SPIDER1CODE
1.9K subscribers
130 photos
22 videos
12 files
81 links
Spider1Code is the first Arab community that brings together cybersecurity artificial intelligence, and more โœจ๐Ÿค
Download Telegram
Title:
Covert Espionage in Asiaโ€™s Communication Networks

Hello and welcome, dear reader, to a new article ๐Ÿ˜

In one of the most serious cyber espionage campaigns recently discovered, Palo Alto Networks โ€“ Unit 42 reported intense activity from an advanced threat group known as CL-STA-0969, which is believed to have targeted the critical telecommunications infrastructure of Southeast Asia over a span of ten months.

It is suspected that this operation was state-sponsored ๐Ÿ•ต๐Ÿป


---

๐Ÿง  So, what was their goal?

Their primary goal was to silently infiltrate and control telecom networks without detection โ€” complete stealth.

Investigations revealed that the attacks occurred between February and November 2024, with the primary objective being Remote Code Execution (RCE) for data theft, without requiring user interaction.


---

โš ๏ธ Wait โ€” what is RCE?

RCE (Remote Code Execution) is a cyberattack that allows an attacker to gain access to a system and execute commands remotely via a shell โ€” one of the most dangerous forms of attack.


---

๐Ÿ” Example of the attack:

The attackers used a tool called Cordscan to gather intelligence about network devices.
To this day, no direct evidence has been found regarding their initial access point.

Then, they performed brute-force attacks on SSH protocols, eventually gaining access and planting multiple malware payloads:

AuthDoor: A malicious authentication module that steals credentials and allows persistent access using a "magic password."

Cordscan: A network scanning and packet capturing tool.

GTPDOOR: Specifically built for telecom networks near GPRS roaming exchanges.

EchoBackdoor: A passive backdoor using ICMP packets for command execution and result delivery.

SGSN Emulator (sgsnemu): Bypasses firewalls through network manipulation.

ChronosRAT: Malware capable of executing shellcode, capturing screenshots, keylogging, and more.

NoDepDNS (MyDns): A Go-based backdoor that receives commands over DNS using UDP on port 53.



---

๐ŸŽฏ Targeted Threat Groups:

They also interacted with or mimicked operations of other known APTs:

LightBasin (UNC1945): Targeting telecom since 2016.

UNC2891: Financially motivated, known for ATM attacks.

UNC3886: Exploited vulnerabilities in VMware systems.



---

๐Ÿงฐ Tools Used:

Microsocks Proxy

FRP (Fast Reverse Proxy)

FScan

Responder

ProxyChains



---

๐Ÿ”“ CVEs Exploited:

CVE-2016-5195

CVE-2021-4034

CVE-2021-3156



---

๐Ÿ•ต๏ธโ€โ™‚๏ธ Stealth Techniques:

DNS tunneling for traffic obfuscation

Using compromised telecom infrastructure as intermediate relays

Log tampering and credential wiping

Disabling SELinux

Renaming malicious processes to appear legitimate



---

๐ŸŒ International Response โ€“ China & USA

When asked on Fox News about alleged Chinese cyberattacks on U.S. telecom infrastructure and intellectual property theft, former U.S. President Donald Trump responded:

> โ€œYou really think we donโ€™t do that too?
We do a lot of things like that... the world isnโ€™t simple.โ€



This controversy coincided with statements from a Chinese tech team claiming China was the victim, after discovering a Zero-Day vulnerability in Microsoft Exchange.

They further alleged that over 50 devices belonging to a major Chinese military entity were compromised between July 2022 and July 2023.

The Chinese claimed the targets included universities, research institutes, and satellite internet companies.

According to their reports, U.S. hackers exploited electronic file system vulnerabilities to compromise the targets between July and November 2024.


---

Source:
The Hacker News โ€“ CL-STA-0969 Campaign
๐Ÿ”ฅ๐Ÿ’—
โค4
ุณู…ุนุช ุนู† ุงุฎุชุฑุงู‚ ุงูŠ ู†ุธุงู… ุงู†ุฏูˆุฑูŠุฏ ู…ู† ุบูŠุฑ ู„ู…ุณ ุŸ


ุงู‡ู„ุง ูˆ ุณู‡ู„ุง ุนุฒูŠุฒูŠ ููŠ cve ุงู„ุฎู…ูŠุณ โœจ


ู…ูˆุถูˆุนู†ุง ู‡ูˆ :


( ุงุฎุชุฑุงู‚ android ู…ู† ุบูŠุฑ ู„ู…ุณ !!!! )


ุทูŠุจ ุจูŠุญุตู„ ุงุฒุงูŠ ุฏุง ุŸ


ุนู† ุทุฑูŠู‚ ( CVE )

