHkjcHKrI ray;Edkifygbl;/ 'DtaMumif;awGudkawmh
csefcJhvdkufyg&ap/ pmt&rf;&SnfrSmpdk;wmaMumifhyg/
'Dtcef;rSm aqG;aEG;wmawGu pmawGcsnf;yJrdkY ysif;aejyDvm;/
'DtcsufawGeJY cryptography udk rodrjzpf od&SdzdkY vdktyfvdkY 'Dtcef;awGudk
xnfhoGif;ay;xm;&jcif; jzpfygw,f/ uRefawmfwdkYtaeeJY pwif avhvmp rSm
'gawGudk rodbJawmh 'DhxufykdrdkomvGefwJhtqifhudk a&mufEdkifzdkY rvG,fygbl;/
Hacker/Pen-tester wpfa,muf&JU txl;vdktyfwJht&nftcsif;u pdwf&Snfonf;cH
Edkifjcif;yJ jzpfygw,f/ uRefawmfwdkYtm;vHk; 'Dtqifhav;awGudk pdwf&Snf&Snfav;
xm;jyD; pmtkyfausmfrvSefrdzdkY BudK;pm;Mu&atmifcifAs/
Triple A (AAA)
AAA udkawmh uRefawmfwdkY Mum;zl;aumif; Mum;zl;Muygvdrfhr,f/
Authentication, Authorization & Accounting qdkjyD;awmh jzpfygw,f/ security
network wpfcktwGuf AAA onf r&Sdrjzpf vdktyfcsufwpfckyg/ uRefawmfwdkY
'Drwdkifcif authentication protocol awGtaMumif; tenf;i,f aqG;aEG;cJh
Muygw,f/ 'gawG[m A wpfvHk;yJ &Sdygao;w,f/
Authentication qdkwJh A yg/ AAA udk wjydKifeufwnf; vkyfaqmif
Edkifwmawmh &Sdygw,f/ RADIUS yg/ Remote Authentication Dial-in User
Service system (RADIUS) uawmh user &JU action awGay:authenticate,
authorize & audit awGudk vkyfaqmifEdkifygw,f/ Microsoft wdkYvdkY vendor
rsm;pGmu implement vkyfxm;wmjzpfjyD; authentication message awGtwGuf
UDP port 1812 eJY Accounting twGuf UDP port 1813 wdkYudk toHk;jyK
xm;ygw,f/ older version awGrSmawmh UDP port 1645 eJY 1646 wdkYudk toHk;jyK
xm;ygw,f/
RADIUS vdk wlnDpGmvkyfaqmifEdkifwJh tjcm; system awGvnf;
&Sdaeygao;w,f/ Terminal Acccess Controller Acccess-Control System
awGaygh/ TACAS wdkY? TACACS+ wdkYeJY Cisco urGrf;rHxm;wJh XTACACS wdkY
ponfjzifh rsm;pGm usef&Sdygao;w,f/
pmawGcsnf; zwfae&vdkY ysif;roGm;ygeJYcifAs/ tajccH odrS jzpfrSmawGudk
xnfhoGif;aqG;aEG;xm;rSom oufqdkif&m u@awGrSm ydkjyD; em;vnfEdkifrSmrdkY
jzpfygw,f/ oabmw&m;awGqdkwm azmuf0if&r,fh vrf;aMumif;twGuf t"du
tcGifhtvrf;jzpfwmrdkY oabmw&m;awGudk em;vnfxm;avav ydkrdkaumif;rGef
avav jzpfygaMumif; aqG;aEG;&if;eJY aemufwpfcef;rSm jyefvnf
qHkawGY&atmifcifAsm/
CHAPTER 14: Wireless Network & Wifi Hacking
Introduction
Aircrack Suite
aircrack-ng onf wireless network auditing twGuf aumif;rGefwJh
tool wpfckjzpfjyD; 802.11, WEP eJY WPA-PSK key awGudk cracking jyKvkyfwJh
program wpfcktjzpf toHk;jyKEdkifygw,f/ aircrack-ng rSm wireless connectivity
udk attack vkyfEdkifzdkYtwGuf tool awG yg0ifaeygao;w,f/
airbase-ng onf client udka&m AP udkyg attack vkyfEdkifzdkYtwGuf
toHk;jyKwJh multipurpose tool wpfckjzpfygw,f/ aircrack-ng uawmh 802.11,
WEP eJY WPA-PSK key awGudk cracking jyKvkyfwJh program wpfckjzpfygw,f/
airdecap-ng u WEP/WPA/WPA2 capture file awGudk decrypt
jyKvkyfay;ygw,f/ airdrop-ng uawmh rule-based wireless authentication tool
wpfckjzpfjyD; aireplay-ng uawmh wireless frame awGudk inject & replay
jyKvkyfEdkifygw,f/ airmon-ng uawmh wireless interface udk monitor mode tjzpf
ajymif;ay;wmeJY monitor mode udk disable jyefvkyfay;wmawGudk jyKvkyfay;
Edkifygw,f/ airodump-ng uawmh raw 802.11 frame awGudk capture
jyKvkyfay;Edkifygw,f/ 'gawGu aircrack-ng rSm yg0ifwJh tool awGudk tusOf;csKyf
rdwfqufay;wmjzpfjyD; 'gawGudk odrSwfxm;zdkY vdktyfygw,f/
WEP pepfwpfckudk crack MunfhzdkYtwGuf aircrack-ng suite xJu tool
tajrmuftrsm; vdktyfygw,f/ Oyrmt&ifxkwfajymxm;ygr,f/ tcsdKUudk
rSwfxm;zdkY vdktyfygw,f/ (rSwfxm;&rSmu 'gu wpfqifhpDudk &Sif;jyjcif;om
jzpfygw,f/ jyD;&if wpfckpD&JU vufawGYudk xyfazmfjyOD;rSmyg/ 'Dtqifhu
ta&;BuD;ygw,f/)
WEP Cracking
'Dcgawmh WEP wifi security system udk Crack Munfh&atmifyg/
Introduction
Countermeasures
Attacker awGonf Banner grabbing technique udk toHk;jyKjyD;awmh
uRefawmfwdkY&JU device type, OS, application & version, ... pwJh
tcsuftvufawGudk &SmazGzdkY BudK;pm;Muygw,f/ pkaqmif;&&SdwJh tcsuftvufawG
ay: rlwnfjyD; uRefawmfwdkY&JU system udk known exploit awGeJY wdkufcdkufvm
Edkifygw,f/ known exploit awG[m vulnerability udk fix vkyfEdkifzdkYtwGuf
xkwfay;xm;wJh patch file awGudk oHk;rxm;wJh system awGudk wdkufcdkufEdkifqJ
jzpfygw,f/
'gaMumifh BudKwifumuG,fwJhtaeeJY uRefawmfwdkY&JU web awGrSm banner
awGudk vGJrSm;azmfjyxm;Edkifovdk vulnerability fix jzpfwJh patch solution
awGudkvnf; yHkrSef vkyfaqmifoifhygw,f/ 'ghjyif Hacker awG[m vulnerable port
awGudkvnf; &SmazGwdkufcdkuf wwfwmaMumifh rdrdwdkY&JU website awG (web server)
awGrSm r&Sdrjzpf vdktyfwJh port awGuvGJ&if usefwmawGudk ydwfxm;oifhygw,f/
aemufjyD; file extension awGuvnf; server technology eJY ywfoufwJh
information awGudk ay;Edkifygw,f/ 'gaMumifh file extension awGudk hide
xm;jcif;[mvnf; aumif;rGefwJh vkyfaqmifcsuf jzpfygw,f/ .asp udk .htm eJY
tpm;xdk; toHk;jyKjcif; (odkYr[kwf) server udk identify vkyfEdkifwmawGudk
vrf;vTJxm;jcif; pwmawGudkvnf; vkyfaqmifEdkifygao;w,f/ Apache user
awGtaeeJYuawmh mod_negotiation directives awGudk toHk;jyKEdkifjyD; IIS user
awGuawmh PageXchanger vdk tool awGudk oHk;jyD; file extension awGudk manage
vkyfEdkifygw,f/
CHAPTER 16: Enumeration
Introduction
Applications
Domain Name System (DNS) onf UDP port 53 rSm
tvkyfvkyfygw,f/ 'gayr,fh 'g[m client query awGtwGufom rSefuefygw,f/
Action rSm TCP port 53 udk awGYjyDqdk&ifawmh Zone transfer jzpfay:aew,f
qdkwmudk od&SdEdkifygw,f/ secure om jzpfraebl;qdk&if zone transfer eJY
ywfoufwJh information rSeforQudk DNS u leak vkyfEdkifygw,f/
client/server model application wpfckonf RPC service eJY TCP 135
ay:rSm rlwnfaeygw,f/ application server eJY csdwfqufxm;wJh client &JU
information awGudk RPC u azmfjyay;Edkifygw,f/ NetBIOS onf tawmf
a&S;usayr,fh null session awGudk toHk;jyKjyD; information awGudk
pkpnf;ay;Edkifygw,f/ MS &JU aemufydkif; version awGrSmawmh file sharing udk
maintain vkyf&mrSm SMB onf NetBIOS uay:uae vkyfaqmifygw,f/
uRefawmfwdkYu monitoring application awGudk toHk;jyKaew,fqdk&if
'g[m SNMP jzpfzdkY rsm;ygw,f/ default community name udk change vdkufwm
vdkrsdK; rSefuefwJh configure jyKvkyfrxm;bl;qdk&ifawmh SNMP onf information
awGudk azmfjyaerSmjzpfygw,f/ Active directory [m operate vkyfzdkYtwGuf
LDAP udk tm;xm;&ygw,f/ default twdkif;&SdaewJh LDAP [m vHkjcHKrI r&Sdygbl;/
LDAP om vHkjcHKrI r&Sd&ifawmh &SdorQ information tm;vHk;udk attacker u
&,loGm;rSmjzpfygw,f/
SMTP server u uRefawmfwdkY&JU ar;cGef;wdkif;udk ajzay;Edkifygw,f/
rSefuefpGm ar;wwfzdkYawmh vdkygw,f/ NTP uawmh machine tm;vHk;&JU tcsdefudk
synchronize vkyfay;Edkifygw,f/ machine name awG tm;vHk;udk extract
vkyfEdkifzdkYtwGufawmh Metasploit code awGudk toHk;jyKEdkifygw,f/
ckaqG;aEG;wmawGu tBurf;zsif; tusOf;csKyfom aqG;aEG;cJhjcif;yg/
NetBIOS
NetBIOS qdkwm Windows 200 & Windows XP wdkYrSm oHk;cJhwJh old
technique wpfckqdkwm uRefawmfwdkY od&SdjyD;ygjyD/ tawmf usefcJhjyDjzpfvdkY
