{"version":1,"pages":[{"id":"4raMVraIQABxKcW1Fgin","title":"About the Author","pathname":"/","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f60d","description":"Welcome to the Book of Thuong Eopi. Here, I share and document all my write-ups, which might help others in the information security community."},{"id":"lvyX8sIyHHzY5DqCkjeU","title":"ChatGPT for Cybersecurity","pathname":"/chatgpt-for-cybersecurity","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f916","description":"How to utilize ChatGPT for Cybersecurity"},{"id":"hIrlUPVUM8VPNXIOLBbk","title":"Certified Ethical Hacker (C|EH)(Practical)","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"This note will guide you with all my methodologies I used while preparing and throughout the exam.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"}]},{"id":"pVUJPvBntJJesDT46YuN","title":"Reconnaissance (Footprinting)","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/reconnaissance-footprinting","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Welcome to the Footprinting module. This note will guide you thru all the methodologies that I used while preparing for the CEH (Practical) exam.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"}]},{"id":"VCDzOOPr4WoCSaUDLNaF","title":"Scanning Networks","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/scanning-networks","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Welcome to the Scanning Networks module. This note will guide you thru all the methodologies that I used while preparing for the CEH (Practical) exam.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"}]},{"id":"tpC0UgYzJ0NauA9P4J16","title":"Vulnerability Analysis","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/vulnerability-analysis","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Welcome to the Vulnerability Analysis module. This note will guide you thru all the methodologies that I used while preparing for the CEH (Practical) exam.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"}]},{"id":"o0n2lWixjRG0I9TeGSiP","title":"System Hacking","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/system-hacking","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Welcome to the System Hacking module. This note will guide you thru all the methodologies that I used while preparing for the CEH (Practical) exam.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"}]},{"id":"jcVJxqdPstKAWEcgunPt","title":"Sniffing","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/sniffing","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Welcome to the Sniffing module. This note will guide you thru all the methodologies that I used while preparing for the CEH (Practical) exam.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"}]},{"id":"2lTGrYHk5I93UQVWcbH1","title":"SQL Injection","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/sql-injection","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Welcome to the SQL Injection module. This note will guide you thru all the methodologies that I used while preparing for the CEH (Practical) exam.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"}]},{"id":"d4YblgQpmi0GKslaZxBz","title":"Remote code execution","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/remote-code-execution","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Remote code execution (RCE), also known as code injection, refers to an attacker executing commands on a system from a remote machine. Often this means exploiting a web application/server to run comma","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"}]},{"id":"UOPgEredyWxyGhYQ9tp3","title":"Hacking Web Applications & Servers","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/hacking-web-applications-and-servers","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Welcome to the Hacking Web Applications & Servers module. This note will guide you thru all the methodologies I followed while preparing for CEH (Practical) exam.