ุทูŠุจ ุงูŠ ู‡ูˆ cve ุฏุง ุŸ


------------------------------------------------------
CVE |
__


ุฏุง ุนุจุงุฑู‡ ุนู† ุซุบุฑู‡ ุงุชุณุฌู„ุช ูˆ ุจุชูƒูˆู† ู„ูŠู‡ุง ุชุตู†ูŠู ู…ู† ุงูˆู„ ุบูŠุฑ ู…ุถุฑุฑ ู„ูŠ Critical ( ุฎุทูŠุฑ ) ูˆ ุงุบู„ุจู‡ู… ุจูŠูƒูˆู† ู…ุชุงุญ

-------------------------------------------------------


ุทูŠุจ ุงุณู… cve ุจุชุงุนู†ุง ุงูŠ ุŸ

( CVEโ€‘2025โ€‘48530 )

ุทูŠุจ ุฏุง ุงู…ุชุง ุงุชุณุฌู„ ุŸ

ุฏุง ูŠุนุฒูŠุฒูŠ ูŠุนุชุจุฑ zero day ู„ู†ูˆ ู…ู† ูŠูˆู…ูŠู† ู…ู† ูƒุชุงุจู‡ ุงู„ู…ู‚ุงู„ ุจุณ ูˆู‚ุช ุชุณุฌูŠู„ ู‡ูˆ

( 2025/8/1 )

ู…ูŠู† ุงู„ูŠ ุงูƒุชุดู ุงู„ุซุบุฑู‡ ุŸ

Sakana Tsai ( ุถู…ู† ูุฑูŠู‚ ุฌูˆุฌู„ )

ุทูŠุจ ูƒุงู… ุชู‚ูŠู… ุงู„ุซุบุฑู‡ ุŸ
CVSS 3.1

ูŠุนู†ูŠ

9.8/10 ( Critical )



ุทูŠุจ ุงูŠ ู‡ูŠุง ุงู„ุซุบุฑู‡ ุงู„ูŠ CVE ุดุบุงู„ ุจูŠู‡ุง ุŸ

( RCE on system )

ูŠุนู†ูŠ ู…ู…ูƒู† ุญุฏ ูŠุฎุชุฑู‚ ุงูˆ ูŠุดุบู„ malware ( ุจุฑุงู…ุฌ ู‡ุฏูู‡ุง ุชุฏู…ูŠุฑ ุงู„ุฌู‡ุงุฒ ) ุจุฏูˆู† ุนู„ู…ูƒ !!!


ู…ุซุงู„ ุนู„ูŠ ุญุตูˆู„ ุงู„ู€ CVE


ูู„ ู†ูุชุฑุถ ุงู† ุนู†ุฏู†ุง ุดุฎุตูŠู†

ู…ุญู…ุฏ ูˆ ุงุญู…ุฏ

ู…ุญู…ุฏ ุฏุง ุถุญูŠู‡ ู„ูŠ ุซุบุฑู‡

ูˆ ุงุญู…ุฏ ุฏุง ุงู„ู…ู†ูุฐ ู„ูŠู‡ุง

ู…ุญู…ุฏ ูˆ ุงุญู…ุฏ ู…ุชุตุงู„ูŠู† ู…ุน ุจุนุถ ููŠ ู†ูุณ ุดุจูƒู‡ ุงู„ู€ wifi

ูˆ ุจุนุฏู‡ุง ุงุญู…ุฏ ุจูŠุดุบู„ ู„ุงุฏู‡ ุงู„ูŠ ู‡ูˆ ุจุฑู…ุฌู‡ุง ุงู„ุฎุงุตู‡ ุจูŠ cve ูˆ ุจูŠุจุนุช crafted ( ู…ุนุฏู„ู‡ ) ูˆ ุงู„ุจูŠุงู†ุงุช ุฏูŠ ููŠู‡ุง payload malware ู…ุฎุตูˆุต ุนุดุงู† ูŠู†ูุฐ ุงู„ุซุบุฑู‡

ุจุนุฏู‡ุง ุงู„ู€ system process ูŠุณุชู‚ุจู„ ุงู„ุฏุงุชุง ูˆ ุจูŠุญุงูˆู„ ูŠุนุงู„ุฌู‡ุง ุจุฏูˆู† ูุญุต ู„ูŠ cve ูุง ุจุชุงู„ูŠ ุจูŠุญุตู„ rce ูˆ ูŠู‚ุฏุฑ ูŠุณุชุฎุฏู… shell ุงูˆ cmd ุงู„ุฎุงุต ุจูŠูƒ

ูˆ ุฏุง ุจูŠูƒูˆู† ู…ู† ุบูŠุฑ ู„ู…ุณ ู„ูŠูƒ ู…ุฌุฑุฏ ุจูŠุงู†ุงุช ูˆุตู„ุชูƒ ุนู„ูŠ ุชู„ููˆู†ูƒ ุณุจุจ ูƒู„ ุฏุง

