{"id":611,"date":"2022-09-15T18:13:39","date_gmt":"2022-09-15T18:13:39","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=611"},"modified":"2022-09-15T18:13:39","modified_gmt":"2022-09-15T18:13:39","slug":"tan-cong-tu-xa","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/tan-cong-tu-xa\/","title":{"rendered":"T\u1ea5n c\u00f4ng t\u1eeb xa"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"what-is-a-remote-attack\"><strong>T\u1ea5n c\u00f4ng t\u1eeb xa l\u00e0 g\u00ec?<\/strong><\/h2>\n\n\n<p>Khi m\u1ed9t t\u00ean tr\u1ed9m \u0111\u1ed9t nh\u1eadp v\u00e0o nh\u00e0 \u0111\u1ec3 l\u1ea5y \u0111\u1ed3 v\u1eadt, ch\u00fang c\u00f3 nguy c\u01a1 \u0111\u1ec3 l\u1ea1i b\u1eb1ng ch\u1ee9ng DNA ho\u1eb7c d\u1ea5u v\u00e2n tay c\u00f3 th\u1ec3 d\u1eabn \u0111\u1ebfn vi\u1ec7c b\u1ecb b\u1eaft gi\u1eef. Tuy nhi\u00ean, tin t\u1eb7c th\u1ef1c hi\u1ec7n t\u1ed9i ph\u1ea1m m\u1ea1ng c\u00f3 th\u1ec3 l\u00e0m \u0111i\u1ec1u \u0111\u00f3 m\u00e0 kh\u00f4ng c\u1ea7n \u1edf c\u00f9ng khu v\u1ef1c v\u1edbi n\u1ea1n nh\u00e2n c\u1ee7a h\u1ecd v\u00e0 do \u0111\u00f3 \u00edt c\u00f3 kh\u1ea3 n\u0103ng b\u1ecb b\u1eaft h\u01a1n nhi\u1ec1u. Ngo\u00e0i ra, nh\u1eefng tin t\u1eb7c c\u00f3 kinh nghi\u1ec7m c\u00f3 th\u1ec3 g\u00e0i b\u1eaby ng\u01b0\u1eddi v\u00f4 t\u1ed9i b\u1eb1ng c\u00e1ch c\u00e0i \u0111\u1eb7t b\u1eb1ng ch\u1ee9ng gi\u1ea3 tr\u00ean m\u1ea1ng ch\u1ec9 v\u1ec1 c\u00e1c thi\u1ebft b\u1ecb k\u1ef9 thu\u1eadt s\u1ed1 ho\u1eb7c t\u00e0i kho\u1ea3n c\u1ee7a ng\u01b0\u1eddi v\u00f4 t\u1ed9i.<\/p>\n\n\n\n<p>V\u00ec nh\u1eefng tin t\u1eb7c c\u00f3 kinh nghi\u1ec7m c\u00f3 k\u1ef9 n\u0103ng t\u00ecm ra \u0111i\u1ec3m y\u1ebfu trong c\u00e1c h\u1ec7 th\u1ed1ng hi\u1ec7n t\u1ea1i, kh\u00f4ng c\u00f3 c\u00f4ng c\u1ee5 ho\u1eb7c ph\u01b0\u01a1ng ph\u00e1p ph\u00f2ng ng\u1eeba n\u00e0o c\u00f3 th\u1ec3 ng\u0103n ch\u1eb7n ch\u00fang. Th\u1eadt kh\u00f4ng may, nh\u1eefng ng\u01b0\u1eddi ch\u1ecbu tr\u00e1ch nhi\u1ec7m ph\u00e1t tri\u1ec3n c\u00e1c bi\u1ec7n ph\u00e1p ph\u00e1p l\u00fd \u0111\u1ec3 b\u1ea3o v\u1ec7 con ng\u01b0\u1eddi v\u00e0 doanh nghi\u1ec7p kh\u1ecfi b\u1ecb t\u1ea5n c\u00f4ng kh\u00f4ng c\u00f3 v\u1ebb th\u1ef1c s\u1ef1 am hi\u1ec3u ho\u1eb7c quan t\u00e2m \u0111\u1ebfn v\u1ea5n \u0111\u1ec1 n\u00e0y.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-remote-attacks\"><strong>C\u00e1c lo\u1ea1i t\u1ea5n c\u00f4ng t\u1eeb xa<\/strong><\/h2>\n\n\n<p>K\u1ebb t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 ki\u1ec3m so\u00e1t h\u1ec7 th\u1ed1ng t\u1eeb xa theo nhi\u1ec1u c\u00e1ch kh\u00e1c nhau:<\/p>\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"dns-poisoning\">\u0110\u1ea7u \u0111\u1ed9c DNS<\/h3>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-619\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic.jpg\" alt=\"\u0110\u1ed3 h\u1ecda th\u00f4ng tin t\u1ea5n c\u00f4ng \u0111\u1ea7u \u0111\u1ed9c DNS \" width=\"823\" height=\"566\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic.jpg 800w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 823px) 100vw, 823px\" \/><\/figure>\n\n\n\n<p>M\u1ed7i thi\u1ebft b\u1ecb v\u00e0 m\u00e1y ch\u1ee7 \u0111\u1ec1u c\u00f3 m\u1ed9t t\u1eadp h\u1ee3p