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"}]},{"id":"UDuqlxSMOSNoThHpSqjC","title":"Local and remote file inclusion","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/hacking-web-applications-and-servers/local-and-remote-file-inclusion","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Local file inclusion (LFI) vulnerabilities allow an attacker to read local files on the web server using malicious web requests, such as:","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"},{"label":"Hacking Web Applications & Servers"}]},{"id":"CY6eHqItPXjkEAATEzSU","title":"File upload bypass","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/hacking-web-applications-and-servers/file-upload-bypass","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"File upload mechanisms are very common on websites, but sometimes have poor validation. This allows attackers to upload malicious files to the web server, which can then be executed by other users or","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"},{"label":"Hacking Web Applications & Servers"}]},{"id":"431opXfvV7xZbUG6Co9j","title":"Cross-site scripting","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/hacking-web-applications-and-servers/cross-site-scripting","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"},{"label":"Hacking Web Applications & Servers"}]},{"id":"L81mzpdlh05LBhWztpMU","title":"Cross-site request forgery","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/hacking-web-applications-and-servers/cross-site-request-forgery","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"},{"label":"Hacking Web Applications & Servers"}]},{"id":"Jd4iq5DelpK6PuMvKDs5","title":"Server-side request forgery","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/hacking-web-applications-and-servers/server-side-request-forgery","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"In this section, I will explain what server-side request forgery is, describe some common examples, and explain how to find and exploit various kinds of SSRF vulnerabilities.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"},{"label":"Hacking Web Applications & Servers"}]},{"id":"J4ZtKYWUCSJN35scIagD","title":"Exploitation","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/exploitation","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Here are the articles in this section:","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"}]},{"id":"lK3CDyeYtrjOHgBqTbjI","title":"Working with exploits","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/exploitation/working-with-exploits","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"This section is mostly about local exploits, because they're annoying. Remote python exploits are usually point-and-shoot and web exploits have their own section.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"},{"label":"Exploitation"}]},{"id":"6nj6wZv63ZrORtEGrsM9","title":"Password cracking","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/exploitation/password-cracking","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or network resource.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"},{"label":"Exploitation"}]},{"id":"PFjkE7ifukWfCTnHPbOz","title":"Metasploit","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/exploitation/metasploit","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"This page is just basic stuff I forget all the time. There are other Metasploit tips in sections where it's relevant.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"},{"label":"Exploitation"}]},{"id":"MvhgN9YwzynQPoisQCaU","title":"Buffer overflow","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/exploitation/buffer-overflow","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Exploit buffer overflow issues by overwriting the memory of an application. This changes the execution path of the program, triggering a response that damages files or exposes private information.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"},{"label":"Exploitation"}]},{"id":"jLPScZYVWsPtIRpaX2xM","title":"Cloud Computing","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/cloud-computing","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Welcome to the Cloud Computing module. This note will guide you thru all the methodologies that I used while preparing for the CEH (Practical) exam.