uRefawmfwdkY&JU ,aeY Operating system awGtwGufawmh taxmuftul
rjzpfayr,fh information tcsdKUudkawmh azmfjyaeEdkifqJ jzpfygw,f/
LDAP
LDAP (Lightweight Directory Access Protocol) ukd tjcm;aom
services awGrS (odkYr[kwf) active directory xJrSmyJ pkpnf;xm;wJh directory awGudk
access &,lEdkifzdkYtwGuf toHk;jyKavh&Sdygw,f/ directory awG[m Organization
wpfck&JU Structure vdk wnf&SdaewwfjyD; quick lookup eJY fast resolution
vkyfEdkifzdkYtwGuf DNS eJY wGJxm;avh&Sdygw,f/ omreftwdkif;qdk directory
awGonf port 389 rSm run ygw,f/
User profile (e.g. user name, passwords, ..) udkom oifhtaeeJY access
&&Sdxm;w,fqdk&ifawmh LDAP enumeration vkyfaqmif&wm vG,fulEdifygw,f/
tJvdkvkyfzdkYtwGufawmh Administrator Account vdkrsdK; high privilege
awG&&SdaewJh account awmif rvdktyfygbl;/ target domain xJrSm omref account
wpfckck &Sd&HkeJYwif tqifajyygw,f/
'gudk vkyfaqmifMunfhzdkYtwGuf Softerra udk toHk;jyKMunfh&atmif/
(LDAP hack (or) LDAP enumerate vkyfaqmifzdkYtwGufawmh tool awGu
rrsm;bl;cifAs/)
NTP
uRefawmfwdkYawG tawmfrsm;rsm; odjyD;jzpfwJh protocol wpfckyg/ Network
Time Protocol vdkY ac:ygw,f/ network computer awG&JU clock awGudk
synchronize vkyfEdkifzdkYtwGuf xkwfxm;wmygyJ/ vulnerability analysis (or)
penetration testing jyKvkyfr,fqdk&if NTP server udk query vkyfjyD; &vmr,fh data
awGu wefzdk;&SdjyD;awmh rnfonfh authentication rQ rvdktyfwmaMumifh
'Day:rSmvnf; tav;xm; jyKvkyfavh&SdMuygw,f/
SMTP
Simple Mail Transport Protocol (SMTP) onf uGefysLwm pwif
ay:aygufp umv0ef;usifuwnf;u pwifcJhwm jzpfygw,f/ emrnfeJYvdkufatmif
vnf; SMTP onf &dk;&Sif;ygw,f/ email message awG ay;ydkY&m vufcH&mrSm
POP3 or IMAP udk toHk;jyKwJh SMTP udk toHk;jyKrI rsm;ygw,f/ omreftm;jzifh
SMTP onf port 25 rSm run avh&SdjyD; Mail Exchange (MX) server ay:rSm
rSDwnfaeygw,f/
DNS Enumeration
DNS Enumeration qdkwmuawmh organization wpfcktwGuf olwdkY&JU
DNS server awGeJY oufqdkif&m qufpyf rSwfwrf;awGtm;vHk;udk nTefjyay;wJh
jzpfpOfvdkY ajymvdkY&ygw,f/ Company (or) Organization wpfckrSm user names,
computer names, IP address pwJh tcsuftvufawGudk rSwfwrf;jyK
odkavSmifxm;Edkifr,fh internal and external DNS servver awG &SdwwfMuygw,f/
DNS Enumeration vkyfaqmif&mrSm toHk;jyKEdkifwJh tool (or) program awGuawmh
NSlookup, DNSstuff, the American Registory for Internet Numbers (ARIN) eJY
WHOIS wdkY jzpfMuygw,f/
xdktxJrSm powerful vnf;jzpf oHk;&wmvnf; vG,fwmuawmh
NSlookup jzpfygw,f/ Windows, Linux & Unix awGrSm yg0ifjyD;om;jzpfvdkY
windows cmd uaejzpfap Linux terminal uae jzpfap wdkuf&dkuf toHk;jyKEdkifrSm
jzpfygw,f/ server & other host awGtwGuf additional IP address awGudk
&SmazG&mrSm NSlookup udk toHk;jyKEdkifygw,f/ whois.net , whois.com/whois eJY
who.is wdkYrSmvnf; oGm;a&mufMunfh&IEdkifaMumif; a&SUrSm uRefawmfwdkY aqG;aEG;cJhMu
jyD;ygjyD/ ckawmh NSlookup udk Windows rSm tenf;i,f xyfvkyfMunfh&atmifyg/
a&SUrSmawmh Kali Linux Terminal rSm toHk;jyKwJhtaMumif; azmfjyaqG;aEG;cJhjyD;jyDrdkY
yg/ windows cmd rSmjzpfap terminal rSmjzpfap twlwlyJrdkY tajymif;tvJ
jzpfoGm;atmif Windows rSm vkyfaqmifjyjcif;om/
Introduction
Password Attacks
t"dutm;jzifh Password Attack ESpfrsdK; &Sdygw,f/ Social & Digital
attacks yg/ Social attack rSm attacker u victim &JU password udk cefYrSef;EdkifzdkY
twGuf Shoulder surfing (ykcHk;ay:rS ausmfMunfhjcif;^wpfae&m&muae
Munfhaejcif;) enf;vrf;? dumpster diving (trdIufyHk;xJuae aumif;wmawG
jyef&Smxkwfjcif;^ xifrSwfrxm;onfh ae&mrsm;rS roHk;awmhonfh zkdifrsm;xJrS
&SmazGjcif;) enf;vrf; ESifh SE (Social Engineering) enf;vrf;wdkYudk
toHk;jyKMuygw,f/
'Dae&mrSm pm&IoltaeeJY ]]shoulder surfing u Social Engineering
wpfrsdK;yJ r[kwfvm;}} vdkY ar;aumif; ar;Edkifygw,f/ tJonftwGufawmh
r[kwfygbl; vdkYyJ ajz&ygr,f/ bmvdkYvJqdkawmh yxrtcsuf - uRefawmfwdkYtaeeJY
&Hk; (odkY) ukrÜPDwpfcktwGif; taMumif;wpfpHkwpf&maMumifh 0ifa&mufEdkifwmrsdK;
&SdEdkifygw,f/ xdktcgrSmvnf;yJ uRefawmfwdkYtaeeJY Victim udk MunfhjrifEdkifjyD;
&efukefrSm&SdwJh vdkif;um;awGay:rSmjzpfap? wifi free ay;xm;aom ae&mawGrSm
jzpfap shoulder surfing udk toHk;jyKEdkifygw,f/ 'gayr,fh uRefawmfwdkY
odrSwfxm;&rSmu Shoulder surfing onf usdef;aoayguf Password &Edkifr,fh
enf;vrf; vdkY owfrSwfrxm;zdkY jzpfygw,f/ bmaMumifhvJqdkawmh uRefawmfwdkY
MunfhaewJhtcsdefrSm victim u Login jyKvkyfcsifrS jyKvkyfrSmrdkYygyJ/
Oyrm - uRefawmfwdkYu um;pD;&if; Facebook oHk;aerdwm
jzpfcsifjzpfygr,f/ Log out vkyfrxm;wJhtwGuf Login vkyfp&mrvdkbJ
oHk;&rSmjzpfvdkY wpfa,mufa,mufu MunfhaecJh&ifawmif uRefawmfwdkY account udk
rSwfxm;&HkuvGJvdkY bmrS wwfEdkifrSm r[kwfygbl;/ rsm;aomtm;jzifhu Facebook
oHk;ol trsm;pkonf wpfBudrfom Login 0ifxm;avh&SdjyD; jyefxGufavhr&SdMuvdkY
jzpfygw,f/ &Hk;wGif;rSmvnf; xdkYtwlygyJ/ rdrd twGif;a&mufvdkY
Munfh&IEdkifw,fqdkOD;awmh rdrda&mufwJhtcsdefrSm uGefysLwmu zGifhjyD;om;udk
oHk;aewmvnf; jzpfaumif;jzpfygvdrfhr,f/ 'gaMumifh usdef;ao &r,fvdkY rajymEdkif
wJh enf;yg/
'gayr,fh tvsOfoifhvdkY uRefawmfhtaeeJY BuHKcJh&wmav; jyefvnf
ajymjyyg&ap/ &efukefrSm vdkif;um;pD;&if;yJ Facebook Account wpfckudk Login
0ifaewJh rdef;uav;wpfa,mufudk awGYvdkuf&ygw,f/ Password awGudk
rjrif&bl;qdkayr,fh uRefawmfwdkYawG aeYpOfoHk;ae&wJh Keyboard vufuGufrSm
b,fcvkwfudk ESdyfvdkuf&if bmjzpfr,fqdkwm odaewmaMumifh xdk account
av;xJudk uRefawmf 0ifMunfhEdkifcJhjyD; aemufudk rdrdwpfa,mufwnf;
r[kwfwJhtcsdef Login r0ifzdkYtaMumif;? Login Approval xm;jyD;
oHk;oifhwJhtaMumif; Only Me post wpfck wifxm;cJhay;jyD; jyefxGufcJhvdkufygw,f/
aemuf wpfcgu ydkjyD; ta&;BuD;ygw,f/ 'DaeYacwfrSmu Mobile
Banking awG iBanking awGudk wGifus,fpGm toHk;jyKvmwmaMumifh ydkjyD;
aumif;vmwmawG &Sdovdk owdxm;&rSmawGvnf; ydkjyD; rsm;vmygw,f/ bPfawG
uvnf; bPfwpfckeJYwpfck toHk;jyKwJhenf;vrf;awG uGJjym;wm awGY&ygw,f/
Mobile Banking awGxJrSmawmh CB Bank &JU Mobile Banking av;udk ydk
oabmusrdygw,f/ Pass code udk odoGm;&ifawmif vdkufzGifhvdkY r&vdkYyg/ olU&JU
tm;enf;csufuawmh zkef;ajymif;wJhtcgjzpfap software ysufoGm;vdkY
jyefxnfhwJhtcgjzpfap bPfudk jyefoGm;&wmav;wpfckygyJ/
usefwJh Bank awGxJrSm Aya eJY KBZ wdkYyJ uRefawmfoHk;zl;vdkY Oyrmav;
ajymjyygr,f/ Login rSm User ae&mawGudk formula eJY xm;wmjzpfvdkY rSwfzdkY
vG,fygw,f/ (b,fvdk xm;vJqdkwmawmh rajymawmhygbl;/ oHk;zl;olawG tvG,f
odEdkifygw,f/)/ Mail wpfckudk login 0ifovdk user eJY password udkom od&if
b,folrqdk tvG,fwul 0ifvdkY &ygw,f/ uRefawmfawGYzl;wJh
wpfpHkwpfa,mufuawmh um;ay:rSm vltrsm;BuD;Mum;rSmu Mobile Banking
zGifhjyD; aiGppfwmyg/ user name eJY password u rSwf&vG,fvGef;vdkY
oHk;av;vxdawmif rSwfrdaewkef;yg/ olY Account xJrSm olYbmom ppfaewkef;
uRefawmfjrifvdkuf&wmawmh odef; 20 ausmf &Sdygw,f/ (wpfa,mufa,mufursm;
jrifjyD; tjcm; account wpfckckxJ vTJvdkuf&if .......)
