• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

Basic hacking knowledge you should know – Part 2

AnonyViet by AnonyViet
January 29, 2023
in Security
0

Coming to the next part of the series “Basic hacking knowledge should know”. In this part 2, I will share some more hacking knowledge for everyone. Hope these knowledge will help you learn more good things.

Join the channel Telegram of the AnonyViet 👉 Link 👈

If you forgot some knowledge in the previous section, you can click Part 1 to read it again.

Basic knowledge of Trojan, worm, virus, logicbomb?

First of all, I want to briefly explain about these types. These are the same viruses that made history back in the day. You should find out if you don’t know yet! We will talk about them one by one to make it easier for you to imagine.

What are Trojans?

You can briefly understand this is a spy program that is installed on your computer to steal information. Then send everything back to its owner. Here, what it targets is stealing accounts, passwords or cookies, etc.

In general, it will give full control of the computer to its owner. They can gain access to control your computer or steal anything they want.Basic hacking knowledge you should know - Part 2 6

Talking about Viruses

A program that contains special code that is installed or spread from other computers to the victim’s computer. It is responsible for fulfilling the requirements of the code that its owner wrote. Often viruses will be used to destroy data and computers.

Basic hacking knowledge

Worms are… ?

In short, a worm is a standalone program. It can replicate itself and spread throughout the network. Worms are also often used for the same purpose as viruses. It destroys data, destroys inside the network and more dangerously can bring down the entire network.

Finally, LogicBomb

A program that sends multiple packets of data at the same time to the same address. It will “fatigue” the system, block the transmission. Moreover, it is used as a tool to “terrorize” the enemy (bomb mail).

Basic hacking knowledge you should know - Part 2 7

What is PGP?

” Pretty Good Privacy “also known as PGP for short. This is a tool that uses public key encryption to protect email data and records. PGP is a highly secure form of encryption that uses software for MS_DOS, VAX/VMS, Unix and for other forms

What are proxies?

In simple terms, a proxy is an Internet server that relays information and controls the security of Internet access, also known as Internet service clients. Proxy server is the installation station of the proxy. Proxy or proxy installation station has an IP address and a fixed access port.

You can understand is another computer that is responsible for processing data. It is like an information converter of the Internet signal. With the connection through 1 or more servers as above. Initially, the user’s computer sends the request signal through the proxy server. Here, that information will be processed and sent back to what you see every time you access the Internet.

Proxy allows users to access services on the Internet in a direct sense. With dual host homed, you need to login to the host before using a service on the Internet. Because proxies allow users to access Internet services from their personal systems. Therefore, it does not allow packets to go directly between the user system and the Internet. The path is either indirect through the dual homed host or through a combination of the Bastion host and the screening router.Basic hacking knowledge you should know - Part 2 8

What is Unix?

Unix is ​​a Windows-like operating system. It can run on many different computers including personal computers or service servers. It is a multitasking operating system and is written in the C programming language. And Unix is ​​also the operating system that hackers often use.Basic hacking knowledge you should know - Part 2 9

What is Telnet?

Telnet is a program that allows us to connect to another machine through a port (also called a port). Every computer or server has ports, here are some common ones:

  • Port 21: FTP
  • Port 23: Telnet

Eg: You can call Telnet to connect to mail.virgin.net on port 25 .Basic hacking knowledge you should know - Part 2 10

How do I know I have Telnet to the Unix system?

I will tell you how a Unix system can greet you when you connect to it. When you call Unix, it will normally appear with the line : ” Log in: “, (but with that alone, this is not necessarily Unix except they appear before the word “log in”)

We are now at the prompt.” log in: “, you need to enter a valid account. A normal account has 8 or more properties, after you enter the account you will see a password, please try to enter Default Password Try the following table:

Account/Default Password
Root/ Root
Sys/Sys/System/Bin
Bin/Sys/Bin
Mountfsy/Mountfsys
NuucAnon
Anon/Anon
User/User
Games/Games
InstallInstall
DemoDemo
GuestGuest

What is a shell account?

A shell account allows you to use your home computer as a terminal with which you can type commands to another computer running Unix. “Shell” is the program that translates the characters you send and will be put into the execution of the Unix program’s command. With a correct shell account you can use a workstation far more powerful than you could ever imagine.

Here is the Bonus part

Download

Leave ads to support AnonyViet!

Like Fanpage or follow website for quick updates of good articles.

AnonyViet-HanPhu

The article achieved: 5/5 – (100 votes)

Tags: BasichackingKnowledgePart
Previous Post

Are Mac computers more secure than Windows?

Next Post

How to play Among Us on Smartphone and computer

AnonyViet

AnonyViet

Related Posts

How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Seekr: Collect & manage OSINT data
Security

Seekr: Collect & manage OSINT data

November 22, 2024
Next Post
How to play Among Us on Smartphone and computer

How to play Among Us on Smartphone and computer

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

Discover Supermix – Smart playlist on YouTube Music

Discover Supermix – Smart playlist on YouTube Music

May 20, 2025
The 10 best Torrent websites today – 100% still operate

The 10 best Torrent websites today – 100% still operate

May 20, 2025
Share Code Shop Selling Acc game extremely lightweight written in bootstrap

Share Code Shop Selling Acc game extremely lightweight written in bootstrap

May 19, 2025
Instructions for downloading all photos and story from Instagram

Instructions for downloading all photos and story from Instagram

May 19, 2025
Discover Supermix – Smart playlist on YouTube Music

Discover Supermix – Smart playlist on YouTube Music

May 20, 2025
The 10 best Torrent websites today – 100% still operate

The 10 best Torrent websites today – 100% still operate

May 20, 2025
Share Code Shop Selling Acc game extremely lightweight written in bootstrap

Share Code Shop Selling Acc game extremely lightweight written in bootstrap

May 19, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

Discover Supermix – Smart playlist on YouTube Music

Discover Supermix – Smart playlist on YouTube Music

May 20, 2025
The 10 best Torrent websites today – 100% still operate

The 10 best Torrent websites today – 100% still operate

May 20, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET bongdaso

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET bongdaso