( ู…ุด ุดุฑุท ู„ุงุชู†ูŠู† ูŠูƒูˆู†ูˆ ููŠ ู†ูุณ ุงู„ุดุจูƒู‡ )


ุทูŠุจ ุงูŠ ู„ุงุฌู‡ุฒู‡ ุงู„ูŠ ููŠู‡ุง ุนุฑุถู‡ ู„ูŠ cve ุŸ


Pixel 6 / 6 Pro โœ…


Pixel 6a โœ…


Pixel 7 / 7 Pro โœ…


Pixel 7a โœ…


Pixel 8 / 8 Pro โœ…


Pixel 8a โœ…


Pixel Fold โœ…


Pixel Tablet โœ…


Pixel 9 โœ…

ู…ุนุฑุถุฉ ( ู‚ุจู„ ุงู„ุชุญุฏูŠุซ ) ูˆ ( ููŠ ุงู„ุจูŠุชุง )


Samsung ุฃุฌู‡ุฒุฉ Galaxy ู…ู† A52 ู„ุญุฏ S24 โœ…


(ู‚ุจู„ ุชุญุฏูŠุซ ุฃุบุณุทุณ 2025)



Xiaomi / Redmi โœ…


ู…ุนุธู… ุงู„ู…ูˆุฏูŠู„ุงุช ู…ู† MIUI 13
ูู…ุง ููˆู‚


Oppo / Realme โœ…


ุฃูŠ ุฌู‡ุงุฒ ุจู†ุธุงู… Android 13 ุฃูˆ 14
(ุจุฏูˆู† ุชุตุญูŠุญ ุฃุบุณุทุณ)


OnePlus OnePlus 9 / 10 / 11 / Nord
Vivo / iQOO โœ…


ุงู„ุฃุฌู‡ุฒุฉ ุงู„ุชูŠ ู„ู… ุชุชู„ู‚ ุงู„ุชุญุฏูŠุซ ุงู„ุฃู…ู†ูŠ ุงู„ุฃุฎูŠุฑ


Huawei / Honor โœ…


ุฅุฐุง ูƒุงู†ุช ุชุนู…ู„ ุจุฅุตุฏุงุฑ Android ู‚ุฏูŠู… ุบูŠุฑ ู…ูุญุฏู‘ุซ




ุทูŠุจ ู‡ู„ ุตู„ุญูˆ ู…ุดูƒู„ู‡ ุŸ


ุงูƒูŠุฏ ูˆ ุฌูˆุฌู„ ุตู„ุญุช ุงู„ู…ุดูƒู„ู‡ ูˆ ุญุฏุซ ุฌู‡ุงุฒูƒ


ุงูƒุชุจ ู„ูŠุง ู‡ู„ ุฌู‡ุงุฒูƒ ูƒุงู† ู…ู†ู‡ู… ูˆ ุดูŠุฑ ู„ูŠ ุตุญุงุจูƒ ๐Ÿค


ู…ุตุงุฏุฑ :


https://www.cve.org/CVERecord?id=CVE-2025-48530


https://googleprojectzero.blogspot.com/?m=1


https://source.android.com/docs/security/bulletin


#CVE
#CyberSec
#android
#ุณุงูŠุจุฑ_ุณูƒูŠูˆุฑุชูŠ
#ุงู…ู†_ุณูŠุจุฑุงู†ูŠ
#ุงู†ุฏูˆุฑูŠุฏ
โค4
Have You Heard About Hacking Android Without Touching It? ๐Ÿคฏ

Welcome back to CVE Thursday! โœจ

This weekโ€™s topic is nothing short of wild:

( Hacking Android with Zero Touch! )


---

How is that even possible?

Through a dangerous vulnerability known as a CVE.


---

What is a CVE?

CVE (Common Vulnerabilities and Exposures) is a public identifier for known vulnerabilities in software or hardware. Each one is rated based on its severity โ€“ from Low to Critical โ€“ and many are publicly accessible for researchers and vendors to patch.


---

So, whatโ€™s our CVE this week?

๐Ÿ“Œ CVEโ€‘2025โ€‘48530

Date Published: August 1, 2025

Type: Zero-day

Discovered by: Sakana Tsai, a security researcher from Googleโ€™s team



---

How dangerous is it?

CVSS v3.1 Score: 9.8 / 10 (Critical) ๐Ÿ”ฅ
This is one of the highest severity levels a vulnerability can reach.


---

What does the vulnerability allow?

This CVE enables:

๐Ÿ“Œ Remote Code Execution (RCE) on the Android System Process

That means an attacker can run malicious code on your phone without your interaction. No clicks. No installs. No warnings.


---

Real-world example:

Letโ€™s imagine two users:
Mohamed (the victim) and Ahmed (the attacker).

Both are connected to the same Wi-Fi network.
Ahmed runs an exploit tool that crafts a special payload targeting CVEโ€‘2025โ€‘48530.