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"}]},{"id":"L0OubMVmGDrlqfY4Xj7F","title":"Cryptography","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/cryptography","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Welcome to the Cryptography module. This note will guide you thru all the methodologies that I used while preparing for the CEH (Practical) exam.","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"}]},{"id":"21h1ISSoEcCK9ekqLyMG","title":"Mobile Pentesting Resources","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/mobile-pentesting-resources","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"}]},{"id":"vnvJpoZrxn7hAOMlFuwI","title":"Learning resources","pathname":"/certifications/certified-ethical-hacker-c-or-eh-practical/learning-resources","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"","breadcrumbs":[{"label":"CERTIFICATIONS","emoji":"1f4d8"},{"label":"Certified Ethical Hacker (C|EH)(Practical)"}]},{"id":"IFIg48vWCVYuUWMAJKmo","title":"My Hacking Materials","pathname":"/my-hacking-materials","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f3c1","description":"Keep calm and hack the planet"},{"id":"CnbEZ8BvOvpf4av5Eqnh","title":"My Most Frequently Used Hacking Commands","pathname":"/my-hacking-materials/my-most-frequently-used-hacking-commands","siteSpaceId":"sitesp_HlFDC","lang":"vi","icon":"flask-vial","description":"A quick reference to my most-used hacking commands for cybersecurity and penetration testing.","breadcrumbs":[{"label":"My Hacking Materials","emoji":"1f3c1"}]},{"id":"WQLdgwR6oveXMAdEMHUw","title":"RickdiculouslyEasy: 1 VulnHub WriteUp","pathname":"/my-hacking-materials/rickdiculouslyeasy-1-vulnhub-writeup","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Walkthrough for RickdiculouslyEasy in VulnHub","breadcrumbs":[{"label":"My Hacking Materials","emoji":"1f3c1"}]},{"id":"KsvbnUtT6MQltRDVnU4O","title":"Corrosion: 2 VulnHub WriteUp","pathname":"/my-hacking-materials/corrosion-2-vulnhub-writeup","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Walkthrough for Corrosion 2 in VulnHub","breadcrumbs":[{"label":"My Hacking Materials","emoji":"1f3c1"}]},{"id":"pryBmFBupu7tdM2eUqGA","title":"Hackable: 3 VulnHub WriteUp","pathname":"/my-hacking-materials/hackable-3-vulnhub-writeup","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Walkthrough for Hackable 3 in VulnHub","breadcrumbs":[{"label":"My Hacking Materials","emoji":"1f3c1"}]},{"id":"TgOlQ3csOmYEYA9BYHfx","title":"Empire: LupinOne Vulnhub WriteUp","pathname":"/my-hacking-materials/empire-lupinone-vulnhub-writeup","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Walkthrough for Empire LupinOne in VulnHub","breadcrumbs":[{"label":"My Hacking Materials","emoji":"1f3c1"}]},{"id":"sf7CSjvAebYdvuBXdPn9","title":"101 Labs for Linux","pathname":"/101-labs-for-linux","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f427","description":"This book is designed to cement the theory you have read in your Linux study guide or video training course."},{"id":"NoA2SFazzTZsgKtwoodc","title":"Hardware and System Configuration","pathname":"/101-labs-for-linux/hardware-and-system-configuration","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f4bb","description":"","breadcrumbs":[{"label":"101 Labs for Linux","emoji":"1f427"}]},{"id":"lxAx3WstRnBr5lD5cNvs","title":"LAB 1 - Boot Sequence","pathname":"/101-labs-for-linux/hardware-and-system-configuration/lab-1-boot-sequence","siteSpaceId":"sitesp_HlFDC","lang":"vi","description":"Learn how to manage boot options and understand the boot sequence.","breadcrumbs":[{"label":"101 Labs for Linux","emoji":"1f427"},{"label":"Hardware and System Configuration","emoji":"1f4bb"}]},{"id":"aDklliujORbnJ12pjDHM","title":"DFIR Cơ Bản Và Thực Tế","pathname":"/dfir-co-ban-va-thuc-te","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f50e","description":"Chơi cho vui thì làm thì khác"},{"id":"EheQzezI6ARytiKHO99E","title":"Pokémon Brilliant Diamond and Shining Pearl","pathname":"/mod-nintendo-switch-game/pokemon-brilliant-diamond-and-shining-pearl","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f539","description":"Welcome to Pokémon Brilliant Diamond & Shining Pearl modding book!","breadcrumbs":[{"label":"Mod Nintendo Switch Game","emoji":"1f527"}]},{"id":"1QL0h8hpGJbvyklOgCgF","title":"Install mods on Nintendo Switch","pathname":"/mod-nintendo-switch-game/pokemon-brilliant-diamond-and-shining-pearl/install-mods-on-nintendo-switch","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f7e5","description":"How to Mod Pokemon BDSP on Nintendo Switch (A Tutorial for Pokemon Brilliant Diamond and Shining Pearl)","breadcrumbs":[{"label":"Mod Nintendo Switch Game","emoji":"1f527"},{"label":"Pokémon Brilliant Diamond and Shining Pearl","emoji":"1f539"}]},{"id":"p98XzOpiM8mHNxeP5iOo","title":"Install mods on Yuzu/Ryujinx Emulator","pathname":"/mod-nintendo-switch-game/pokemon-brilliant-diamond-and-shining-pearl/install-mods-on-yuzu-ryujinx-emulator","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f7e6","description":"How