c\u00e1c s\u1ed1 g\u1ecdi l\u00e0 \u0111\u1ecba ch\u1ec9 giao th\u1ee9c internet (IP) \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 nh\u1eadn d\u1ea1ng trong c\u00e1c giao ti\u1ebfp. M\u1ed7i trang web c\u00f3 m\u1ed9t t\u00ean mi\u1ec1n \u0111\u1ec3 gi\u00fap m\u1ecdi ng\u01b0\u1eddi t\u00ecm th\u1ea5y c\u00e1c trang web h\u1ecd mu\u1ed1n (v\u00ed d\u1ee5: www.domain.com). H\u1ec7 th\u1ed1ng t\u00ean mi\u1ec1n (<a href=\"https:\/\/www.javatpoint.com\/computer-network-dns\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DNS<\/a>) chuy\u1ec3n \u0111\u1ed5i t\u00ean mi\u1ec1n do ng\u01b0\u1eddi d\u00f9ng ch\u1ec9 \u0111\u1ecbnh th\u00e0nh \u0111\u1ecba ch\u1ec9 IP \u0111\u00fang b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng c\u00e1c m\u00e1y ch\u1ee7 DNS \u0111\u1ec3 \u0111\u1ecbnh tuy\u1ebfn l\u01b0u l\u01b0\u1ee3ng m\u1ed9t c\u00e1ch th\u00edch h\u1ee3p. T\u1ea5t c\u1ea3 \u0111i\u1ec1u n\u00e0y \u0111\u01b0\u1ee3c qu\u1ea3n l\u00fd th\u00f4ng qua c\u00e1c m\u00e1y ch\u1ee7 DNS.<\/p>\n\n\n\n<p>\u0110\u1ea7u \u0111\u1ed9c DNS l\u00e0 khi k\u1ebb t\u1ea5n c\u00f4ng chuy\u1ec3n h\u01b0\u1edbng l\u01b0u l\u01b0\u1ee3ng t\u1eeb trang web d\u1ef1 \u0111\u1ecbnh \u0111\u1ebfn m\u1ed9t trang web gi\u1ea3 m\u1ea1o b\u1eb1ng c\u00e1ch thay \u0111\u1ed5i c\u00e1c b\u1ea3n ghi DNS. V\u00ed d\u1ee5, n\u1ebfu b\u1ea1n c\u1ed1 g\u1eafng \u0111\u0103ng nh\u1eadp v\u00e0o t\u00e0i kho\u1ea3n ng\u00e2n h\u00e0ng tr\u1ef1c tuy\u1ebfn c\u1ee7a m\u00ecnh, nh\u01b0ng thay v\u00e0o \u0111\u00f3 b\u1ea1n b\u1ecb chuy\u1ec3n h\u01b0\u1edbng \u0111\u1ebfn m\u1ed9t trang tr\u00f4ng gi\u1ed1ng h\u1ec7t trang \u0111\u0103ng nh\u1eadp c\u1ee7a ng\u00e2n h\u00e0ng, k\u1ebb t\u1ea5n c\u00f4ng \u0111\u00e3 th\u1ef1c hi\u1ec7n m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng \u0111\u1ea7u \u0111\u1ed9c DNS. N\u1ebfu b\u1ea1n nh\u1eadp th\u00f4ng tin nh\u1ea1y c\u1ea3m v\u00e0o trang web gi\u1ea3 m\u1ea1o n\u00e0y, k\u1ebb t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 \u0111\u00e1nh c\u1eafp th\u00f4ng tin c\u1ee7a b\u1ea1n \u0111\u1ec3 tr\u1ee5c l\u1ee3i.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"port-scanning\">Qu\u00e9t c\u1ed5ng<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"820\" height=\"564\" class=\"wp-image-626\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic.jpg\" alt=\"\u0110\u1ed3 h\u1ecda th\u00f4ng tin chi\u1ebfm quy\u1ec1n \u0111i\u1ec1u khi\u1ec3n TCP IP\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic.jpg 820w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 820px) 100vw, 820px\" \/><\/figure>\n\n\n\n<p>Qu\u00e9t c\u1ed5ng l\u00e0 c\u00e1ch \u0111\u1ec3 t\u00ecm ra c\u1ed5ng n\u00e0o tr\u00ean m\u1ea1ng \u0111ang m\u1edf. \u0110i\u1ec1u n\u00e0y \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n b\u1eb1ng c\u00e1ch c\u1ed1 g\u1eafng g\u1eedi v\u00e0 nh\u1eadn d\u1eef li\u1ec7u qua t\u1eebng c\u1ed5ng, gi\u1ed1ng nh\u01b0 g\u00f5 c\u1eeda \u0111\u1ec3 xem c\u00f3 ai \u1edf nh\u00e0 kh\u00f4ng. N\u1ebfu c\u00f3 ng\u01b0\u1eddi tr\u1ea3 l\u1eddi, b\u1ea1n bi\u1ebft r\u1eb1ng c\u1ed5ng \u0111ang m\u1edf. H\u1ecd th\u1ef1c hi\u1ec7n qu\u00e9t c\u1ed5ng \u0111\u1ed1i