This payload is sent over the network.
The Android system receives it, and due to improper input handling, executes it with system-level permissions.

Boom. Ahmed now has remote access to Mohamedโ€™s device โ€” no physical access, no user approval.

> โ— Even worse? Being on the same network isnโ€™t always required, depending on the attack vector.




---

Affected Devices ๐Ÿ“ฑ

โœ… Google Pixel:
Pixel 6 / 6 Pro / 6a
Pixel 7 / 7 Pro / 7a
Pixel 8 / 8 Pro / 8a
Pixel Fold / Tablet
Pixel 9 (beta and unpatched builds)

โœ… Samsung:
Galaxy A52 to S24 (before August 2025 security patch)

โœ… Xiaomi / Redmi:
Most devices running MIUI 13 or newer

โœ… Oppo / Realme:
Devices running Android 13 or 14 without August security patch

โœ… OnePlus:
OnePlus 9 / 10 / 11 / Nord

โœ… Vivo / iQOO:
Devices without the latest security update

โœ… Huawei / Honor:
Devices on older or outdated Android versions


---

Has it been fixed?

โœ… Yes!
Google released a security patch in August 2025.
Make sure your phone is up to date with the latest software to stay protected.


---

Was your device on the list? ๐Ÿค”

Let us know in the comments and share this post to spread awareness! ๐Ÿ”


---

Sources:

๐Ÿ”— CVE Official Record โ€“ CVE-2025-48530

๐Ÿ”— Google Project Zero Blog

๐Ÿ”— Android Security Bulletin



---

#CVE #Android #CyberSecurity #ZeroDay #RCE #CyberSec #Hacking #Infosec #MobileSecurity
โค5
ู‡ู„ุง ูˆุงู„ู„ู‡ ุงุฎูˆูƒู… ุณุจุงูŠุฏุฑ ู…ู† ู…ุตุฑ ๐Ÿ˜‚โค๏ธ
โค1
Forwarded from Telemetrio
โค3
Media is too big
VIEW IN TELEGRAM
ู…ู† ูˆุณุท ู…ุง ุนุงู„ู… ูƒู„ูˆ ู‚ุนุฏ ูŠุชูƒู„ู… ุนู† chatgpt 5

ุชู… ุตู†ุงุนู‡ ุงูˆู„ ุฑูˆุจูˆุช ุฐูƒูŠ ูŠู‚ุฏุฑ ูŠุณุงุนุฏูƒ ููŠ ู…ู‡ุงู… ุงู„ุจูŠุช ุงุณู…ูˆ ( Helix )

ู‡ุชู‚ูˆู„ูŠ ุฏูŠ ุญุงุฌู‡ ุทุจูŠุนูŠ ู…ุง ููŠ alexa ุŸ

ู‡ู‚ูˆู„ูƒ ุฏุง ู‚ุฏุฑ ูŠุทูˆูŠ ุงู„ู‡ุฏูˆู… ๐Ÿ˜ฎ

ูˆ ุงูŠ ุงู„ูŠ ููŠู‡ุง ูŠุนู†ูŠ ู„ู…ุง ูŠุทูˆูŠ ุงู„ู‡ุฏูˆู… ๐Ÿ˜‚๐Ÿ˜‚

ู‡ู‚ูˆู„ูƒ ุงู† ุงู„ุญุงุฌู‡ ุฏูŠ ู…ุญุชุงุฌู‡ ุดุจูƒู‡ ุนุตุจูŠู‡ ู„ูู‡ู… ุงู„ุญุฑูƒู‡ ูˆ ุงู„ุฌุฏูŠุฑ ุจุงู„ุฐูƒุฑ ุงู† ุดุจูƒู‡ ุงู„ุนุตุจูŠู‡ ู…ุด ูƒุงู†ุช ู…ุฎุตุตู‡ ู„ูŠ ุฏุง ุบูŠุฑ ุงู† ุฏุง ุฐูƒุงุก ุงุตุทู†ุงุนูŠ ุจุดุฑูŠ


ูˆ ูƒู…ุงู† ุฏุง ุจูŠุนู…ู„ eye contact ูŠุนู†ูŠ ุฎู„ูŠ ุจุงู„ูƒ ูŠุง ุชุงู…ุฑ ุญุณู†ูŠ ุนุดุงู† ุฐูƒุงุก ุงุตุทู†ุงุนูŠ ู‡ูŠุงุฎุฏ ุฏูˆุฑูƒ


ูˆ ุจูŠุณุชุฎุฏู… ู„ุบู‡ ู„ุงุดุงุฑู‡ ุงู„ุจุณูŠุทู‡ ุฒูŠ ุงู„ุฅุดุงุฑุฉ ุจุงู„ูŠุฏูŠู† ุฃูˆ ุญุฑูƒุฉ ุงู„ุฑุฃุณ