uRefawmfwdkYawGu enf;ynmawG wdk;wufvmwmawGudk toHk;csaeMu
vdkufoHk;aeMuayr,fh security udk tav;xm;zdkY arhaewwfMuygw,f/
qufjyD;aqG;aeG;&atmifyg/ tay:rSm uRefawmf aqG;aEG;cJhwJh shoulder surfing u
b,fae&mrSmrS toHk;r0ifbl;vdkY xifrSm pdk;vdkY erlem azmfjyjcif;om jzpfjyD;
rdrdwdkYtwGufvnf; aqmif&efa&Smif&efav;awGudk rSwfxm;oifhygw,f/ ('Denf;vrf;
eJY tcsdKUaom Facebook Page admin awG&JU ayghavsmhrIaMumifh Account ygjyD;
Page odrf;cHvdkuf&w,f qdkwmawGvnf; Mum;zl;aygif; rsm;vSygjyD)/
tcsdKUu user name & password vdk ta&;ygwmawGudk note xJrSm
rSwfavh &SdMuygw,f/ xdk note awGonf pmtkyfrSmvnf; jzpfEdkifovdk zkef;xJu
note vnf; jzpfEdkifygw,f/ uGefysLwmrSmawmh Stick note rSm rSwfavh&SdolawGvnf;
awGYzl;ygw,f/ dumpster diving uawmh tJ'gawGxJuaevnf; &SmazGwmygyJ/
Hacker wpfa,mufonf uRefawmfwdkY&JU &Hk;xJudk b,fvdk
a&muf&SdvmEdkifrvJ awG;Munfh&atmif/ yxrtcsuf - olonf &Hk;xJu
(ukrÜPDxJu) wpfa,mufa,mufeJY friend jzpfaewmvnf; jzpfEdkifovdk ,m,D
taeeJY 0efxrf;tjzpf tvkyfvmvkyfaewmvnf; jzpfEdkifygw,f/ tcsdKUaom
hacker awGonf olwdkY vkyfaqmifr,fh vkyfief;&JU tBuD;tao;ay: rlwnfjyD;awmh
individual information awG &zdkY vawGeJYcsDjyD;awmif apmifhqdkif; vkyfaqmifavh
&SdMuygw,f/ (hacker qdkwm ZGJvnf; tvGefaumif;wJholawG jzpfMuygw,f)
uRefawmf azmfjycJhwmu v awGeJY csDjyD; vdkYaemf v vnf;r[kwfovdk
ESpfawGeJYvnf; rcsDygbl;/ (tvGefqHk; wpfESpfavmufxdaygh) :)
tjcm;aom EdkifiHawGrSmawmh company xJudk cyfwnfwnf
0ifvmjyD;awmh Internal Penetration Testing vkyfzdkY w&m;0ifiSm;&rf;xm;aMumif;
pm&Gufpmwrf; twkawGeJYtwl (wm0ef&Sdol tBuD;tuJawG r&SdwJh^jyefvmzdkY
cufwJh tcsdefawGrSm) oGm;a&mufjyD; vdkcsifwJh tcsuftvufawG &atmif
vkyfwmrsdK; vkyfaqmifMuavh &Sdygw,f/ 'DrSmawmh tJvdk vkyfzdkY rvG,fygbl; As/
Social Attack jyD;awmh aemufwpfcku Digital Attack yg/ Digital
Attack udkawmh Key loggers, Password guessing, password cracking, brute
force attacks eJY rainbow tables awGudk toHk;jyKjcif; pwJh enf;vrf;awGeJY
vkyfaqmifEdkifygw,f/ wpfckcsif;pDtaMumif;udk oifhawmf&mae&mawGrSm xnfhoGif;
aqG;aEG;oGm;ygr,f/
Password Guessing
Cain and Able udk zGifhjyD; cracker qdkwJh option udk zGifhMunfh&if
txufyg yHktwdkif; jrifawGY&ygr,f/
yxrqHk; cracker atmufu LM & NTLM Hashes qdkwJh ae&mav; udk
click jyD; select vdkufyg/ yHkrSm 1 vdkY jyxm;ygw,f/ jyD;&if 3 qdkwJhae&mrSm
tjyma&mif taygif;vu©Pmav; raygbJ rSdefae&if 2 vdkY jyxm;wJh user name
atmufu tjzLuGufrSm click vdkufwmeJY tjyma&mif taygif;av; ay:vmygr,f/
yHkxJutwdkif;yJ 3 vdkY jyxm;wJhae&mrSm tjyma&mif taygif;av; ay:vmwmudk
ESdyfvdkufyg/
aemufutydkif;udk aumfyD,laygh/
jyD;&if Hash rSm rdrdwdkY toHk;jyKrnfh hash udka&G; Min Len u tenf;qHk;
pmvHk;a&? Max Len uawmh trsm;qHk; pmvHk;a& jzpfygw,f/ Charset (Character
Set) rSm rdrdwdkY vdkcsifwJhtwdkif; pmvHk;tao;? pmvHk;tBuD;? udef;awG special
character awG ygwm rygwmawG rdrdwdkYpdwfBudKuf a&G;cs,fEdkifygw,f/
uRefawmfuawmh all-space (default) twdkif;yJ xm;xm;ygw,f/ tm;vHk;
ygapcsifvdkYyg/ jyD;awmhatmufrSm ay:vmr,fh Disk space udk MunfhMunfhyg/
uRefawmf cke wordlist rSmwkef;uvnf; 8-20 yg/ ck Rainbow table rSmvnf; 8-20
ygyJ/ zdkifqkd'fuawmh tawmfhudk uGmjcm;oGm;ygjyD/ Disk space 610,35 MB vdkY
awGYjrif&rSmyg/ OK >> OK vdkufyg/
Introduction
Spyware Distribution
Spyware awG b,fvdk ysHUyGm;MuvJ/ tifwmeuf toHk;jyKrI ydkrdk wGifus,f
vmwmeJYtrQ spyware awG ysHUyGm;rIvnf; ydkrdkrsm;jym;vmMuygw,f/ Spyware
trsm;pkonf free download &,lvdkufwJh software awG? Legitimate site u
r[kwfbJ crack xm;jyD; jyefjzefYay;wJh application awGuae wpfqifh t"du ysHUESHY
Muygw,f/ Freeware awG? Shareware awGudk uRefawmfwdkY &SmazG toHk;jyKwwf
MuwmaMumifh xdkxJrSm spyware awG xnfhoGif;jyD; tcrJh wifay;wmawGudk
a'gif;,l &if;eJY uRefawmfwdkY&JU pepfxJudk spyware awG a&muf&SdvmMuygw,f/
'Dvdk Free software awGudk develop vkyfcJhwJh Programmer awGonf 'D
Free software awGuae 0ifaiG r&MuygbJvsuf tcsdefwdkif; topfawG
zefwD;xkwfay;aeEdkifwm bmaMumifhygvJ/ olwdkYu uRefawmfwdkY&JU information
awGudk pkaqmif;&,ljyD; uRefawmfwdkY&JU tcsuftvufawGudk aMumfjimolawGxH
jyefvnf a&mif;csjcif;jzifh 0ifaiG&Muygw,f/ application xJrSm aMumfjimawG
xnfhoGif;jcif;tm;jzifhvnf; 0ifaiG&Muygw,f/ 'ghjyif uRefawmfwdkY&JU Bank
Account vdk? Credit card eHygwfawGvdk pwJh tcsufawGudkawmifrS &,ltoHk;jyK
EdkifzdkY BudK;pm;EdkifMuygw,f/ 'D Freeware awG? shareware awGtjyif w&m;r0if
yGm;,l zefwD;xm;wJh Pirate Bay vdk Torrent awGu Movie awG? oDcsif;awG?
application awG? Game awG pwmawGuaevnf; jyefYyGm;EdkifMuygw,f/
bmaMumifhvJqdk&if xdkzdkifawGxJrSm spyware awG yg0ifaevdkYygyJ/
Spyware awGudk installation jyKvkyfwJh websites awGvnf;
&Sdaeygao;w,f/ pornography sites (18+ sites) awG? gambling site eJY Online
Hacking vkyfvdkY&w,fvdkY qdkxm;wJh tcsdKUaom site awGyg/ aemufjyD;
oifhpufxJrSm virus awG &SdaeygjyD 'D software udk tcrJh &,ljyD; install vkyfjcif;jzifh
&Sif;Edkifygr,f qdkwJh site awG? oifhpufu av;aewJhtwGuf rvdktyfwmawGudk
&Sif;vdkufyg qdkjyD; install cdkif;wJh site awG? pwJh site awGudk uRefawmfwdkY
a&mufoGm;jyD; vkyfMunfhrdvdkufjyDqkd&ifawmh uRefawmfwdkY&JU pepfxJudk spyware awG
jznfhoGif;oGm;wmudk cHvdkuf&rSmygyJ/
tqdkyg website rsdK;awGu 'DaeYacwfrSm awGY&qHk;aom yHkpHawG jzpfjyD;
spyware awGudk uRefawmfwdkYudk today;jcif; tvsOf;r&SdbJ xnfhoGif;oGm;wm
jzpfygw,f/ aemufwpfcku Pop-up windows awGudk toHk;jyKwJh link awG? plug-in
(or) extension awGuvnf; spyware awGudk jyefYyGm;apEdkifygw,f/
txufyg yHkawGxJuvdk pop-up awG eJY web page awGudk uRefawmfwdkY
awGYBuHKzl;Muygvdrfhr,f/ 'gawGudk awGYrdwJhtcg ]]wu,frsm; uRefawmfwdkY pufudk
&Sif;vif;zdkY vdkjyDvm;}} qdkwmrsdK; uRefawmfwdkY awG;rdEdkifygw,f/ 'gawGonf
w&m;0if r[kwfygbl;/ 'gawGu uRefawmfwdkYpufxJudk wu,fh spyware awGudk
xnfhoGif;oGm;rSmjzpfygw,f/ uRefawmfwdkYrSm security knowledge r&Sdxm;&if
pufxJrSm&SdwJh virus awGudk &Sif;EdkifzdkY qdkjyD; spyware awGudk uRefawmfwdkYu
aysmfaysmf&Tif&TifyJ xnfhoGif;rdrSmyg/
Spyware awGudk &SmazG azmfxkwfay;wmu Anti-spyware
awGjzpfygw,f/ anti-spyware awG&JU vkyfaqmifcsufawGuvnf; pdwf0ifpm;zG,f
aumif;ygw,f/ spyware awG ysHUESHUapwJh enf;vrf;awGxJrSm pear-to-pear
distribution awG? cracked software awG? freeware/shareware awG? web browser
rSm uRefawmfwdkY xnfhoGif;toHk;jyKavh&SdMuwJh toolbar awG pwmawGuae wpfqifh
ysHUESHUjcif; awG yg0ifygw,f/ ]]&kyf&Sif&HkrSm ck &HkwifaewJhum; udk cdk;&dkufjyD;
jyefwifay;xm;wm ighrSm&Sdw,f/ rif;vdkcsif&if ul;oGm;}} qdkwmrsdK; uRefawmfwdkY
BuHKzl;aumif; BuHKzl;rSmyg/ tqdkyg Zmwfum;udk b,fu&wmvdkY xifygovJ/ Pirate
Bay wdkYvdk virus full jzpfaewJh torrent site awGuae &&Sdvmwm jzpfygw,f/
uRefawmfwdkY todrdwfaqGawGxJu oHk;wJh uGefysLwmawGrSm search
engine tool bar awGudk rsm;pGm install vkyfxm;wmrsdK; awGYzl;Edkifygw,f/ Microsoft,
Mozila eJY Google Chrome wdkYuae approve vkyfrxm;wJh rnfonfh search
engine toolbar udkrQ toHk;rjyKoifhygbl;/ bmvdkYvJqdk&if olwdkYu spyware awG
rdkYygyJ/ (tcsdKUu roHk;ayr,fh tjrifqef;wmaMumifh wrifudk wifxm;avh
&SdMuygw,f)/ spyware awGonf uRefawmfwdkY&JU pepfxJrSm hidden taeeJY
0ifa&mufaewwfjyD; uRefawmfwdkY&JU tcsuftvufawG? activity awGudk owner
(hacker) xH jyefvnf ay;ydkYaew,fqdkwmudk uRefawmfwdkY owdxm;&rSmyg/
aemufuG,frSm run aew,f qdkayr,fh spyware awGonf uRefawmfwdkY
uGefysLwm&JU CPU, memory eJY internet connection bandwidth awGvdk resource
awGudk &,loHk;pGJEdkifw,fqdkwm odrSwfxm;&ygr,f/ spyware awGaMumifh system
crash awG jzpfyGm;apEdkifjyD; uRefawmfwdkY uGefysLwmawG av;oGm;wm wdkY?