to mod Pokemon BDSP on Yuzu/Ryujinx Emulator ( A Tutorial for Pokemon Brilliant Diamond and Shining Pearl)","breadcrumbs":[{"label":"Mod Nintendo Switch Game","emoji":"1f527"},{"label":"Pokémon Brilliant Diamond and Shining Pearl","emoji":"1f539"}]},{"id":"RVGN9KeOxakA6O6QEi1n","title":"Custom font for Pokémon BDSP","pathname":"/mod-nintendo-switch-game/pokemon-brilliant-diamond-and-shining-pearl/custom-font-for-pokemon-bdsp","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f520","description":"Step-by-step instructions to create custom fonts for Pokémon BDSP","breadcrumbs":[{"label":"Mod Nintendo Switch Game","emoji":"1f527"},{"label":"Pokémon Brilliant Diamond and Shining Pearl","emoji":"1f539"}]},{"id":"FxlRyFMUrVR9nh22MzH0","title":"SHARE TÀI LIỆU NVSP","pathname":"/share-tai-lieu-nvsp","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f4d6","description":"Tổng hợp lý thuyết"},{"id":"N1272OBXP6LABwzpmQ3K","title":"HỌC PHẦN 1","pathname":"/share-tai-lieu-nvsp/hoc-phan-1","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"0031-20e3","description":"Giáo dục đại học Việt nam và Thế giới","breadcrumbs":[{"label":"SHARE TÀI LIỆU NVSP","emoji":"1f4d6"}]},{"id":"Hs5UBy0mDnUviTpXmtNd","title":"HỌC PHẦN 2","pathname":"/share-tai-lieu-nvsp/hoc-phan-2","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"0032-20e3","description":"Tâm lý giáo dục đại học","breadcrumbs":[{"label":"SHARE TÀI LIỆU NVSP","emoji":"1f4d6"}]},{"id":"KlhkSNHSgEpayF9e5N9X","title":"HỌC PHẦN 3","pathname":"/share-tai-lieu-nvsp/hoc-phan-3","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"0033-20e3","description":"Lý luận và phương pháp dạy học đại ho","breadcrumbs":[{"label":"SHARE TÀI LIỆU NVSP","emoji":"1f4d6"}]},{"id":"u19nmIC6iFJIfz7VKlYs","title":"HỌC PHẦN 4","pathname":"/share-tai-lieu-nvsp/hoc-phan-4","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"0034-20e3","description":"Phát triển chương trình và tổ chức quá trình đào tạo ĐH, CĐ","breadcrumbs":[{"label":"SHARE TÀI LIỆU NVSP","emoji":"1f4d6"}]},{"id":"1muN3uvBhECLg6s1t1j3","title":"HỌC PHẦN 5 (chưa hoàn thiện)","pathname":"/share-tai-lieu-nvsp/hoc-phan-5-chua-hoan-thien","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"0035-20e3","description":"Đánh giá kết quả học tập","breadcrumbs":[{"label":"SHARE TÀI LIỆU NVSP","emoji":"1f4d6"}]},{"id":"8XikpxSwbKubk9GGgrQU","title":"HỌC PHẦN 6","pathname":"/share-tai-lieu-nvsp/hoc-phan-6","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"0036-20e3","description":"Ứng dụng công nghệ thông tin và truyền thông trong dạy học đại học","breadcrumbs":[{"label":"SHARE TÀI LIỆU NVSP","emoji":"1f4d6"}]},{"id":"avRJRvhHVGewYqK5eJj1","title":"Tổng Hợp Võ Lâm 2","pathname":"/tong-hop-vo-lam-2","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"2694","description":"Tổng Hợp Mọi Thứ Về Võ Lâm 2 – Những Phiên Bản Được Chia Sẻ Bởi EoPi"},{"id":"jHPksIKlsuItvi12vyxY","title":"Server JX2 2014 - Bản Kinh Doanh","pathname":"/tong-hop-vo-lam-2/server-jx2-2014-ban-kinh-doanh","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f4b0","description":"Jx2 2014 Online Version","breadcrumbs":[{"label":"Tổng Hợp Võ Lâm 2","emoji":"2694"}]},{"id":"iEH37GL0Nv9l387PlWwp","title":"Server JX2 2014 - Phiên bản Offline","pathname":"/tong-hop-vo-lam-2/server-jx2-2014-phien-ban-offline","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f451","description":"Jx2 2014 Offline Version","breadcrumbs":[{"label":"Tổng Hợp Võ Lâm 2","emoji":"2694"}]},{"id":"Ts5ytqGq0eOB0ZeHvrNT","title":"Server JX2 2017 - Phiên Bản Offline","pathname":"/tong-hop-vo-lam-2/server-jx2-2017-phien-ban-offline","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f451","description":"Jx2 2017 Offline Version","breadcrumbs":[{"label":"Tổng Hợp Võ Lâm 2","emoji":"2694"}]},{"id":"YuP3vb2j1ndpCCENEA1u","title":"Server JX2 2021 - Phiên Bản Offline","pathname":"/tong-hop-vo-lam-2/server-jx2-2021-phien-ban-offline","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f451","description":"Jx2 2021 Offline Version","breadcrumbs":[{"label":"Tổng Hợp Võ Lâm 2","emoji":"2694"}]},{"id":"rdeiLL7UVWxZ9VhHyvR0","title":"Website tài khoản chơi Offline","pathname":"/tong-hop-vo-lam-2/website-tai-khoan-choi-offline","siteSpaceId":"sitesp_HlFDC","lang":"vi","emoji":"1f381","description":"Website dành cho các phiên bản chơi Offline có thể nhanh chống thao tác.","breadcrumbs":[{"label":"Tổng Hợp Võ Lâm 2","emoji":"2694"}]}]}