ููŠ ุงู„ู†ู‡ุงูŠู‡ ุงู„ุชุทูˆุฑ ุจู‚ูŠ ุจุดูƒู„ ูƒุจูŠุฑ ูˆ ููŠ ู…ุณุชู‚ุจู„ ุจู†ุณุจู‡ ูƒุจูŠุฑู‡ ุงู„ุนุงู„ู… ู‡ูŠูƒูˆู† ููŠ ุฐูƒุงุก ุงุตุทู†ุงุนูŠ ุดุจู‡ ุฏุง ูˆ ุงูƒุชุฑ ููŠ ุงู„ุจูŠูˆุช ู†ูุณ ููƒุฑู‡ ุงู„ุชู„ูุฒูŠูˆู† ุงูˆู„ ู…ุง ุงุฎุชุฑุนูˆ ุงุชู…ู†ูŠ ุดูŠุฑ ู„ูŠ ูƒู„ ุฌุฏูŠุฏ ๐Ÿค
โค2
ู„ุงุณู ู‡ุนุชุฒู„ ุณู†ู‡ ู…ุด ุจูŠุฏูŠ ุนุดุงู† ุงุฑูƒุฒ ููŠ ุงู„ุฏุฑุงุณู‡ ูƒุงู†ุช ุงูŠุงู… ุฌู…ูŠู„ู‡ ุฌุฏุง ู…ุนุงูƒู… ูˆ ู…ุด ุชู‚ู„ู‚ูˆ ู‡ุบูŠุจ ูˆ ู‡ุฑุฌุน ุงู† ุดุงุก ุงู„ู„ู‡ ูˆ ุดูƒุฑุง ู„ูŠ ูƒู„ ูˆุงุญุฏ ูˆุซู‚ ููŠุง ุงูˆ ููŠ ู…ุญุชูˆูŠ

ุดูƒุฑุง ู„ูŠูƒู…

ุงู„ูŠ ุญุงุจุจ ูŠุชูˆุงุตู„ ู…ุนุงูŠุง ุฑู‚ู…ูŠ ุงู‡ูˆ :

+201223119757

01223119757
โค6๐Ÿ˜ข1
ุงู„ุณู„ุงู… ุนู„ูŠูƒู… ูˆุฑุญู…ู‡ ุงู„ู„ู‡ ูˆุจุฑูƒุงุชู‡ ๐Ÿค

ุงู†ุง ู…ุญู…ุฏ ุนู†ุฏูŠ 17 ุณู†ู‡ ู…ู† ู…ุตุฑ ุชุญุฏูŠุฏุง ุจูˆุฑุณุนูŠุฏ ุทุงู„ุจ ุซุงู†ูˆูŠู‡ ุนุงู…ู‡ ู‚ูˆู„ุช ุงุนู…ู„ ุญุงุฌู‡ ุชููŠุฏ ุงู„ู…ุฌุชู…ุน ูˆ ุงู„ุจุดุฑูŠู‡ ูˆ ู‚ุฑุฑุช ุงุนู…ู„ ู…ุดุฑูˆุนูŠ ุงู„ูŠ ู‡ูˆุง

QNOVA - Quantum Nova

ุงู„ู…ุดุฑูˆุน ุนุจุงุฑู‡ ุนู† ู…ุญุงูƒู‡ู‡ ู‚ุฑูŠุจู‡ ุฌุฏุง ู„ูŠ ุงู„ูƒูˆู†ุชู… ูƒู…ุจูŠูˆุชุฑ ุนู† ุทุฑูŠู‚ ุฌู‡ุงุฒ ุงู„ูƒู…ุจูŠูˆุชุฑ ุงู„ุนุงุฏูŠ

ุงู„ู…ุดุฑูˆุน ู…ุชู‚ุณู… ู„ูŠ ุชู„ุงุช ุงุณูƒุฑุจุชุงุช ูˆ ูƒู„ู‡ู… ุงูˆุจู† ุณูˆุฑุณ

ู„ุงูˆู„ :
qnova_low.py


ุฏุง ุนุจุงุฑู‡ ุนู† ุงุณูƒุฑุจุช ู…ู‡ู…ุชูˆ ุงู†ูˆ ูŠุดุบู„ูƒ ู…ุญุงูƒุงู‡ ุชุนู„ู…ูŠู‡ ูˆ ูŠู‚ุฏุฑ ูŠุดุชุบู„ ููŠ ู„ุงุฌู‡ุฒู‡ ุงู„ุถุนูŠูู‡ ุจู†ุณุจู‡ ุนุงู„ูŠู‡ ู…ู† ู†ุฌุงุญ