yHkrSefvkyfaqmifrI awG odyfMumoGm;wmrsdK; jzpfjyD; tifwmeufoHk;wJhtcg zkef;rSm
vdkif;aumif;ygvsufeJY uGefysLwmrSm vdkif;odyfraumif;bJ Munfh& MumaewmrsdK;?
zkef;uae vTifhoHk;&if zkef;a'wmawG t&rf;wufwmrsdK; pwmawG jzpfwwfygw,f/
tcsdKUqdk uGefysLwmudk topfxyf0,fcsifpdwf ay:vmwJhtxd jzpfwwfygw,f/
wu,fawmh 'gawGu spyware awG&JU vTrf;rdk;cH&jcif;om jzpfygw,f/
Browser u home page awGudk ajymif;vJypfwmrsdK;? default search
engine udk ajymif;vJypfwmrsdK; pwmawG jzpfvmjyDqdk&ifvnf; spyware awG
&SdaejyDjzpfaMumif; od&SdEdkifygw,f/ spyware awGonf malicious software
awGxJrSm wpfpdwfwpfydkif;tjzpf yg0ifwwfwmrsdK; &Sdayr,fh 'guawmh
BuHK&cJygw,f/ tcsdKUaom software awGu uRefawmfwdkY&JU firewall eJY anti-virus
awGudk ydwfypfEdkifwmrsdK;? uninstall vkyfypfEdkifwmrsdK;awG vkyfaqmifEdkifjyD;awmh
web browser &JU Security setting udkyg ajymif;ypfEdkifygw,f/
Power Spy
Power Spy udkawmh ematrixsoft.com/download.php rSm aemufqHk;
Am;&Sif;udk &,lEdkifygw,f/ windows 8, 8.1 eJY windows 10 awGygrSm toHk;jyKEdkifzdkY
xkwfvkyfxm;jyD; w&m;0if tracking software trsdK;tpm;wpfrsdK; jzpfygw,f/
Hacker BuD;awGuawmh spyware awGudk 100% control vkyfEdkifzdkYtwGuf udk,fydkif
yJ zefwD;toHk;jyKavhh&SdMuygw,f/ 'gayr,fh Programming Language awGudk
aocsm em;vnfjyD; Program awG a&;qGJEdkifzdkY vdktyfrSmjzpfygw,f/
uRefawmfwdkYuawmh ckrS pwifavhvmrSmjzpfvdkY &SdjyD;om; Software
av;awGudkyJ ,loHk;Mu&atmifcifAs/
Keyloggers
'Dcgawmh Keylogger awG taMumif;aygh/ uRefawmfwdkY uGefysLwmrSm
&dkufoGif;vdkufwJh pmvHk;awG? aumfyDul;,lvdkufwJh pmvHk;awGudk rSwfom;xm;EdkifzdkY
Keylogger awGudk toHk;jyKMuw,fqdkwmudk a&S;uwnf;u uRefawmfwdkY odcJhMujyD;
jzpfygw,f/ jyD;cJhwJh Power Spy rSmvnf; Keystroke awGudk rSwfom;wJhtydkif;
ygcJhjyD;jyDaygh/ Keylogger &JU t"du wm0efonf Keyboard uae &dkufoGif;vdkufwJh
Key awGudk rSwfom;xm;zdkY jzpfygw,f/
'gaMumifh Keylogger onf uRefawmfwdkY&dkufoGif;vdkufwJh keystroke
awGudk txt zdkifwpfckeJY odrf;qnf;wJh tvkyfudk vkyfaqmifygw,f/ 'ghjyif Power
Spy vdk spyware wpfrsdK;rsdK;eJYvnf; aygif;pyfvkyfaqmifEdkifygao;w,f/ tJvdk
aygif;pyf vkyfaqmifEdkifjyDqdk&ifawmh attacker xH information awGudk
jyefay;ydkYwmrsdK;awGxd vkyfaqmifEdkifrSmjzpfygw,f/ hacker awGonf
uRefawmfwdkY&JU Bank account information, user & password vdk information
awGudk ydkrdkpdwf0ifpm;MuwmaMumifh Browser udk pzGifhpOfuae Browser ydwfvdkuf
csdef txdom rSwfom;xm;apzdkYudkvnf; program vkyfxm;vdkY &ygao;w,f/
'Dawmh Keylogger qdkwmonf uRefawmfwdkY&JU uGefysLwm keyboard eJY Operating
System Mum;rSm tvkyfvkyfwJh vkyfief;pOfwpfckvdkY jrifEdkifygw,f/
Hardware Keyloggers
uRefawmfwdkY odxm;wJh Keylogger awGonf software vnf; jzpfEdkifovdk
hardware vnf; jzpfaeEdkifygw,f/ Keyboard eJY computer eJY qufoG,fwJhMum;rSm
Mum;cH toHk;jyK&wmaMumifh Hardware Keylogger awGudk jrifawGYEdkifzdkY
vG,fulygw,f/ 'gayr,fh Desktop uGefysLwmawGrSmawmh USB port awGu
taemufbufrSm jzpfwmaMumifh 'Dwdkif;Munfh&HkeJYawmh odEdkifzdkY rvG,fygbl;/
Software Keyloggers
'guawmh uRefawmfwdkY tm;vHk;odjyD;om;jzpfvdkY txl;taxG
aqG;aEG;p&m rvdkavmufawmhygbl;/ oluawmh uRefawmfwdkYtaeeJY keyboard
uae &dkufoGif;vdkufwJh Keystroke awGomru &SdjyD;om;zdkifawGxJuae
ul;,lvdkufwJh copy to clipboard awGudkyg rSwfwrf;wifEdkifwmaMumifh ydkjyD;
owdxm;&rSmjzpfygw,f/ Hardware awGvdk jrifomxifom r&Sdjcif;uvnf;
olYtwGuf tm;omcsufwpf&yf jzpfaejyefygao;w,f/
Software keylogger yHkpHrsdK;pHkeJY &SdaeMuygw,f/ OS xJrSm wnf&SdaejyD;
aemufuG,fuae vkyfaqmifEdkifwJh hypervisor-based keylogger awGxJrSmawmh
VMware &JU E-S-X-i product eJY Microsoft &JU Hyper-V wdkYu xif&Sm;ygw,f/
Software keylogger awGxJrSmawmh Kernel-based software keylogger awGu
ydkjyD; aMumufp&maumif;ygw,f/ root (or) administrator access vdk privilege
awGudk &,ljyD; olYudk &SmazGrawGYEdkifatmif Operating System xJrSm
uG,f0Suf0ifa&muf aewJh keylogger trsdK;tpm; jzpfygw,f/
aemufxyf keylogger yHkpHwpfrsdK;uawmh API based keylogger
jzpfygw,f/ API qdkwm Application Programming Interface udk qdkvdkygw,f/
API Keylogger wpfrsdK;qdk&if BIOS uwpfqifh authentication vkyf&mrSmoHk;wJh
PIN eHygwfawGudkawmifrS rSwfom;xm;Edkifygw,f/ 'gaMumifh uRefawmfwdkY&JU
uGefysLwmudk power on zdkYtwGuf toHk;jyK&r,fh key awGudk hacker awGu
od&SdaeEdkifygw,f/
Form Grabbing Keylogger udkawmh Form wpfcku data awGudk
qGJ,lEdkifzdkYyJ &dk;&Sif;pGm xkwfxm;ygw,f/ olu uRefawmfwdkYawG oGm;a&mufvnfywf
cJhwJh website awGrSm&SdwJh Form awGrSm jznfhoGif;wmawGudk rSwfom;ygw,f/ Oyrm
- uRefawmfwdkYu Gmail (or) Facebook Account opf wpfck zGifhawmhr,fqdk&if
Form jznfhoGif;&ygw,f/ Login 0ifawmhr,f qdk&ifvnf; Login Form rSm
jznfhoGif;jyD;rS 0ifa&muf&ygw,f/ Hacker awGtwGufuawmh toHk;wnfhqHk;vdkY
qdk&rSmjzpfygw,f/ bmaMumifhvJqdkawmh olu user name & password vdk
ta&;ygwJh tcsuftvufawGudkom rSwfom;xm;rSmjzpfvdkY &Sm&vG,fuljyD;
tydkpmvHk;awGudkyg avSsmufMunfh&wmrsdK;uae vGwfuif;apEdkifygw,f/ hacker
awGtwGuf uRefawmfwdkY&JU Windows User Account Control udk ausmfjzwf&mrSm
ulnDay;EdkifwJh Memory injection-based keylogger awGvnf; &Sdao;jyD; xdkxJrSm
Trojan awGeJY wGJpyfxm;wJh Zeus eJY Spy Eye wdkYu emrnfBuD;ygw,f/
Ultimate Keylogger
www.ultimatekeylogger.com rSm download &,lEdkifygw,f/
ta&twGuf rsm;rsm;0,f,lavav aps;EIef;oufomavav jzpfjyD; w&m;0if
0,f,l toHk;jyKEdkifygw,f/ pwif toHk;jyKpOfrSm password owfrSwfay;&ygr,f/
Kernel Keyloggers
'Dtydkif;uawmh Software Keylogger trsdK;tpm;xJrSm yg0ifjyD;
ydkaMumufp&maumif;wJh Keylogger trsdK;tpm; jzpfygw,f/ 'DtrsdK;tpm;
Keylogger awGonf Kernel level rSm run wmjzpfvdkY input device aygif;pHku data
awGudk wdkuf&dkuf &,lEdkifygw,f/ A+ avhvmcJhzl;olawGqdk ydkjyD; em;vnfEdkif
ygw,f/ uRefawmfwdkYawG toHk;jyKaewJh OS awGwdkif;onf Hardware awGudk
xdef;csKyfwJh level jzpfwJh ring 0 udk control vkyfygw,f/ user awG&JU Operation
awGuawmh ring 3 rSm run wm jzpfygw,f/ Kernel Keylogger awGu ring 0 rSm
run ygw,f/ 'gaMumifhrdkYvdkY olY&JU vkyfaqmifcsufawGu ydkrdk vGwfvyfaejyD; hacker
xHodkYvnf; vGwfvyfpGm jyefvnf tpD&ifcHay;ydkYEdkifrSmjzpfygw,f/
bmaMumifhvJqdk&ifawmh Kernel level rSm run wm jzpfvdkY olYudk
Anti-virus awG? anti-spyware program awGuae &SmazGawGY&SdEdkifzdkY cufcJvdkY
jzpfygw,f/ Anti-virus (or) anti-spyware awGonf user level application
awGjzpfMujyD;awmh ring 3 rSm run ygw,f/ ring 0 udk &SmawGYEdkifpGrf; r&SdMuygbl;/
uRefawmfwdkYtaeeJY Keylogger awG&JU oabm vkyfaqmifyHkawGudk od&SdjyD jzpfvdkY
umuG,fEdkifzdkYtwGuf vkyfaqmif&rSmawGudk qufjyD; aqG;aEG;ygr,f/
Protecting Yourself
Keylogger awGonf malware BuD;awG&JU wpfpdwfwpfydkif;
jzpfw,fqdkwm uRefawmfwdkY arQmfrSef;xm;&ygr,f/ malware qdkwmu malicious
software udk ac:qdkwmjzpfjyD; Trojan or rootkit wpfrsdK;rsdK;vnf; jzpfaeEdkifygw,f/
Trojan qdkwm uRefawmfwdkYtaeeJY tusdK;&Sdr,fh wpfpHkwpf&mtjzpf [efaqmifjyD;
0ifa&mufvmwJhtrsdK;tpm; wpfck jzpfum uRefawmfwdkY&JU tcsuftvufawGudk
axmufvSrf; &,lEdkifzdkY Keylogger awGudk aygif;pyfxnfhoGif;xm;EdkifwJh spyware
wpfrsdK;vnf; jzpfygw,f/ rootkit qdkwmuawmh Kernel Keylogger awGvdkyJ user
awGtaeeJY odzdkYcufwJh Kernel xJrSm install xm;wJ software wpfckvdkY tMurf;zsif;
rSwfom;xm;Edkifygw,f/
Spyware awG jyefYyGm;MuovdkygyJ/ Keylogger awGonfvnf;
malicious code awG yg0ifaewJh website awGuaewpfqifh drive-by download
awGuae uRefawmfwdkY&JU system xJudk ul;pufavh&Sdygw,f/ 'gwifr[kwfao;bJ
uRefawmfwdkY yHkrSef0ifa&mufMunfhaeus website wpfckckudk malicious hacker
awGu xdef;csKyfjyifqifjyD; uRefawmfwdkY r&dyfrdatmif xnfhoGif;oGm;wmawG
uaevnf; ul;pufEdkifygw,f/ user awGtwGufuawmh 'gonf odyfBuD;rm;wJh
issue wpfck jzpfaeygw,f/ uRefawmfwdkYonf aeYpOfvdkvdk website awGudk
0ifa&muf Munfh&IaeMuygw,f/ Facebook onfvnf; website wpfck jzpfygw,f/
'gaMumifh pdwf0ifpm;p&m website link awGudk Facebook Post awGxJrSm
awGY&SdEdkifjyD; tJonfuaewpfqifh Website aygif;rsm;pGmudk uRefawmfwdkY
0ifMunfhjzpfaeMuvdkYygyJ/
tcsdKUaom website awGu article awGudk zGifhMunfhwJhtcg pop-up awG?