v\u1edbi m\u1ed9t m\u1ea1ng ho\u1eb7c m\u00e1y ch\u1ee7 \u0111\u1ec3 hi\u1ec3n th\u1ecb c\u1ed5ng n\u00e0o \u0111ang m\u1edf v\u00e0 l\u1eafng nghe (nh\u1eadn th\u00f4ng tin) v\u00e0 li\u1ec7u c\u00e1c thi\u1ebft b\u1ecb b\u1ea3o m\u1eadt nh\u01b0 t\u01b0\u1eddng l\u1eeda c\u00f3 t\u1ed3n t\u1ea1i gi\u1eefa ngu\u1ed3n v\u00e0 m\u1ee5c ti\u00eau hay kh\u00f4ng. Qu\u00e9t c\u1ed5ng c\u0169ng c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 nh\u1eadn di\u1ec7n m\u1ed9t thi\u1ebft b\u1ecb b\u1eb1ng c\u00e1ch xem x\u00e9t ho\u1ea1t \u0111\u1ed9ng c\u1ee7a t\u1eebng c\u1ed5ng.<\/p>\n\n\n\n<p>Ch\u01b0\u01a1ng tr\u00ecnh n\u00e0y kh\u00f4ng ch\u1ec9 \u0111\u01b0\u1ee3c c\u00e1c qu\u1ea3n tr\u1ecb vi\u00ean b\u1ea3o m\u1eadt s\u1eed d\u1ee5ng \u0111\u1ec3 gi\u00e1m s\u00e1t m\u1ea1ng c\u1ee7a h\u1ecd nh\u1eb1m ph\u00e1t hi\u1ec7n b\u1ea5t k\u1ef3 l\u1ed7 h\u1ed5ng n\u00e0o, m\u00e0 n\u00f3 c\u00f2n th\u01b0\u1eddng \u0111\u01b0\u1ee3c c\u00e1c tin t\u1eb7c s\u1eed d\u1ee5ng nh\u01b0 m\u1ed9t ph\u1ea7n c\u1ee7a qu\u00e1 tr\u00ecnh trinh s\u00e1t khi t\u00ecm ki\u1ebfm c\u00e1c \u0111i\u1ec3m y\u1ebfu \u0111\u1ec3 khai th\u00e1c.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"dos-attacks\">T\u1ea5n c\u00f4ng DoS<\/h3>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-628\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic-.jpg\" alt=\"\u0110\u1ed3 h\u1ecda th\u00f4ng tin t\u1ea5n c\u00f4ng Dos \" width=\"825\" height=\"568\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic-.jpg 820w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic--300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic--768x528.jpg 768w\" sizes=\"auto, (max-width: 825px) 100vw, 825px\" \/><\/figure>\n\n\n\n<p>M\u1ee5c ti\u00eau c\u1ee7a m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DoS l\u00e0 ng\u0103n ch\u1eb7n nh\u1eefng ng\u01b0\u1eddi \u0111\u01b0\u1ee3c ph\u00e9p s\u1eed d\u1ee5ng m\u1ed9t m\u00e1y ho\u1eb7c m\u1ea1ng kh\u1ecfi vi\u1ec7c s\u1eed d\u1ee5ng n\u00f3. \u0110i\u1ec1u n\u00e0y \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n b\u1eb1ng c\u00e1ch l\u00e0m ng\u1eadp m\u1ee5c ti\u00eau v\u1edbi c\u00e1c c\u00e2u h\u1ecfi v\u00e0 d\u1eef li\u1ec7u g\u00e2y ra s\u1ef1 c\u1ed1 cho h\u1ec7 th\u1ed1ng. Nh\u00e2n vi\u00ean, th\u00e0nh vi\u00ean v\u00e0 ng\u01b0\u1eddi ti\u00eau d\u00f9ng kh\u00f4ng th\u1ec3 s\u1eed d\u1ee5ng h\u1ec7 th\u1ed1ng v\u00ec c\u00e1c y\u00eau c\u1ea7u h\u1ee3p ph\u00e1p c\u1ee7a h\u1ecd b\u1ecb \u00e1p \u0111\u1ea3o b\u1edfi c\u00e1c ho\u1ea1t \u0111\u1ed9ng b\u1ea5t h\u1ee3p ph\u00e1p c\u1ee7a k\u1ebb t\u1ea5n c\u00f4ng.<\/p>\n\n\n\n<p><a href=\"https:\/\/securitybriefing.net\/vi\/tan-cong-ddos\/tan-cong-ddos-la-gi\/\">C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS<\/a> c\u00f3 th\u1ec3 r\u1ea5t t\u1ed1n k\u00e9m cho nh\u1eefng ng\u01b0\u1eddi b\u1ecb \u1ea3nh h\u01b0\u1edfng. C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 li\u00ean quan \u0111\u1ebfn vi\u1ec7c \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u ho\u1eb7c t\u00e0i s\u1ea3n. C\u00e1c doanh nghi\u1ec7p, ch\u1eb3ng h\u1ea1n nh\u01b0 ng\u00e2n h\u00e0ng, c\u1eeda h\u00e0ng, c\u00f4ng ty truy\u1ec1n