ุงู„ุชุงู†ูŠ :

qnova_stable.py

ุฏุง ุนุจุงุฑู‡ ุนู† ุงุณูƒุฑุจุช ุฒูŠ ุงู„ูŠ ูุงุช ูˆู„ูƒู† ู…ุชุนู…ู‚ ุงูƒุชุฑ ููŠ ูƒูˆู†ุชู… ูƒู…ุจูŠูˆุชุฑ ูŠุนุชุจุฑ ูุฑูŠู… ูˆุฑูƒ ูƒุงู…ู„ ู„ูŠ ุชุดุบูŠู„ ู…ุญุงูƒุงู‡ ุงูƒุจุฑ ู„ูŠ ูƒูˆู†ุชู… ูƒู…ุจูŠูˆุชุฑ ุจุดูƒู„ ุงูˆุณุน ู…ู† ุงู„ุนุงุฏูŠ ู…ู† ุญูŠุซ ูƒู„ ุดุฆ ูŠุดุชุบู„ ุนู„ูŠ ุงุฌู‡ุฒู‡ ู…ุชูˆุณุทู‡ ู„ูŠ ุญุฏูŠุซู‡

ุงู„ุชุงู„ุช :

qnova_high.py

ุฏุง ู…ู‡ุชู…ูˆ ุงู†ูˆ ุฌู…ุน ุจูŠู† ูƒู„ ุงู„ูŠ ูุงุช ู…ุน ุชู‚ุฏู…ุงุช ุงุญุณู† ู…ู† ุญูŠุซ ุงู„ุชุนู…ู‚ ููŠ ุงู„ู…ุญุงูƒุงู‡ ูˆ ูƒู„ ุดุฆ ุญุฑููŠุง ูˆ ุฏุง ุจูŠุดุชุบู„ ุนู„ูŠ ุงุฌู‡ุฒู‡ ุงู„ุนุงู„ูŠู‡ ุงู„ูŠ ุงู…ูƒุงู†ูŠุงุช ุนุงู„ูŠู‡

ู„ูŠู†ูƒ ุชุญู…ูŠู„ ู…ู„ูุงุช ุงู„ู…ุดุฑูˆุน :

https://drive.google.com/drive/folders/1ljW32fC_DzJUcgbSEAx7MfWwYkwEcvxq

ุญุงูˆู„ุช ุงุดุฑุญ ุงู„ู…ุดุฑูˆุน ุจุดูƒู„ ุจุณูŠุท ู‡ุฏู ุงู„ู…ุดุฑูˆุน ู‡ูˆ ุชุทูˆูŠุฑ ูˆ ุชุญุณูŠู† ุงู„ููƒุฑู‡ ุงู„ุนุงู…ู‡ ุนู† ูƒูˆู†ุชู… ูƒู…ุจูŠูˆุชุฑ ูˆ ุดูƒุฑุง ู„ูŠูƒู…๐Ÿค
โค3๐Ÿ”ฅ2
ู…ูŠู† ุญุงุจุจ ูŠุฌูŠ ุถุฏูŠ ctf ุŸ
ู‚ูˆู„ุช ุงุฌุฑุจ ุงู„ุชุฑู†ุฏ ุทู„ุน ู…ุนุงูŠุง ุฏุง
โค2๐ŸŒš1
ู„ุงุณู ู…ูˆุงุชู…ุฑ cdis ุงุชุงุฌู„ ู„ูŠ ุณู†ู‡ 2026
โค1
ุชุนุงู„ูˆ ู†ุชูƒู„ู… ุนู† ู…ูˆุถูˆุน ู…ุซูŠุฑ ู„ูŠ ุฌุฏู„ ุดูˆูŠู‡ ูˆ ุงู„ูŠ ู‡ูˆุง


ู‡ู„ ู‡ู†ุงูƒ ูุงูŠุฏู‡ ู…ู† ุชุนู„ู… ู†ุช ูˆุฑูƒ ุŸ

ุทุจ ูˆู‡ู„ ุงู„ู†ุช ูˆุฑูƒ ูุนู„ุง ู„ูŠ ู„ุฒู…ู‡ ุŸ

ู„ุงุณุงู„ู‡ ุฏูŠ ูˆ ุงูƒุชุฑ ุจุชูŠุฌูŠ ู ุฏู…ุงุบูŠ ู ุงุฌุงุจุชู‡ุง ู‡ุชูƒูˆู† ู ู…ู‚ุงู„ ุฏุง

ู‡ุงุช ุดุงูŠ ุฎููŠู ูˆ ุงู‚ุฑุงุก ู…ู‚ุงู„ ูˆ ุงุณุชู…ุชุน

* ุงู„ู…ู‚ุงู„ ู…ู† ูˆุฌู‡ู‡ ู†ุธุฑูŠ ุงู„ุดุฎุตูŠุฉ ูˆ ูƒู„ ุดุฎุต ู…ุชุงุญ ูŠู‚ูˆู„ ุฑุงูŠูˆ ูุง ุนู†ุฏูƒ ู…ุนู„ูˆู…ู‡ ุฒูŠุงุฏู‡ ุงูƒุชุจู‡ุง ู„ูŠุง ููŠ ูƒูˆู…ู†ุชุงุช *