spinner page awG? virus warning (fake) page awG yGifhyGifhvmwwfwmudkvnf;
uRefawmfwdkY BuHKzl;aumif; BuHKzl;MurSmyg/ 'gqdk uRefawmfwdkY&JU company (or)
organization awGxJrSm 'Dvdk spyware (or) keylogger awG ul;pufcH&jcif;rS
umuG,fzdkY bmawGudk vkyfaqmifzdkY vdktyfrvJ/ wwfEdkiforQ BudKwifumuG,fMunfh
&atmifyg/
yxrqHk;tcsufuawmh uRefawmfwdkY&JU vkyfief;oHk;jzpfap wpfudk,fa&oHk;
jzpfap uGefysLwmawGudk omref vkyfaqmifcsufawG vkyfaqmifwJhtcgawGrSm root
(or) administrator account udk roHk;zdkY jzpfygw,f/ Administrator account udk
strong password wpfckck xm;xm;jyD; other user account awGudkom zGifhoHk;apzdkYyg/
administrator access vdktyfyguvnf; run as administrator vkyfvdkY&wmaMumifh
tqifajyr,fvdkY ,lqygw,f/ 'Denf;vrf;u uRefawmfwdkYudk tawmftoifh
umuG,fay;Edkifygw,f/
aemufwpfcku uRefawmfwdkYoHk;wJh Browser onf Firefox browser
jzpfygu Mozila Firefox >> Menu >> add-on >> plugins rSm no script vdkY
&dkuf&SmjyD; scripts awGudk wm;qD;xm;ay;EdkifwJh Plugins udk xnfhoGif;toHk;jyK
Edkifygw,f/ Google Chrome user awGtwGufvnf; no script suit extension udk
xnfhoGif;toHk;jyKEdkifygw,f/ toHk;jyKr,fqdk&ifawmh Facebook udk 0ifa&muf&mrSm
Java Script awG tvkyfrvkyfwmaMumifh 'gawGudk oHk;EdkifzdkYtwGufawmh web add
vkyfay;&rSmjzpfygw,f/
tpdrf;a&mif + udk click jcif;tm;jzifh tvG,fwul add Edkifygw,f/
tvkyfenf;enf;ydk&Iyfayr,fh safe jzpfygw,f/ Script ygwJh site awGudk tjyma&mif
script noti eJY jyay;xm;ygw,f/ (uRefawmfh&JU http://www.khitminnyo.com
rSmvnf; Zawgyi to Unicode ajymif;vJa&G;cs,fEdkifr,fh Change Font script udk
xnfhoHk;xm;wmaMumifh zGifhMunfhvdkY&ayr,fh Font Change wJh switch ray:bJ
&Sdwwfygw,f/ Zawgyi font install xm;&ifawmh add xm;p&m rvdktyfygbl;/ add
xm;&ifvnf; rnfonfhtEå&m,frQ r&SdygcifAsm/) :)
'gawGtjyif free sharing file awG? Pirate Bay wdkYvdk torrent file awGudk
toHk;rjyKjcif;uvnf; aumif;rGefwJh security measure wpfck jzpfygw,f/ crack
xm;jyD; jyefwifxm;wJh application awGudk roHk;oifhygbl;/ 'ghjyif Pop-up ad
awGudkvnf; click rvkyfoifhyg/ aemufwpfcku ActiveX install wmawG?
pdwfcs,HkMunf&rI r&SdwJh Browser add-on awGudk xnfhoGif;roHk;zdkY jzpfygw,f/
aemufwpfcsuftaeeJY anti-virus awGeJY anti-spyware awGudk toHk;jyKzdkY&,f
update yHkrSef jyKvkyfzdkY&,f jzpfygw,f/
ckazmfjycJhwJh enf;vrf;awGudk vkyfaqmifxm;&if 100% vHkjcHKjyDvdkY
rqdkvdkyg/ Hacker awGonf defender awG&JU tay:rSm tjrJwrf; &SdaeMuygw,f/
'gayr,fh uRefawmf aqG;aEG;cJhwmav;awGudk vkyfaqmifxm;r,fqdk&ifawmh
uRefawmfwdkY&JU pepfudk 0ifa&mufEdkifzdkY ydkrdkcufoGm;rSmjzpfjyD; awmf&Hk
prf;oyfMunfhcsifol awGtwGufawmh 'DhxufydkvG,fr,fh ypfrSwfudk ajymif;vJoGm;ap
ygvdrfhr,f/
aemufqHk;taeeJY uRefawmfhq&m qHk;rcJhwJh pum;av;wpfcGef;udk
jyefvnf rQa0ay;vdkygw,f/ q&m ajymavh&Sdwmu ]]Free software is not free}}
wJh/ wu,fwrf; tcrJhqdkwm pro version awGudk oHk;pGJcsifvmatmif
aMumfjimtaeeJY xkwfxm;wJh version rsdK;awmif tcrJh r&ygbl;/ (tenf;qHk;awmh
aMumfjimav; Munfhay;&wmygyJ)/ 'gqdk License version udk crack jyD; jyefrQa0
ay;aeEdkifwJh software awGuvnf; free r[kwf/ tenf;qHk;awmh rdrd&JU
Information awGudk gather vkyfoGm;wm cH&rSmjzpfjyD; uRefawmfwdkY&JU
tcsuftvufonf olwdkYtwGuf toHk;wnfhygu ,loHk;oGm;wm cH&ygr,f/
toHk;rwnfhwJh tcsuftvufawGeJY omrefoHk;ol wpfa,muf&JU information
awGudkawmh pdk;&drfp&mrvdkbl;aygh/
xdkodkY spyware awGudk &SmazG&mrSm Penetration tester awG toHk;rsm;qHk;
aom software wpfckuawmh open source tool wpfckjzpfwJh HiJackThis yg/
Trend Micro u ydkifqdkifcJhwm jzpfjyD; open source tjzpf jzefYa0ay;cJhygw,f/ (free
eJY open source wlnDjcif;r&Sdyg/ tcrJh &wmcsif;om wlygw,f/) Anti-virus
company rsm;pGmrSmvnf; olwdkY product awGudk tprf;oabm ay;oHk;wJh free
anti-virusawG &SdMuygw,f/ 'gayr,fh 'gawGudk uRefawmfwdkY uGefysLwmawGrSm
apmpD;pGm xnfhoGif;oHk;xm;zdkY vdktyfygw,fcifAs/ ul;pufcH&jyD;rS xyfxnfhwmrsdK;
uawmh pdwfcs&rIydkif;rSm tm;enf;aerSmyJ jzpfygw,f/
HijackThis
'D application udk &,lcsifw,fqdk&ifawmh bit.ly/kmn-hjt (or)
bit.ly/hjt-kmn wdkYuae &,lEdkifygw,f/
Introduction
Capabilities
malware awGonf aumif;^qdk; action ESpfrsdK;vHk; vkyfaqmifEdkifMu
ygw,f/ wu,fawmh malware qdkwm uRefawmfwdkYudk,fwdkifu ododvsufeJY
jznfhoGif;vdkuf&wJh application rsdK; r[kwfygbl;/ uRefawmfwdkY&JU knowledge rygbJ
vsuf uRefawmfwdkY&JU pepftwGif;rSm ae&m0if,ljyD; attacker &JU tusdK;pD;yGm;twGuf
jzpfap? uRefawmfwdkY pepfrSm ysufpD;,dk,Gif;atmifjzpfap vkyfaqmifwJh software
wpfckck&JU tpdwftydkif; jzpfaeEdkifygw,f/
malware awGonf victim &JU uGefysLwmudkjzpfap? victim computer
uae tjcm;aom uGefysLwmawGudk jzpfap DoS attack awG
vkyfaqmifEdkifwJhtpGrf;vnf; &SdMuygw,f/ FTP Trojan tjzpfvnf; malware
awGudk toHk;jyKEdkifMuygao;w,f/ Trojan awG trsdK;tpm; rsm;pGm &Sdovdk
pGrf;aqmif&nfawGvnf; uGmjcm;Muygw,f/ Trojan Banker udk Bank account
awGeJY Debit (or) Credit card awGudk cdk;,lEdkifzdkY toHk;jyKMuygw,f/ Trojan
awGonf ul;pufcH&wJh uGefysLwmuae password awG? cached password awG
pwmawGudk scan &,ljyD; hacker xH jyefvnfay;ydkYygw,f/
DoS attack Trojan uawmh ul;pufcH&wJh uGefysLwmawGuae
tjcm;tjcm;aom uGefysLwmawGxHudk DDoS wdkufcdkuf&mrSm yl;aygif;yg0ifapzdkY
vkyfaqmifEdkifygw,f/ uRefawmfwdkY pufxJrSm &SdaewJh tjcm;aom virus awGudk
z,fay;&if; ae&m0if,lwwfwJh Fake Anti-Virus Trojan vnf; &Sdygao;w,f/
Trojan wdkY&JU xHk;pHtwdkif; tcsuftvufawGudk vQdKU0Suf &,lzdkY qdkayr,fh tqdkyg
Trojan trsdK;tpm;uawmh money cdk;,lzdkYom t"duxm; vkyfaqmifygw,f/ olu
b,favmufxd vnfovJqdk&if olYudk z,frypfapzdkYtwGuf virus awGudk
rMumcP jyavh&SdjyD; clean wpfcsufESdyf&HkeJY ajz&Sif;EdkifwmrdkYvdkY uRefawmfwdkY&JU
rdwfaqGtjzpf uGefysLwmxJrSm xm;xm;rdwwfygw,f/ wu,fwrf;rSmawmh
ol&SmawGYcJhw,fqdkwJh (rMumcP azmfjyay;aewJh 1 or 2 ta&twGuf&SdwJh) virus
awG[m wu,fr&Sdygbl;/ olYbmom notification (warning) twk jyjyD;
z,f&Sm;wJhtcgrSmvnf; vdrfnmz,f&Sm;vdkufjcif;om jzpfygw,f/ aemufydkif; tcsdef
MumvmwJhtcg Virus rsm;pGmudk azmfjyvmwwfjyD; clean &ef aiGawmif;cHwmrsdK;awG
vkyfvmygawmhw,f/ 'ghjyif tjcm;aom Anti-virus pro awGudkvnf; olYxHrSm
aps;oufompGmeJY a&mif;csygvdrfhOD;r,f/ uRefawmfwdkYuom uRefawmfwdkY&JU Credit
card information udk jznfhjyD; olYqDu aps;oufoufomom
0,frdvdkufjyDqdk&ifawmh ol &&SdoGm;wJh tcsuftvufawGudk oHk;jyD; uRefawmfwdkY&JU
u'fxJu xkwfvdkY&oavmuf aiGawGudk xkwfoGm;awmhrSmyg/
Gamer awG rkef;wJh Game Thief Trajan wpfrsdK; &Sdygao;w,f/
oluawmh Online Game account awGudk t"du ypfrSwfxm;ygw,f/ Online
Game Account awGrSm Payment information awGyg ygwwfwmrdkYvdkY Credit card
eJY csdwfqufxm;wJh account awGqdk&if aiGaMu;qHk;&HI;rIyg ygoGm;ygawmhw,f/