th\u00f4ng v\u00e0 c\u00e1c t\u1ed5 ch\u1ee9c ch\u00ednh ph\u1ee7, th\u01b0\u1eddng nh\u1eafm m\u1ee5c ti\u00eau v\u00e0o c\u00e1c m\u00e1y ch\u1ee7 web c\u1ee7a h\u1ecd trong c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"tcp-ip-hijacking\">Chi\u1ebfm quy\u1ec1n \u0111i\u1ec1u khi\u1ec3n TCP\/IP<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"584\" class=\"wp-image-624\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic.jpg\" alt=\"\u0110\u1ed3 h\u1ecda th\u00f4ng tin chi\u1ebfm quy\u1ec1n \u0111i\u1ec1u khi\u1ec3n TCP IP\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic.jpg 850w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n\n\n\n<p>Lo\u1ea1i t\u1ea5n c\u00f4ng n\u00e0y x\u1ea3y ra khi m\u1ed9t tin t\u1eb7c chi\u1ebfm quy\u1ec1n \u0111i\u1ec1u khi\u1ec3n m\u1ed9t phi\u00ean gi\u1eefa hai thi\u1ebft b\u1ecb \u0111ang giao ti\u1ebfp v\u1edbi nhau. K\u1ebb t\u1ea5n c\u00f4ng ph\u1ea3i \u1edf c\u00f9ng m\u1ea1ng v\u1edbi n\u1ea1n nh\u00e2n \u0111\u1ec3 th\u1ef1c hi\u1ec7n cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y.<\/p>\n\n\n\n<p>Khi k\u1ebb t\u1ea5n c\u00f4ng chi\u1ebfm quy\u1ec1n \u0111i\u1ec1u khi\u1ec3n phi\u00ean, h\u1ecd c\u00f3 th\u1ec3 nghe l\u00e9n cu\u1ed9c tr\u00f2 chuy\u1ec7n v\u00e0 s\u1eeda \u0111\u1ed5i d\u1eef li\u1ec7u \u0111ang \u0111\u01b0\u1ee3c trao \u0111\u1ed5i. Cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y th\u01b0\u1eddng ti\u00eam nhi\u1ec5m ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i v\u00e0o h\u1ec7 th\u1ed1ng ho\u1eb7c \u0111\u00e1nh c\u1eafp th\u00f4ng tin nh\u1ea1y c\u1ea3m.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"smb-relay-attack\">T\u1ea5n c\u00f4ng SMB Relay<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"584\" class=\"wp-image-620\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic.jpg\" alt=\"\u0110\u1ed3 h\u1ecda th\u00f4ng tin t\u1ea5n c\u00f4ng SMB Relay\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic.jpg 850w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n\n\n\n<p>C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng chuy\u1ec3n ti\u1ebfp Server Message Block (SMB) kh\u00f4ng may ph\u1ed5 bi\u1ebfn trong c\u00e1c t\u1eadp \u0111o\u00e0n v\u1eabn s\u1eed d\u1ee5ng x\u00e1c th\u1ef1c NTLM Phi\u00ean b\u1ea3n 2. T\u1ed9i ph\u1ea1m m\u1ea1ng c\u00f3 th\u1ec3 b\u00ed m\u1eadt chuy\u1ec3n ti\u1ebfp d\u1eef li\u1ec7u nh\u1ea1y c\u1ea3m \u0111\u1ebfn c\u00e1c m\u00e1y ch\u1ee7 kh\u00e1c m\u00e0 kh\u00f4ng b\u1ecb ph\u00e1t hi\u1ec7n b\u1eb1ng c\u00e1ch b\u00ed m\u1eadt nghe l\u00e9n l\u01b0u l\u01b0\u1ee3ng m\u1ea1ng.<\/p>\n\n\n\n<p>H\u00e3y suy ngh\u0129 v\u1ec1 v\u1ea5n \u0111\u1ec1 n\u00e0y t\u1eeb g\u00f3c \u0111\u1ed9 c\u1ee7a m\u1ed9t ng\u01b0\u1eddi d\u00f9ng g\u01b0\u01a1ng m\u1eabu v\u00e0 m\u1ed9t tin t\u1eb7c x\u1ea5u xa. K\u1ecbch b\u1ea3n l\u00fd t\u01b0\u1edfng l\u00e0 khi ng\u01b0\u1eddi th\u1ef1c s\u1ef1 \u0111ang c\u1ed1 g\u1eafng \u0111\u0103ng nh\u1eadp v\u00e0 x\u00e1c th\u1ef1c b\u1ea3n th\u00e2n. Khi, thay v\u00ec m\u1ed9t ng\u01b0\u1eddi d\u00f9ng h\u1ee3p l\u1ec7, m\u1ed9t tin t\u1eb7c c\u1ed1 g\u1eafng s\u1eed d\u1ee5ng th\u00f4ng tin \u0111\u0103ng nh\u1eadp b\u1ecb \u0111\u00e1nh c\u1eafp b\u1eb1ng c\u00e1ch theo d\u00f5i l\u01b0u l\u01b0\u1ee3ng m\u1ea1ng \u0111\u1ec3 truy c\u1eadp - kh\u00f4ng c\u1ea7n m\u1eadt kh\u1ea9u.