ุทูŠุจ ุงู„ูˆู‚ุชูŠ ุงู†ุง ุงูŠ ู„ุฒู…ู‡ ุงู†ูŠ ุงุชุนู„ู… ู†ุช ูˆุฑูƒ ุŸ

ูŠุนู†ูŠ ู…ุซู„ุง ุงู†ุง ุดุฎุต ุดุบุงู„ ููŠ ู‡ุงุฑุฏ ูˆูŠุฑ ู‡ู„ ู„ุฒู… ุงุชุนู„ู… ู†ุช ูˆุฑูƒ ุŸ

ู„ุงุฌุงุจู‡ ู„ุง ู…ุด ู„ุฒู…

ุทุจ ุงุฒุงูŠ ูŠุง ุณุจุงูŠุฏุฑ ุŸ

ุจุต ู„ุฒู… ู†ูู‡ู… ู„ุงูˆู„ ุนู…ู„ูˆ ุงู„ู†ุช ูˆุฑูƒ ู„ูŠู‡ ุŸ

ูˆ ู…ุด ู‡ูƒู„ู…ูƒ ููŠ ุชุงุฑูŠุฎ ู†ุช ูˆุฑูƒ ู„ุง

ุงู„ู†ุช ูˆุฑูƒ ุงุชุนู…ู„ ุจุจุณุงุทู‡ ุนุดุงู† ูŠูƒูˆู† ู…ุดุงุฑูƒู‡

ูˆ ุฏุง ู…ุตุทู„ุญ network

ุจู…ุนู†ูŠ ุงู† ููŠ ู…ุฌุงู„ุงุช ููŠ ุชูƒู†ูˆู„ูˆุฌูŠ ู…ุด ู…ุญุชุงุฌู‡ ู†ุช ูˆุฑูƒ ูƒุง ุดุฆ ุงุณุงุณูŠ ูˆู„ูƒู† ู…ู…ูƒู† ุชุณุชุฎุฏู… ููŠู‡ุง

ุงูŠูˆ ุจุฑุฏูˆ ู‡ู„ ุฏุง ู…ุนู†ู‡ุง ุงู† ู†ุช ูˆุฑูƒ ู…ู„ู‡ูˆุด ู„ุฒู…ู‡ ุŸ

ุงุฌุงุจู‡ ุงู„ุณูˆุงู„ ุฏุง ุจุชูƒูˆู† ุนู„ูŠ ุญุณุจ ุงุณุชุฎุฏุงู…ูƒ

ูŠุนู†ูŠ ุงูŠ ุŸ

ูŠุนู†ูŠ ู„ูˆ ุงู†ุช ุดุฎุต ุนู†ุฏูƒ ู…ุตู†ุน ู…ุด ู…ุญุชุงุฌ ู†ุช ูˆุฑูƒ

ุจุจุณุงุทู‡ ุนุดุงู† ุนู†ุฏูƒ ุงู„ุงุช ู†ูุณู‡ุง ุดุบุงู„ู‡ ุจู†ุธุงู…

Embedded Systems

ูˆ ุฏุง ุจูŠุฎู„ูŠ ุงู„ู…ุงูƒูŠู†ู‡ ุงุณุฑุน ูˆ ุงู…ุงู† ุงูƒุชุฑ

ุทูŠุจ ุงู†ุง ุดุบุงู„ ุณูˆูุช ูˆูŠุฑ ุนุงุฏูŠ ุŸ

ู‡ู‚ูˆู„ูƒ ุจุฑุฏูˆ ู…ุด ุดุฑุท

ูŠุนู†ูŠ ุชู‚ุฏุฑ ุชุณุชุฎุฏู… ุงุฌู‡ุฒุชูƒ ูˆ ุญูŠุงุชูƒ ุจุฏูˆู† ู†ุช ูˆุฑูƒ ุนุงุฏูŠ

ุทูŠุจ ู‡ู„ ู„ูŠ ู„ุฒู…ู‡ ุงู†ูŠ ุงุชุนู„ู… ู†ุช ูˆุฑูƒ ุŸ

ุงู„ุญู‚ูŠู‚ู‡ ุงุฌุงุจู‡ ุณูˆุงู„ ุจุฑุฏูˆ ุนู†ุฏูƒ ุนู„ูŠ ุญุณุจ ุงุณุชุฎุฏุงู…ูƒ ูˆ ุนู„ูŠ ุญุณุจ ุญูŠุงุชูƒ

ู„ูˆ ุงู†ุช ู…ุซู„ุง ุดุบุงู„ ููŠ ุตูŠุงู†ู‡ ุงู„ุนุฑุจูŠุงุช ู‡ู„ ุฏุง ู„ูŠ ู„ุฒู…ู‡ ุŸ