Game orm;awGuawmh aiGaMu;xuf rdrdtcsdefay; upm;xm;&wJh high level
awGudk ydkjyD; ESajrmwwfMuygw,f/
Trojan-IM u uRefawmfwdkY&JU Login information awGudk t"du
ypfrSwfxm;avh&SdjyD; Trojan Ransom uawmh uRefawmfwdkY&JU a'wmawGudk modify
vkyfjyD; a'wmawG jyef&zdkYtwGuf aiGawmif;cHwJh yHkpHeJY vkyfaqmifygw,f/ Trojan
SMS uawmh tcsdKUEdkifiHawGrSm Operator awGtwGuf tvkyfvkyfay;wJh
yHkpH ,lqvdkY&ygw,f/ Mobile user awGudk SMS awG tvdktavsmuf
toHk;jyKaeapjcif;tm;jzifh aiGukefaMu;us rsm;atmif vkyfaqmifygw,f/ Trojan
Spy uawmh uRefawmfwdkY od&Sdxm;wJh Spyware awG&JU vkyfaqmifyHkeJY
vkyfaqmifwmyg/
Netcat
qGZfppfoHk;"g;vdk vkyfief;aygif;pHk vkyfaqmifEdkifwJh Netcat udk Swiss
Army Knife for hackers vdkY ac:qdkMuavh &Sdygw,f/ oabmuawmh Hacker awG
twGuf bufpHkoHk;EdkifwJh vufeufwpfckaygh/ TCP or UDP rSm rnfonfh
connection rSmrqdk outbound & inbound connection ESpfrsdK;vHk;udk zefwD;EdkifpGrf;wJh
Windows based tool wpfckvnf; jzpfygw,f/ rnfonfh port rSmrqdk
toHk;jyKEdkifjcif;u Ethical hacker awGtaeeJY Netcat udk toHk;rsm;&jcif;
taMumif;&if;wpfck jzpfapygw,f/
olYudk port Scanner taeeJY toHk;jyKEdkifwm uRefawmfwdkY od&SdjyD;
jzpfygw,f/ Netcat onf command line tool wpfckjzpfjyD; program awGudk
manage vkyfEdkifzdkYtwGuf switch aygif;rsm;pGm xnfhoGif;xm;ygw,f/ Terminal rSm
netcat -h vdkY &dkufxnfhjyD; option wpfckcsif;pDudk tao;pdwf Munfh&IEdkifovdk man
netcat eJYvnf; manual azmfMunfhEdkifygw,f/ Netcat rSm -v onf Verbose mode
udk qdkvdkjyD; -vv eJY more verbose toHk;jyKEdkifygw,f/ -d option uawmh netcat udk
stealth mode eJY vIyf&Sm;ay;aprSmjzpfjyD; -z uawmh port scanning twGufoHk;wJh
Zero mode jzpfygw,f/ -w2 udk timeout value (second) tjzpf toHk;jyKygw,f/
netcatudk telnet yHkpHrsdK;eJYvnf; toHk;jyKEdkifjyD; netcat (or) nc qdkjyD; ESpfrsdK;
toHk;jyKEdkifygw,f/ Windows twGuf Netcat udkawmh bit.ly/kmn-nc rSm
a'gif;,lEdkifygw,f/ download &vmwJh zip file udk nc qdkwJh folder xJrSm extract
vkyfjyD; ae&mvGwfrSm Ctrl + Right click ESdyfum Open command windows here
udk a&G;cs,fvdkuf&ygr,f/
Trojan
Trojan eJY ywfoufvdkY tay:rSmvnf; tenf;i,f aqG;aEG;cJhjyD;ygjyD/
'DaeYacwfrSm awGY&rsm;wJh Trojan trsdK;tpm;uawmh Remote Access Trojan
(RAT) yg/ RAT udk vGwfvyfwJh oD;jcm; component oHk;ckeJY zefwD;xm;ygw,f/
Oyrmay;&&if Apocalypse vdkYac:wJh RAT eJY aqG;aEG;ygr,f/ Infected computer
rSm run Edkifr,fh Malicious code awGudk server rSm odrf;qnf;xm;ygw,f/
'Dae&mrSm server onf on victim om jzpfygw,f/ on attacker r[kwfygbl;/
client uawmh server udk xdef;csKyfEdkifzdkYtwGuf attacker u
zefwD;xm;wJh program jzpfygw,f/ data onf client eJY server Mum;rSm share
Edkifygw,f/ Hacker vdkcsifwJh yHkpHeJY zefwD;EdkifzdkYtwGuf server wnfaqmufwJh
program wpfck &Sdygao;w,f/ hacker taeeJY server uae listen on vkyfr,fh
port awGudk ajymif;vJwmrsdK;vnf; vkyfcsif vkyfEdkifovdk configure vkyfzdkY vdktyfwJh
registry key awGudkvnf;yJ establish vkyfEdkifygw,f/ jyD;awmh client & server Mum;
data traffic udkvnf;yJ encrypt jyKvkyfxm;csif jyKvkyfxm;Edkifygao;w,f/
DarkComet RAT
Remote Access Trojan (RAT) awGxJurS ckaqG;aEG;rSmu DarkComet
RAT jzpfygw,f/ bit.ly/dcRAT-kmn rSm a'gif;,lEdkifygw,f/ zip passwords
uawmh rekings.com yg/ install rvkyf&wJh portable app jzpfvdkY Folder
vdkufuav; odrf;xm;zdkYawmh vdkygr,f/
zGifhjyD; menu uae server module >> Full editor udk 0ifvdkufyg/
uRefawmfwdkYtaeeJY a&G;cs,f setting vkyfaqmifp&mawGudk
awGYjrif&ygr,f/
File Joiner
bit.ly/kmn-fj uae download &,ljyD; extract jznfxm;yg/
Portable file rdkY open vdkuf&HkeJY txufygtwdkif; jrifawGY&rSm jzpfygw,f/
Counter Measures
Counter Measure awGtaeeJY bmawG vkyfxm;oifhvJqdk&ifawmh
uRefawmfwdkY&JU company (or) organization rSm jzpfEdkif&if Windows udk License
version udk toHk;jyKzdkY eJY system update awG rSefrSef vkyfaqmifay;zdkY
vdktyfygw,f/
Anti-virus awGudk toHk;jyK&rSmjzpfovdk virus definition awGudkvnf;
update tjrJvkyfxm;zdkY vdktyfygw,f/ aemufwpfckuawmh vkyfief;wGif;rSm
network (csdwfqufxm;wJh) uGefysLwmwdkif;rSm toHk;jyKolawG tm;vHk;udk
(0efxrf;tm;vHk;udk) security qdkif&m todynmay;rIawG vdktyfrSmjzpfjyD; work
twGuf rjzpfrae toHk;jyK&r,fh application awGuvGJ&if usefwmawGudk xnfhoGif;
toHk;jyKcGifh rjyKzdkY vdkygw,f/
a&SUtcef;awGrSm aqG;aEG;cJhovdk Administrator Account uae
toHk;jyKwmrsdK; rvkyfapbJ other user account awGuae toHk;jyKapzdkY
pDpOfay;xm;&ygr,f/ vdktyfvdkY software awG &,l toHk;jyK&&ifvnf; trusted (or)
origin site awGuae &,ltoHk;jyKjcif;tm;jzifhvnf; umuG,fEdkifygw,f/ 'D
Chapter udkawmh 'Dae&mav;rSmyJ &yfem;&atmifyg/
CHAPTER 20: Virus and Worms
Introduction
Filetype Infection rSmawmh exe, txt, lnk, pdf, Mp3, Mp4, Doc, Xml,
Png ponfjzifh File trsdK;tpm;tvdkuf xdcdkufapvdkwJht&mudk one click vdkufyg/
tm;vHk;a&G;&ifawmh tm;vHk; ysufpD;oGm;rSmyg/
Worms
user
&JU vkyfaqmifcsuf wpfpHkwpf&mryg0ifygbJ network ay:rSm
tvG,fwul yGm;Edkifaom software trsdK;tpm;udk worm vdkY qdkEdkifygw,f/
olwdkYawG[m 0ifa&mufcH&wJh uGefysLwmay:rSm&SdwJh a'wmawG? application awGudk
xdcdkufapjcif; vHk;0r&Sdygbl;/ 'gayr,fholY&JU resource awGudk toHk;jyKjcif;aMumifh
network udkawmh xdcdkufaprSm jzpfygw,f/
Hacker awGuawmh worm awGudk Trojan awGeJY wGJzuf toHk;jyKavh
&SdMuygw,f/ Worm awG[m weak security udk ckwHk;vkyf toHk;csavh&SdMujyD;
outdated system awGudk csdK;azmuf ul;pufapzdkY ydkrdkvG,fulygw,f/ worm &JU
tm;omcsufu jyefYyGm;vG,frI jzpfygw,f/ worm wpfckavmuf vufawGY
zefwD;MunfhMu&atmifyg/
Worm Creating
uRefawmfwdkYu Programming avhvmaeolawG r[kwfao;wmaMumifh
tool udkyJ toHk;jyKzefwD;&rSmyg/ Worm zefwD;&mrSm oabmusrdwJh tool
wpfck&Sdygw,f/ Internet Worm Maker Thing vdkY ac:wJh tool wpfckyg/
bit.ly/iwmt-kmn uae a'gif;,lEdkifygw,f/ (xHk;pHtwdkif; 'DpmtkyfxJu
application awGudk bit.ly/kmn-app rSmvnf; awGYEdkifygw,f)
Version u 1 . 0
'Datmufbufutydkif;rSmawmh rdrdwdkY
vdktyfcsuftwdkif; trSefjcpfay;&HkygyJ
'Dae&mrSmawmh aeYpGJowfrSwfjyD;
vkyfaqmifvdku xnfhoGif;Edkifygw,f/
uRefawmfuawmh 'Dwdkif;av;yJ
csefcJhvdkufr,faemf
'Dae&mrSm trSefjcpf&if drive awG ray:awmh
Task Manager udk disable vkyfwm
Keyboard tvkyfrvkyfatmifvkyfwm
Mouse udk oHk;r&atmif vkyfwm
Message Box udk trSefjcpfxnfhjyD;
udk,fazmfjyvdk&mudk a&;Edkifygw,f/
'Dae&mrSm acgif;pOfxnfh
'Dae&mrSm azmfjycsufawGxnfh
icon a&G;
Introduction
WireShark
WireShark onf network analysis tool wpfck jzpfjyD;awmh Ethereal vdkY
todrsm;Muygw,f/ olu real time rSm packet awGudkzrf;,lay;EdkifjyD;
human-readable format tjzpf azmfjyay;Edkifygw,f/ WireShark rSm filter awG?