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"recent-advancements-in-hacking-technology\"><strong>Nh\u1eefng ti\u1ebfn b\u1ed9 g\u1ea7n \u0111\u00e2y trong c\u00f4ng ngh\u1ec7 t\u1ea5n c\u00f4ng<\/strong><\/h2>\n\n\n<p>Tin t\u1eb7c li\u00ean t\u1ee5c t\u00ecm ra nh\u1eefng c\u00e1ch m\u1edbi \u0111\u1ec3 truy c\u1eadp th\u00f4ng tin b\u1ecb h\u1ea1n ch\u1ebf, \u0111i\u1ec1u n\u00e0y cho th\u1ea5y r\u00f5 r\u1eb1ng \u0110\u1ea1o lu\u1eadt Gian l\u1eadn v\u00e0 L\u1ea1m d\u1ee5ng M\u00e1y t\u00ednh c\u1ea7n \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt. Lu\u1eadt n\u00e0y \u0111\u01b0\u1ee3c t\u1ea1o ra v\u00e0o nh\u1eefng n\u0103m 1980 nh\u01b0ng ch\u01b0a \u0111\u01b0\u1ee3c thay \u0111\u1ed5i k\u1ec3 t\u1eeb n\u0103m 2011, c\u00f3 ngh\u0129a l\u00e0 n\u00f3 kh\u00f4ng ph\u1ea3n \u1ee9ng v\u1edbi nh\u1eefng ti\u1ebfn b\u1ed9 c\u00f4ng ngh\u1ec7 g\u1ea7n \u0111\u00e2y. CFAA ph\u1ea3i \u0111i tr\u01b0\u1edbc tin t\u1eb7c b\u1eb1ng c\u00e1ch \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt th\u01b0\u1eddng xuy\u00ean.<\/p>\n\n\n\n<p>N\u00f3i d\u1ed1i tr\u00ean h\u1ed3 s\u01a1 h\u1eb9n h\u00f2 c\u00f3 th\u1ec3 kh\u00f4ng c\u00f3 v\u1ebb quan tr\u1ecdng, nh\u01b0ng n\u1ebfu vi ph\u1ea1m \u0111i\u1ec1u kho\u1ea3n s\u1eed d\u1ee5ng c\u1ee7a trang web, b\u1ea1n c\u00f3 th\u1ec3 b\u1ecb bu\u1ed9c t\u1ed9i t\u1ea5n c\u00f4ng theo <a href=\"https:\/\/www.nacdl.org\/Landing\/ComputerFraudandAbuseAct\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CFAA<\/a>. H\u00e0nh vi ph\u1ea1m t\u1ed9i nh\u1ecf n\u00e0y \u0111i k\u00e8m v\u1edbi m\u1ed9t n\u0103m t\u00f9 ho\u1eb7c ph\u1ea1t $100,000.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"bypassing-captcha-test\">V\u01b0\u1ee3t qua b\u00e0i ki\u1ec3m tra CAPTCHA<\/h3>\n\n\n<p>B\u00e0i ki\u1ec3m tra CAPTCHA x\u00e1c \u0111\u1ecbnh xem ng\u01b0\u1eddi d\u00f9ng l\u00e0 con ng\u01b0\u1eddi hay robot. N\u00f3 th\u01b0\u1eddng \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng cho m\u1ee5c \u0111\u00edch b\u1ea3o m\u1eadt, nh\u01b0 \u0111\u0103ng nh\u1eadp v\u00e0o t\u00e0i kho\u1ea3n ng\u00e2n h\u00e0ng c\u1ee7a b\u1ea1n. N\u1ebfu b\u1ecb b\u1eaft khi c\u1ed1 g\u1eafng v\u01b0\u1ee3t qua CAPTCHA, b\u1ea1n c\u00f3 th\u1ec3 b\u1ecb bu\u1ed9c t\u1ed9i t\u1ea5n c\u00f4ng v\u00e0 \u0111\u1ed1i m\u1eb7t v\u1edbi 8 n\u0103m t\u00f9.<\/p>\n\n\n\n<p><a href=\"http:\/\/www.captcha.net\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CAPTCHA <\/a>l\u00e0 m\u1ed9t bi\u1ec7n ph\u00e1p b\u1ea3o m\u1eadt c\u1ee7a trang web \u0111\u1ec3 ng\u0103n ch\u1eb7n bot truy c\u1eadp v\u00e0o ch\u00fang. N\u00f3 hi\u1ec3n th\u1ecb m\u1ed9t h\u00ecnh \u1ea3nh kh\u00f3 gi\u1ea3i m\u00e3 v\u00e0 \u0111\u1ec3 truy c\u1eadp, b\u1ea1n ph\u1ea3i nh\u1eadp c\u00e1c ch\u1eef c\u00e1i v\u00e0 s\u1ed1 \u0111\u01b0\u1ee3c hi\u1ec3n th\u1ecb trong m\u1ed9t h\u1ed9p b\u00ean d\u01b0\u1edbi h\u00ecnh \u1ea3nh. Tuy nhi\u00ean, tin t\u1eb7c \u0111\u00e3 tr\u1edf n\u00ean kh\u00e9o l\u00e9o \u0111\u1ebfn m\u1ee9c CAPTCHA ph\u1ea3i tr\u1edf