ุงูƒูŠุฏ ู„ุง

ุทูŠุจ ู„ูˆ ุงู†ุช ุดุบุงู„ ุดุบู„ ู„ูŠ ุนู„ุงู‚ู‡ ุงู†ูƒ ุชุจุนุช ู…ู„ูุงุช ุงูˆ ุงู†ูƒ ุชูƒุชุจ ู…ู‚ุงู„ ูˆ ุชู†ุฒู„ูˆ ุงูˆ ุงูˆ

ูˆู‚ุชู‡ุง ุชู‚ุฏุฑ ุชุชุนู„ู… ู„ู† ุฏุง ุญุงุฌู‡ ุงู†ุช ุจุชุณุชุฎุฏู…ู‡ุง ูˆ ุงูƒูŠุฏ ู…ููŠุด ุดุฎุต ู…ุด ุจูŠุชุนู„ู… ุญุงุฌู‡ ู‡ูˆ ู…ุด ุนุงุฑู ู‡ูŠุง ุงูŠ ุญุชู‡ ู„ูˆ ุฌุฒุก ุจุณูŠุท

ู…ุด ู‡ู‚ูˆู„ูƒ ุฑูˆุญ ุฎุฏ ุดู‡ุงุฏู‡ CCIE ุงูˆ ู…ุง ูŠุดุจู‡

ู„ุง ุนู„ูŠ ุญุณุจ ู…ุฌุงู„ูƒ ูˆ ุงุณุชุฎุฏุงู…ูƒ

ูŠุนู†ูŠ ู…ุซู„ุง ู…ู‡ู†ุฏุณ ุงู…ู† ู…ุนู„ูˆู…ุงุช ู‚ุณู… ู…ุนู„ูˆู…ุงุช ุฑู‚ู…ูŠู‡ ุชุญุฏูŠุฏุง ุงู…ู† ุณูŠุจุฑุงู†ูŠ

ู…ุญุชุงุฌ ูŠุชุนู„ู… ุจุณ ู…ุด ุฒูŠ ู…ู‡ู†ุฏุณ ุงู„ุดุจูƒุงุช

ูˆ ูƒู„ ุญุงุฌู‡ ููŠ ุงู„ุฏู†ูŠุง ุชู‚ุฏุฑ ุชุฑุจุทู‡ุง ุจ ุจุนุถ ูŠุนู†ูŠ ุชู‚ุฏุฑ ุชุฏุฎู„ ุงู„ู†ุช ูˆุฑูƒ ู…ุน ุนุฑุจูŠู‡

ูŠุจู‚ูŠ ุนู†ุฏูƒ ุนุฑุจูŠู‡ ุชู‚ุฏุฑ ุชุดุบู„ ูŠูˆุชูŠูˆุจ ููŠู‡ุง ุงูˆ ุงูŠ ุดุฆ ุงุฎุฑ


ู…ู„ุฎุต ุงู„ู…ู‚ุงู„ ุจุจุณุงุทู‡ ุงู†ุง ูƒุชุจุช ู…ู‚ุงู„ ุนุดุงู† ู†ุงุณ ุงู„ูŠ ู…ููƒุฑูŠู† ุงู† ู†ุช ูˆุฑูƒ ู‡ูˆ ูƒู„ ุดุฆ ูˆ ุงู†ูˆ ุงู‡ู… ุดุฆ ู…ุด ุดุฑุท ุชุชุนู„ู… ุญุงุฌู‡ ู…ุด ุชุณุชุฎุฏู…ู‡ุง ุบูŠุฑ ูˆู‚ุช ู…ุง ุชู„ู‚ูŠ ู†ูุณูƒ ู…ุญุชุงุฌู‡ุง ูˆ ุงุชู…ู†ูŠ ูŠูƒูˆู† ุนุฌุจูƒู… ู‚ูˆู„ูˆ ุฑุงูŠูƒู…
โค5
ุฑุงูŠุญ cairo ict ูˆ ุจ ุงุฐู† ุงู„ู„ู‡ ู…ุณุชู†ูŠ ุงุดูˆู ูƒู„ ุงู„ุดุจุงุจ ู‡ู†ุงูƒ ุนุดุงู† ู†ุงุฎุฏ ุตูˆุฑ ุณูˆุง ๐Ÿค๐Ÿ”ฅ
โค1
https://chat.whatsapp.com/LJUhJ8W9hIjGT7s5s0PkiI?mode=wwc

ุฏุง ุฌุฑูˆุจ ู„ูŠ ู†ุงุณ ุงู„ูŠ ู‡ุชุฑูˆุญ cairo ict ุนุดุงู† ู†ุชู‚ุงุจู„ ูƒู„ู†ุง
โค1