color-coding awGeJY network xJudk ydkjyD; eufeuf&dIif;&Idif; 0ifa&mufEdkifapjyD;
individual packet awGudk inspect vkyfay;Edkifr,fh feature awG yg0ifygw,f/
WireShark onf packet awGudk capture vkyfEdkifzdkYtwGuf pcap udk
toHk;jyKxm;jyD; CNU/Linux, OS X, BSD, Solaris eJY tjcm;aom Unix-like
Operating System awGtjyif Microsoft Windows rSmyg toHk;jyKEdkifzdkY zefwD;xm;
ygw,f/ uRefawmfwdkY toHk;jyKr,fh Kali Linux rSmawmh toifh yg&SdjyD;jzpfygw,f/
WireShark rSm TShark vdkYac:wJh (GUI version r[kwfwJh) terminal-based
version wpfrsdK;vnf; &Sdygao;w,f/ Kali Linux rSm TShark vnf; yg0ifjyD;om;
jzpfygw,f/
TCPdump
aemufxyf common packet analyzer wpfckuawmh TCPdump
jzpfygw,f/ command line interface tool wpfckjzpfjyD; uRefawmfwdkY uGefysLwmeJY
csdwfqufxm;wJh network ay:rSm &SdaewJh packet awGudk transmit a&m receive yg
vkyfaqmifEdkifygw,f/
ARP spoofing qdkwm Local Area Network wpfckay:udk fake (or) spoof
vkyfxm;wJh Address Resolution Protocol (ARP) message awGudk attacker uae
zefwD;ay;ydkYwJh enf;pepfwpfck jzpfygw,f/
ARP Poisoning
ARP poisoning eJY ywfoufjyD; b,fvdkawG vkyfaqmifEdkifvJqdkwmudk
Cain and Able udk oHk;jyD; aqG;aEG;jyoGm;ay;yghr,f/
DNS spoofing
olYudkawmh DNS cache poisoning vdkYvnf; ac:Muygw,f/ DNS
spoofing uawmh Domain Name System (DNS) name server's cache database
xJudk rrSefuefwJh data awGudk b,fenf;eJYrqdk introduce vkyfwJh
computer-hacking attack wpfrsdK; jzpfygw,f/ 'Dvdk vkyfaqmifjcif;tm;jzifh Name
Server onf incorrect IP address awGxH return jyefapwmrsdK;udk jzpfyGm;ap?
traffic awGudk attacker &JU uGefysLwmqD vrf;vGJa&mufoGm;ap Edkifygw,f/
Introduction
Havij (Windows)
uRefawmfwdkYtaeeJY SQL injection vkyf&mrSm toHk;jyKEdkifr,fh Tool awG
&Sdygw,f/ Windows rSm oHk;EdkifwJh Tool ESpfckudk t&ifqHk; azmfjyay;ygr,f/ yxr
wpfcku Havij yg/ bit.ly/havijexe (password havijpro) uae a'gif;,lEdkifygw,f/
(xHk;pHtwdkif; App awGudk pkay;xm;wJh page rSmvnf; oGm;a&muf
&,lEdkifygw,fcifAsm)
Introduction
Area of Consider
uRefawmfwdkYawG&JU rdkbdkif;zkef;awGay: xm;&SdwJh cHpm;csufawGtvdkuf
rdkbdkif;zkef;awGonf w&dyf&dyf wd;k wufvsuf &SdaeMuygw,f/ uRefawmfwdkY&JU zkef;rSm
&SdaewJh tEå&m,fjzpfapEdkifwJh tcsufawGudk pOf;pm;Munfh&atmifyg/
'DvdkpOf;pm;wJhtcg yxrqHk; xnfhawG;&r,fhtcsufu uRefawmfwdkY&JU
rdkbdkif;zkef;awG&JU vHkjcHKrIygyJ/ vHkjcHKrIudk xdcdkufEdkifacsawGtaeeJY zkef;aysmufoGm;wm?
zkef;cdk;cH&wm? wireless access point wpfckckeJY csdwfqufae&wm? USB cable BudK;eJY
tm;oGif;ae&wm pwmawG jzpfygw,f/
aemufwpfcsuf uRefawmfwdkY pOf;pm;&rSmu application security yg/
uRefawmfwdkY&JU rdkbdkif;zkef;awGxJrSm xnfhoGif;xm;wJh application awGeJY
yufoufwJh pdk;&drfp&mtcsuftvufawGudkvnf; xnfhwGuf&ygr,f/ tcsdKUaom
Application awGonf uRefawmfwdkYxHrS user information awGudk
cdk;,laeMuw,fqdkwm Threat Report awGudk avhvmjcif;jzifh od&SdEdkifygw,f/
xdkodkYaom Application awGonf unauthorized application store awGuae
trsm;qHk; &&SdEdkifw,fqdkayr,fh Google Play Store vdk ,HkMunfpdwfcs&ygw,f
qdkwJh Application Store rSmawmifrS awGY&wwfygao;w,f/
'gawGtjyif wifi, bluetooth wdkYvdk wireless enf;ynmawGudkyg
zkef;awGxJrSm xnfhoGif;toHk;jyKvmwmaMumifh wireless security udkyg
owdxm;&r,fhtxJrSm xnfhoGif;pOf;pm;&rSm jzpfygw,f/ aemufwpfcku
uRefawmfwdkY toHk;jyKaewJh Application awG&JU permission yg/ ,HkMunfpdwfcs&rI
r&SdwJh application awGudk permission ay;&mrSm owdjyKoifhygw,f/ Facebook,
Messenger, Viber wdkYvdk Application awGrSm Camera wdkY? Gallery wdkYudk
Permission awmif;wmudk vufcHay;vdkY&ayr,fh omref zkef;ayghatmif &Sif;ay;
w,fqdkwJh Application awGrSm camera, audio, gallery pwJh Access awGudk
awmif;cHaew,f&ifawmh 'gpOf;pm;p&m jzpfoGm;ygjyD/ Android Hacking udk
vufawGYav; enf;enf; vkyfMunfh&atmifyg/
meterpreter
xJa&mufjyD b,fvdk arTaESmuf&r,fqdkwm rod&ifawmh
help av; &dkufac:jyD; command awGeJY azmfjycsuf(Description) awGudk
MunfhEdkifygw,f/
ls
eJY List xkwfMunfhr,f qdk&ifawmh setup.sh qdkwJh zdkifav;udk
awGYjrif&ygr,f/ .sh zdkifjzpfvdkY ./ eJY run &r,fqdkwmudk odEdkifygw,f/
Fatrat
&JU main menu rSm Options 9 udk a&G;cs,fjyD; msf xJudk
qufvuf 0ifa&mufvdkufygw,f/
Introduction
exploit vdkufygjyD/
Metasploit Fundamentals
MSF Console
msfconsole onf Metasploit Framework &JU vlBudKufrsm;qHk; interface
wpfckjzpfygw,f/ MSF xJrSm &SdorQ feature awGudk wpfae&mwnf;uae
pkpnf;oHk;pGJEdkifatmif pDpOfxm;wJhtjyif MSF &JU Stable tjzpfqHk; interface
wpfckvnf; jzpfygw,f/
msf xJrSmyJ ping vdk command awGudkvnf; toHk;jyKEdkifygw,f/
Introduction
Botnets
'Dpum;vHk;udkvnf; uRefawmfwdkYtaeeJY &if;ESD;aumif; &if;ESD;ygvdrfhr,f/
Robot eJY Network pum;vHk;ESpfvHk;udk wGJqufjyD; twdkaumuf taeeJY ac:a0:Mu
wJh botnet u wu,fawmh rormwJhy&dk*&rfwpfck (malicious program) om
jzpfygw,f/ rormwJh vkyfaqmifcsufawG vkyfaqmif&mrSm cybercriminal
vdkYac:wJh Cyber &mZ0wfrI usL;vGefr,fholawGu xdef;csKyftoHk;jyKEdkifzdkY
&nf&G,fzefwD;xm;wJh program awGaygh/ tvG,fqHk;ajym&&if wdkufcdkuf&mrSm
yg0ifr,fh wyfom;awGudk pkaqmif;a&;vkyfwJh program awG jzpfygw,f/
aMumufp&maumif;wmu xdkodkY pkaqmif;&mrSm system owner awG&JU
od&SdrI rygbJ wpfenf;tm;jzifh rodbJ toHk;cscHvdkuf&jcif;rsdK;om jzpfygw,f/ xdkodkY
xdef;csKyfcHvdkuf&wJh program (compromised program) awGudk zombie awGvdkY
ac:qdkjyD; botnet awGudk cluster awGvdkYvnf; ac:Muygao;w,f/ attacker awGu
Cyber &mZ0wfrI wpfpHkwpf&m usL;vGefvdkwJhtcg rdrdwdkY udk,fydkifpufxuf
xdkodkYaom toHk;cscH device awGudk ydkjyD; toHk;jyKvdkMuygw,f/ botnet awGudk web
spidering eJY search engine indexing awGvdk aumif;wJhbufawGrSmvnf;
toHk;jyKEdkifygao;w,f/
botnet awGudk zefwD;arG;jrLxm;jyD; zombie awG rsm;EdkiforQ rsm;atmif
pkjyD; jyefvnfa&mif;csjciff;tygt0if botnet awGudk Ecosystem awGrSmyg toHk;jyK
wmrsdK;awGvnf; rsm;pGm&Sdaeygao;w,f/ 'Dtcef;rSmawmh wwfEdkiforQ xnfhoGif;
aqG;aEG;oGm;ygr,f/
Botnet Tools
botnet tool awGudk market rSm tvG,fwul &&SdEdkifygw,f/ vltrsm;
odMuwJh tool awGuawmh Win32.Shark, Plugbot, Poison Ivy, Illusion eJY Netbot
attacker pwmawGyg/
Win32.Shark uawmh Backdoor Trojan horse program wpfrsdK;
jzpfygw,f/ tjyeftvSef qufoG,fjcif;? firewall bypassing eJY remote
administration tool wpfck jzpfjyD; ul;pufcH&ygu uRefawmfwdkY&JU pepfawGxJudk
aeYpOf tjcm;aom malware awGudk qGJqGJoGif;aerSmjzpfygw,f/ oludk,fwdkifvnf;
spam email awGuaewpfqifh jyefYyGm;zdkY MudK;pm;ygao;w,f/ pop-up
advertisement awGuaewpfqifh ul;pufapjyD;awmh uRefawmfwdkY&JU system
registry xJudk malicious code awGudk xnfhoGif;ygvdrfhr,f/ security software
awGudk ydwfypfzdkY BudK;pm;rSmjzpfjyD; uRefawmfwdkY&JU pepfwpfckvHk;udk attacker u
xdef;csKyfvdkY &oGm;apzdkYvnf; tultnDay;rSmjzpfygw,f/
poison Ivy uawmh Remote Access Trojan (RAT) wpfrsdK;jzpfjyD;awmh
windows uGefysLwmawGtwGuf advanced remote administration tool wpfckvnf;
jzpfygw,f/ 'D tool udk toHk;jyKjyD; attacker u passwords eJY Banking Information
awGvdk ta&;ygwJh tcsuftvufawGudk cdk;,lEdkifrSmjzpfygw,f/ 'DvdkawG