n\u00ean ph\u1ee9c t\u1ea1p h\u01a1n, d\u1eabn \u0111\u1ebfn vi\u1ec7c ch\u00fang \u0111\u01b0\u1ee3c gi\u1ea3i quy\u1ebft th\u01b0\u1eddng xuy\u00ean h\u01a1n con ng\u01b0\u1eddi. \u0110\u1ec3 ch\u1ed1ng l\u1ea1i \u0111i\u1ec1u n\u00e0y, <strong><a href=\"https:\/\/cloud.google.com\/recaptcha-enterprise\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">reCAPTCHA <\/a><\/strong>\u0111\u00e3 \u0111\u01b0\u1ee3c ph\u00e1t tri\u1ec3n v\u00e0 li\u00ean quan \u0111\u1ebfn vi\u1ec7c nh\u00ecn v\u00e0o c\u00e1c \u00f4 vu\u00f4ng nh\u1ecf v\u00e0 \u0111\u00e1nh d\u1ea5u ch\u00fang v\u1edbi m\u1ed9t v\u00f2i c\u1ee9u h\u1ecfa, xe bu\u00fdt ho\u1eb7c l\u1ed1i \u0111i b\u1ed9.<\/p>\n\n\n\n<p>Hi\u1ec7n t\u1ea1i, <strong>reCAPTCHA<\/strong> v\u1eabn \u0111ang ho\u1ea1t \u0111\u1ed9ng. Tuy nhi\u00ean, s\u1ebd kh\u00f4ng l\u00e2u n\u1eefa tr\u01b0\u1edbc khi c\u00e1c k\u1ef9 thu\u1eadt h\u1ecdc m\u00e1y t\u1ef1 \u0111\u1ed9ng c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n \u0111\u1ec3 v\u01b0\u1ee3t qua n\u00f3.<\/p>\n\n\n\n<p>C\u1ea3 reCAPTCHA v\u00e0 CAPTCHA \u0111\u1ec1u \u0111\u01b0\u1ee3c ph\u00e1t tri\u1ec3n t\u1eeb \u00fd t\u01b0\u1edfng r\u1eb1ng c\u00f3 th\u1ec3 ph\u00e2n bi\u1ec7t con ng\u01b0\u1eddi v\u1edbi m\u00e1y t\u00ednh tr\u1ef1c tuy\u1ebfn m\u1ed9t c\u00e1ch chi ph\u00ed th\u1ea5p, th\u00e2n thi\u1ec7n v\u1edbi ng\u01b0\u1eddi d\u00f9ng v\u00e0 nhanh ch\u00f3ng. Nh\u1eefng c\u00e2u h\u1ecfi n\u00e0y bu\u1ed9c ch\u00fang ta ph\u1ea3i xem x\u00e9t \u0111i\u1ec1u g\u00ec l\u00e0m cho ch\u00fang ta l\u00e0 con ng\u01b0\u1eddi v\u00e0 li\u1ec7u m\u00e1y m\u00f3c c\u00f3 th\u1ec3 sao ch\u00e9p kh\u00eda c\u1ea1nh \u0111\u00f3 hay kh\u00f4ng. C\u00e2u tr\u1ea3 l\u1eddi r\u00f5 r\u00e0ng l\u00e0 ch\u00fang ta kh\u00f4ng bi\u1ebft v\u00ec ch\u00fang ta \u0111\u00e3 nh\u1ea3y v\u00e0o ph\u1ea7n s\u00e2u c\u1ee7a h\u1ed3 tri\u1ebft h\u1ecdc.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"so-how-do-you-stay-ahead-of-the-curve-and-ensure-your-business-or-website-is-not-hacked\"><strong>V\u1eady l\u00e0m th\u1ebf n\u00e0o \u0111\u1ec3 b\u1ea1n lu\u00f4n \u0111i tr\u01b0\u1edbc v\u00e0 \u0111\u1ea3m b\u1ea3o doanh nghi\u1ec7p ho\u1eb7c trang web c\u1ee7a b\u1ea1n kh\u00f4ng b\u1ecb t\u1ea5n c\u00f4ng?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"keep-your-software-up-to-date\">Gi\u1eef ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt<\/h3>\n\n\n<p>\u0110i\u1ec1u quan tr\u1ecdng nh\u1ea5t l\u00e0 gi\u1eef ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt. \u0110i\u1ec1u n\u00e0y bao g\u1ed3m h\u1ec7 \u0111i\u1ec1u h\u00e0nh, b\u1ea5t k\u1ef3 \u1ee9ng d\u1ee5ng v\u00e0 plugin n\u00e0o. Ph\u1ea7n m\u1ec1m l\u1ed7i th\u1eddi l\u00e0 m\u1ed9t trong nh\u1eefng c\u00e1ch ph\u1ed5 bi\u1ebfn nh\u1ea5t m\u00e0 tin t\u1eb7c truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng.