Gi\u1edbi thi\u1ec7u v\u1ec1 Pwnable <\/h2>\n
Pwnable hay vi\u1ebft t\u1eaft l\u00e0 pwn, l\u00e0 m\u1ed9t h\u00ecnh th\u1ee9c thi d\u1ea1ng tr\u1ea3 l\u1eddi theo t\u1eebng ch\u1ee7 \u0111\u1ec1 (Jeopardy) trong cu\u1ed9c thi CTF (Capture the flag). <\/p>\n
Pwn t\u1eadp trung v\u00e0o c\u00e1c k\u1ef9 thu\u1eadt t\u1ea5n c\u00f4ng v\u00e0o h\u1ec7 th\u1ed1ng, ph\u00e1t hi\u1ec7n v\u00e0 khai th\u00e1c c\u00e1c l\u1ed7 h\u1ed5ng tr\u00ean c\u00e1c n\u1ec1n t\u1ea3ng h\u1ec7 \u0111i\u1ec1u h\u00e0nh Linux & Windows. Trong kho\u1ea3ng th\u1eddi gian g\u1ea7n \u0111\u00e2y, c\u00e1c cu\u1ed9c thi CTF l\u1edbn nh\u01b0 DEFCON, HITCON, .. ph\u00e1t tri\u1ec3n h\u00ecnh th\u1ee9c thi pwn k\u1ebft h\u1ee3p v\u1edbi c\u00e1c ch\u1ee7 \u0111\u1ec1 kh\u00e1c nh\u01b0 RE (Reverse engineering), Web, Crytography, Forensic, .. \u0111\u1ec3 l\u00e0m \u0111a d\u1ea1ng h\u00f3a \u0111\u1ec1 thi \u0111\u1ed3ng th\u1eddi t\u0103ng t\u00ednh th\u1ef1c t\u1ebf cho \u0111\u1ec1 thi.<\/p>\n
Pwn kh\u00f3 hay d\u1ec5 <\/h2>\n
Theo m\u00ecnh th\u00ec n\u1ebfu hi\u1ec3u r\u00f5 v\u1ec1 c\u00e1c ki\u1ebfn th\u1ee9c c\u01a1 b\u1ea3n nh\u01b0 m\u00ecnh \u0111\u00e3 n\u00eau \u1edf ph\u1ea7n gi\u1edbi thi\u1ec7u th\u00ec s\u1ebd kh\u00f4ng kh\u00f3 \u0111\u1ec3 h\u1ecdc pwn. Kh\u00f3 \u1edf \u0111\u00e2y l\u00e0 kinh nghi\u1ec7m, \u0111\u1ed1i v\u1edbi nh\u1eefng ng\u01b0\u1eddi \u0111\u00e3 ch\u01a1i m\u1ed9t th\u1eddi gian d\u00e0i v\u1edbi pwn th\u00ec h\u1ecd s\u1ebd t\u1ef1 nghi\u1ec7m ra nh\u1eefng d\u1ea1ng \u0111\u1ec1, nh\u1eefng trick \u0111\u1ec3 ph\u00e2n t\u00edch nhanh d\u1ea1ng \u0111\u1ec1 \u0111\u00f3. Ngo\u00e0i ra c\u00f2n ph\u1ea3i d\u1ef1a v\u00e0o ng\u01b0\u1eddi ra \u0111\u1ec1, n\u1ebfu m\u1ed9t ng\u01b0\u1eddi ra \u0111\u1ec1 hay th\u00ec ng\u01b0\u1eddi \u0111\u00f3 s\u1ebd d\u1eabn d\u1eaft m\u00ecnh \u0111i \u0111\u00fang h\u01b0\u1edbng \u0111\u1ebfn flag m\u00e0 h\u1ecd mu\u1ed1n, c\u00f2n nh\u1eefng ng\u01b0\u1eddi ra \u0111\u1ec1 d\u1edf th\u00ec ng\u01b0\u1ee3c l\u1ea1i, khi\u1ebfn m\u00ecnh r\u1ed1i r\u1eafm trong qu\u00e1 tr\u00ecnh l\u00e0m c\u0169ng nh\u01b0 kh\u00f4ng hi\u1ec3u \u0111\u1ec1 n\u00e0y \u0111ang mu\u1ed1n n\u00f3i v\u1ec1 v\u1ea5n \u0111\u1ec1 g\u00ec >”<\/p>\n
\u1ee8ng d\u1ee5ng th\u1ef1c t\u1ebf <\/h2>\n
M\u00ecnh ch\u01b0a \u0111i l\u00e0m, c\u0169ng nh\u01b0 ch\u01b0a s\u1eed d\u1ee5ng pwn trong \u1ee9ng d\u1ee5ng th\u1ef1c t\u1ebf g\u00ec nhi\u1ec1u n\u00ean nh\u1eefng g\u00ec m\u00ecnh n\u00f3i s\u1eafp t\u1edbi c\u0169ng ch\u1ec9 l\u00e0 ph\u1ecfng \u0111o\u00e1n, c\u1ed9ng th\u00eam th\u1ea5y nhi\u1ec1u ti\u1ec1n b\u1ed1i \u0111i tr\u01b0\u1edbc c\u0169ng t\u1eeb pwn m\u00e0 ph\u00e1t tri\u1ec3n l\u00ean b\u01b0\u1edbc ti\u1ebfn xa h\u01a1n. <\/p>\n
Pwn l\u00e0 nghi\u00ean c\u1ee9u c\u00e1c k\u1ef9 thu\u1eadt t\u1ea5n c\u00f4ng, ph\u00e1t hi\u1ec7n v\u00e0 khai th\u00e1c c\u00e1c l\u1ed7 h\u1ed5ng tr\u00ean nhi\u1ec1u n\u1ec1n t\u1ea3ng th\u00ec tr\u01b0\u1edbc ti\u00ean, h\u1ecdc pwn th\u00ec c\u00e1c b\u1ea1n c\u00f3 th\u1ec3 b\u01b0\u1edbc \u0111i xa h\u01a1n nh\u01b0 l\u00e0 t\u00ecm ki\u1ebfm c\u00e1c l\u1ed7 h\u1ed5ng CVE, c\u00e1c l\u1ed7 h\u1ed5ng 0day, ..<\/p>\n
B\u1ea1n \u0111ang xem: Pwnable l\u00e0 g\u00ec<\/a><\/p>\n Xem th\u00eam: C\u00e1c M\u1eabu C\u1ea7u Thang G\u1ed7 \u0110\u1eb9p Cho Nh\u00e0 \u1ed0ng \u0110\u1eb9p Hi\u1ec7n \u0110\u1ea1i T\u1ea1i H\u00e0 N\u1ed9i<\/a><\/p>\n