aqG;aEG;aewJhtwGuf bot awG[m software awGvdkYawmh w&m;ao rSwf,lvdkY
r&ygbl;/ bmvdkYvJqdkawmh PlugBot awGonf power adapter avmufyJ &SdwJh
tvGefao;i,fwJh uGefysLwmav;wpfvHk;vnf; jzpfaeEdkifjyD; Penetration testing
device tjzpfvnf; toHk;jyKEdkifvdkY jzpfygw,f/
DoS & DDoS Tools
DDoS attack wpfckrSmawmh malicious code awG ul;pufjcif;cHae&wJh
xdef;csKyfcH pufawGudk toHk;csjyD; target system wpfckqDudk DoS wdkufcdkufrIawGudk
pkaygif;jyKvkyfapwm jzpfygw,f/ xdkodkY DDoS jyKvkyf&mrSm ausmfMum;wJh tol
awGuawmh LOIC (Low Orbit Ion Cannon), HOIC (High Orbit Ion Cannon),
Anonymous-DoS, Tor's Hammer, DDOSIM, DAVOSET, PyLoris, Moihack
Port-Flooder, XOIC eJY OWASP DoS HTTP Post wdkY jzpfygw,f/
Countermeasures
Countermeasure qdkwm tEå&m,f wpfpHkwpf&m BuHKvmwJhtcg od&SdjyD;
jyefvnfwkefYjyefvkyfaqmifEdkifzdkYtwGuf BudKwifpDpOf jyifqifxm;&r,fht&mawG vdkY
tMurf;zsif; rSwf,lEdkifygw,f/ umuG,fa&;tpDtpOf vdkY ajymvdkY&ayr,fh olY&JU
qdkvdk&if;u 'Dhxuf ydkygw,f/ tay:rSm aqG;aEG;cJhwJh detection technique oHk;ckudk
jyefaqG;aEG;oGm;ygr,f/
Activity profiling onf network traffic ay: tajccHygw,f/ attack
wpfckudk clusters awGMum;rSm activity level wdk;yGm;vmrIt& cGJjcm;owfrSwf
ygw,f/ DDoS jzpfpOfwpfckrSm Munfhr,fqdk&if activity (vkyfaqmifcsuf)
awGonf xif&Sm;wJh cluster awG tm;vHk;xJrSm odompGm wdk;vmygw,f/ Activity
profiling udk vkyfaqmifr,f qdk&ifawmh network packet awG&JU header
information awGudk apmifhMunfhppfaq;jcif; tm;jzifh vkyfaqmifEdkifygw,f/
jzpfEdkifacs&SdwJh UDP service tm;vHk;&JU wpfckcsif;pDtvdkuf pD;qif;rI
(flow) awGudk cGJjcrf;pdwfjzmcsifw,fqdk&ifawmh uRefawmfwdkYtaeeJY flow order
aygif; 264 ckavmufudk apmifhMunfhzdkY vdktyffygvdrfhr,f/ bmvdkYvJqdkawmh SNMP,
TCP, ICMP pwJh protocol awGyg yg0ifaevdkY jzpfygw,f/ cluster wpfckrSm
tpOfvdkuf jzpfwnfaewJh pD;qif;rItm;vHk;udk aygif;pyfvdkufr,fqdk&if xdk cluster
xJrSm&SdwJh activity level udk &&Sdygw,f/
'kwd, enf;vrf;wpfcku Sequential change-point detection technique
jzpfygw,f/ attack wpfckaMumifh jzpfay:vmwJh traffic awG &kwfcsnf; ajymif;vJjcif;
awGudk algorithm awGu cGJjcm;azmfjyay;Edkifygw,f/ 'D Detection technique onf
port tvdkuf? address tvdkuf? protocol tvdkuf target traffic data awGudk OD;pGm
ppfxkwfay;ygw,f/ jyD;awmh &vmwJh pD;qif;rIawGudk time series tjzpf
odrf;qnf;xm;ygw,f/ xdk time series awGudk cluster activity awGudk udk,fpm;jyK
wJh time domain tjzpf rSwf,ljyD; DoS flooding attack wpfck pwifwJhtcg
jzpfay:vmwJh tcsdef ajymif;vJrIawGudk jyoay;Edkifygw,f/ xdkodkY pOfqufrjywf
owfrSwfxm;wJh a'wmawGay:rSm aumif;pGm vkyfaqmifEdkifpGrf;&SdwJh algorithm
wpfrsdK;jzpfwJh CUSUM vdk change-point detection algorithm onf jzpfay:vmwJh
ajymif;vJrIawGay: tajccHjyD; DoS attack awGudk cGJjcm;nTefjyEdkifygw,f/
wwd,ajrmuf Detection technique uawmh wavelet analysis
jzpfygw,f/ Input signal awGudk wavelet awGxJrSm spectral component
awGtjzpf azmfjyxm;ygw,f/ wavelet awG[m wpfqufwpfpyfwnf;
jzpfay:EdkifwJh tcsdefeJY BudrfEIef;azmfjycsufawGudk vkyfaqmifay;EdkifwmaMumifh
BudrfEIef;wpfckrSm tcsdefuGm[rIay: rlwnfjyD; qHk;jzwfay;Edkifwm jzpfygw,f/
bmvdkYvJqdkawmh DoS eJY DDoS awG[m tcsdefcPtwGif;rSm BudrfEIef;aygif;
rsm;pGmudk ay;ydkY vkyfaqmifwJh enf;ynmwpfrsdK; jzpfvdkY omref toHk;jyKcsdefawGrSm
jzpfay:EdkifwJh tjrifhqHk; BudrfEIef;eJY tcsdef tcsdK;xuf rsm;pGm ydkomaerSmrdkYygyJ/
botnet eJY ywfoufjyD; umuG,fa&;vkyfaqmifp&m enf;vrf; av;ck
&Sdygw,f/ yxrenf;vrf;u RFC 3704 filtering udk toHk;jyKjyD; toHk;rjyKwJh IP
address awGqDrS traffic awGudk ppfxkwfzdkY jzpfygw,f/ 'kwd, enf;vrf;uawmh
source awGxH inform rvkyfbJ network node awGGqDrSm 0ifa&mufvmwJh traffic
awGudk avQmhcsjcif;tm;jzifh black hole filtering vkyfzdkY jzpfygw,f/ aemufqHk;enf;
vrf; uawmh CISCO IPS Source IP reputation filtering udk toHk;jyKzdkYyg/
aemufqHk;enf;vrf;onf DDoS umuG,fjcif;twGufyg toHk;0ifygao;w,f/
aemufwpfcsufu uRefawmfwdkYtaeeJY DDoS udk umuG,fEdkifwJh tool
awGudkvnf; odxm;oifhygw,f/ tool qdkayr,fh software & hardware ESpfrsdK;vHk;
&Sdygw,f/ bmawGvJqdkawmh DDoS Protector, FortiDDoS appliances, Arbor
Pravail Availability Protection System, Cisco Guard XT, Wanguard, SDL
Regex Fuzzer, NetFlow Analyzer, Netscaler application firewall eJY Anti-DDoS
Guardian wdkYyJ jzpfygw,f/
uRefawmfwdkY&JU euf0yfxJrSm &SdaewJh tm;enf;csuf (vulnerabilities)
awGudk &SmazGjyD; jyifqifEdkifzdkY BudK;pm;&ygr,f/ 'DvdkvkyfaqmifzdkYtwGufawmh
Penetration Testing &JU tcef;u@u ta&;ygvmygw,f/ uRefawmfwdkYtaeeJY
uRefawmfwdkY&JU Network awGudk tm;enf;csuf&SmazGjyifqifwmrsdK;
vkyfaqmifrxm;bl;qdk&ifawmh attacker awGtaeeJY uRefawmfwdkY&JU network
awGxJudk xGif;azmuf0ifa&mufwmrsdK;? DDoS attack rsdK;awG jyKvkyfjyD; vkyfief;pOf
awG ysuf,Gif;oGm;atmif aqmif&GufwmrsdK;awGudk awGYBuHK&Edkifygw,f/
vkyfaqmifoifhwJh tqifh tenf;i,fudk aqG;aEG;azmfjyay;oGm;ygr,f/
1/ wnfjrJrIeJY vkyfaqmifcsuf awGudk prf;oyfppfaq;EdkifzdkYtwGuf application or
server ay:rSm artificial load wpfckudk xm;&Sdjcif;jzifh heavy load awGudk
ppfaq;zdkYyg/ 'DvdkvkyfaqmifEdkifzdkYtwGuf Webserver Stress Tool, Web Stress
Tester eJY JMeter wdkYvdk tool awGudk toHk;jyKEdkifygw,f/
2/ uRefawmfwdkY&JU euf0yfawGudk Scanning jyKvkyfjyD; tm;enf;csufawGudk &SmazG
ppfaq;&ygr,f/ tJ'gawG vkyfaqmifEdkifzdkYtwGufawmh uRefawmfwdkYtaeeJY Nmap,
GFI LANGuard eJY Nessus wdkYvdk Powerful Scanner awGudk toHk;jyKEdkifygw,f/
3/ connection request packet awGudk tqufrjywf toHk;jyKjyD; uRefawmfwdkY&JU
server ay:rSm SYN attack wpfck run MunfhEdkifygw,f/ run zdkYawmh DoS HTTP,
Sprut eJY PHDoS wdkYudk oHk;Edkifygw,f/
4/ aemufwpfcsufu TCP eJY UDP packet aygif;rsm;pGmudk tqufrjywf
ay;ydkYjcif;tm;jzifh Port Flooding attack rsdK;awGvnf; vkyfaqmifMunfhoifhygw,f/
'Dvdk prf;oyf vkyfaqmifzdkYtwGufawmh TCP port awGtwGuf Mutilate udk
oHk;EdkifjyD; UDP port awGtwGufawmh Pepsi5 udk toHk;jyKEdkifygw,f/
5/ email server awG xm;&Sdygu email bomber awGudk run MunfhjyD;
prf;oyfEdkifygw,f/ Mail Bomber wdkY Advanced Mail Bomber tool wdkYudk
oHk;jyD;aygh/
6/ guest book eJY website form awGrSm bogus entry vdkYac:wJh tcsuftvuftwk
awG jznfhoGif;jcif;? xif&mjrif&m entry t&SnfBuD;awG jznfhoGif;Munfhjcif; pwJh
vkyfaqmifcsufawGeJY flood jzpfatmif vkyfMunfhyg/
7/ &SmazGawGY&SdorQ tcsufawGudk rSwfwrf;wifxm;jyD; oufqdkif&m u@tvdkuf
wm0ef&SdolawGxH wifjyjcif; nSdEIdif;jyifqifjcif; jyefvnfppfaq;jcif; pwmawG
vkyfaqmifEdkifygw,f/
txufyg tqifh 7 qifhonf Penetrating Tester awGtaeeJY aqmif&Guf
oifhwJh tcsufawG jzpfygw,f/ 'DtcsufawGudk *&kpdkuf &SmazGjyD; vdktyfcsufawG
jyifqifjznfhwif;xm;EdkifjyD qdk&ifawmh uRefawmfwdkY&JU pepfawGonf tweftoifh
vHkjcHKrI &SdoGm;ygjyD/ Advanced taeeJY qufvkyf&rSmawGu defence play qdkwJh
umuG,fa&; tpDtpOf vkyfaqmifxm;zdkY? Layered DDoS strategy jyifqifxm;zdkY?
DNS server awGeJY tjcm;aom critical infrastructure awGudk umuG,fxm;zdkYeJY
DDoS protection awGudk vkyfaqmifxm;zdkY vdktyfygw,f/
CHAPTER 26: Port Forwarding for WAN attacks
Introduction