<\/p>\n\n\n\n<p>M\u1ed9t c\u00e1ch kh\u00e1c \u0111\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n l\u00e0 thay \u0111\u1ed5i t\u00ean ng\u01b0\u1eddi d\u00f9ng v\u00e0 m\u1eadt kh\u1ea9u m\u1eb7c \u0111\u1ecbnh cho b\u1ea5t k\u1ef3 thi\u1ebft b\u1ecb ho\u1eb7c t\u00e0i kho\u1ea3n n\u00e0o. Nhi\u1ec1u ng\u01b0\u1eddi kh\u00f4ng nh\u1eadn ra r\u1eb1ng t\u00ean ng\u01b0\u1eddi d\u00f9ng v\u00e0 m\u1eadt kh\u1ea9u m\u1eb7c \u0111\u1ecbnh r\u1ea5t d\u1ec5 t\u00ecm th\u1ea5y tr\u00ean m\u1ea1ng. Tin t\u1eb7c bi\u1ebft \u0111i\u1ec1u n\u00e0y v\u00e0 th\u1eed c\u00e1c th\u00f4ng tin \u0111\u0103ng nh\u1eadp n\u00e0y tr\u01b0\u1edbc khi chuy\u1ec3n sang c\u00e1c ph\u01b0\u01a1ng ph\u00e1p ph\u1ee9c t\u1ea1p h\u01a1n.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-twofactor-authentication\">S\u1eed d\u1ee5ng x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1<\/h3>\n\n\n<p>S\u1eed d\u1ee5ng x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 (2FA) l\u00e0 m\u1ed9t trong nh\u1eefng c\u00e1ch t\u1ed1t nh\u1ea5t \u0111\u1ec3 b\u1ea3o v\u1ec7 t\u00e0i kho\u1ea3n c\u1ee7a b\u1ea1n kh\u1ecfi b\u1ecb t\u1ea5n c\u00f4ng. 2FA th\u00eam m\u1ed9t l\u1edbp b\u1ea3o m\u1eadt b\u1ed5 sung b\u1eb1ng c\u00e1ch y\u00eau c\u1ea7u b\u1ea1n nh\u1eadp c\u1ea3 m\u1eadt kh\u1ea9u v\u00e0 m\u00e3 \u0111\u01b0\u1ee3c g\u1eedi \u0111\u1ebfn \u0111i\u1ec7n tho\u1ea1i c\u1ee7a b\u1ea1n. \u0110i\u1ec1u n\u00e0y l\u00e0m cho tin t\u1eb7c kh\u00f3 truy c\u1eadp v\u00e0o t\u00e0i kho\u1ea3n c\u1ee7a b\u1ea1n h\u01a1n nhi\u1ec1u ngay c\u1ea3 khi ch\u00fang c\u00f3 m\u1eadt kh\u1ea9u c\u1ee7a b\u1ea1n.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"disable-anonymous-system-access\">V\u00f4 hi\u1ec7u h\u00f3a truy c\u1eadp h\u1ec7 th\u1ed1ng \u1ea9n danh<\/h3>\n\n\n<p>C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng truy c\u1eadp t\u1eeb xa \u0111ang gia t\u0103ng, v\u00e0 vi\u1ec7c th\u1ef1c hi\u1ec7n c\u00e1c b\u01b0\u1edbc \u0111\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n l\u00e0 \u0111i\u1ec1u c\u1ea7n thi\u1ebft. T\u1ed9i ph\u1ea1m m\u1ea1ng ng\u00e0y c\u00e0ng tr\u1edf n\u00ean tinh vi, v\u00ec v\u1eady vi\u1ec7c \u0111i tr\u01b0\u1edbc l\u00e0 \u0111i\u1ec1u c\u1ea7n thi\u1ebft. Gi\u1eef ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt, s\u1eed d\u1ee5ng x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 v\u00e0 v\u00f4 hi\u1ec7u h\u00f3a truy c\u1eadp \u1ea9n danh \u0111\u1ec1u l\u00e0 nh\u1eefng c\u00e1ch hi\u1ec7u qu\u1ea3 \u0111\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n. Khi c\u00f4ng ngh\u1ec7 ph\u00e1t tri\u1ec3n, ch\u00fang ta s\u1ebd c\u1ea7n ph\u00e1t tri\u1ec3n nh\u1eefng c\u00e1ch m\u1edbi \u0111\u1ec3 \u0111i tr\u01b0\u1edbc tin t\u1eb7c trong tr\u00f2 ch\u01a1i m\u00e8o v\u1eddn chu\u1ed9t n\u00e0y.<\/p>","protected":false},"excerpt":{"rendered":"<p>T\u1ea5n c\u00f4ng t\u1eeb xa l\u00e0 g\u00ec? Khi m\u1ed9t t\u00ean tr\u1ed9m \u0111\u1ed9t nh\u1eadp v\u00e0o nh\u00e0 \u0111\u1ec3 l\u1ea5y \u0111\u1ed3 v\u1eadt, ch\u00fang c\u00f3 nguy c\u01a1 \u0111\u1ec3 l\u1ea1i b\u1eb1ng ch\u1ee9ng DNA ho\u1eb7c d\u1ea5u v\u00e2n tay c\u00f3 th\u1ec3 d\u1eabn \u0111\u1ebfn vi\u1ec7c b\u1ecb b\u1eaft. Tuy nhi\u00ean, tin t\u1eb7c\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/tan-cong-tu-xa\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">T\u1ea5n c\u00f4ng t\u1eeb xa<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":650,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Remote Attack | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/tan-cong-tu-xa\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote Attack | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"What is a Remote Attack? When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who&hellip; Continue reading Remote Attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/tan-cong-tu-xa\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-15T18:13:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Remote Attack\",\"datePublished\":\"2022-09-15T18:13:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"},\"wordCount\":1260,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\",\"name\":\"Remote Attack | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"datePublished\":\"2022-09-15T18:13:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"width\":558,\"height\":500,\"caption\":\"What is a Remote Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Remote Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"T\u1ea5n c\u00f4ng t\u1eeb xa | T\u00f3m t\u1eaft b\u1ea3o m\u1eadt","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/tan-cong-tu-xa\/","og_locale":"vi_VN","og_type":"article","og_title":"Remote Attack | Security Briefing","og_description":"What is a Remote Attack? When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who&hellip; Continue reading Remote Attack","og_url":"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/tan-cong-tu-xa\/","og_site_name":"Security Briefing","article_published_time":"2022-09-15T18:13:39+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","type":"image\/png"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"security","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"6 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Remote Attack","datePublished":"2022-09-15T18:13:39+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"},"wordCount":1260,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","articleSection":["Cyber Attacks"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/","name":"T\u1ea5n c\u00f4ng t\u1eeb xa | T\u00f3m t\u1eaft b\u1ea3o m\u1eadt","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","datePublished":"2022-09-15T18:13:39+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","width":558,"height":500,"caption":"What is a Remote Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Remote Attack"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"b\u1ea3o v\u1ec7","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin l\u00e0 m\u1ed9t bi\u00ean t\u1eadp vi\u00ean c\u1ea5p cao c\u1ee7a Government Technology. Tr\u01b0\u1edbc \u0111\u00e2y c\u00f4 \u0111\u00e3 vi\u1ebft cho PYMNTS v\u00e0 The Bay State Banner, v\u00e0 c\u00f3 b\u1eb1ng C\u1eed nh\u00e2n Ngh\u1ec7 thu\u1eadt s\u00e1ng t\u00e1c c\u1ee7a tr\u01b0\u1eddng Carnegie Mellon. C\u00f4 s\u1ed1ng \u1edf ngo\u1ea1i \u00f4 Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/vi\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=611"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/611\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/650"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}