<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Hacker_as_a_Service</id>
	<title>Hacker as a Service - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Hacker_as_a_Service"/>
	<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Hacker_as_a_Service&amp;action=history"/>
	<updated>2026-04-23T05:23:04Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.4</generator>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Hacker_as_a_Service&amp;diff=68356&amp;oldid=prev</id>
		<title>Onnowpurbo: /* Why HaaS is an option */</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Hacker_as_a_Service&amp;diff=68356&amp;oldid=prev"/>
		<updated>2023-04-14T02:43:19Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Why HaaS is an option&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 02:43, 14 April 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l24&quot; &gt;Line 24:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 24:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;FBI menangkap lima orang karena menggunakan situs web peretasan untuk mendapatkan kata sandi akun email. Dua pria dari Arkansas mengoperasikan situs needapassword.com dan menghadapi hukuman lima tahun penjara jika terbukti bersalah melakukan penipuan komputer. Tiga orang lainnya membayar lebih dari $23.000 ke situs web serupa di luar AS. FBI bekerja dengan pasukan polisi di Rumania, India, dan China, dan menangkap enam tersangka administrator situs lainnya di luar negeri. Situs dikenakan biaya antara $100 dan $500 untuk mendapatkan password.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;FBI menangkap lima orang karena menggunakan situs web peretasan untuk mendapatkan kata sandi akun email. Dua pria dari Arkansas mengoperasikan situs needapassword.com dan menghadapi hukuman lima tahun penjara jika terbukti bersalah melakukan penipuan komputer. Tiga orang lainnya membayar lebih dari $23.000 ke situs web serupa di luar AS. FBI bekerja dengan pasukan polisi di Rumania, India, dan China, dan menangkap enam tersangka administrator situs lainnya di luar negeri. Situs dikenakan biaya antara $100 dan $500 untuk mendapatkan password.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Why &lt;/del&gt;HaaS &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;is an option&lt;/del&gt;==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Mengapa &lt;/ins&gt;HaaS &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;adalah pilihan&lt;/ins&gt;==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Hiring a professional hacker on a contract basis&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;businesses sometimes use this as a way to access the latest tools and techniques and identify vulnerabilities in their systems and networks before they can be exploited by malicious actors&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;However&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;it is important to remember that hiring a hacker for illegal activities such as cyber-attacks can lead to severe legal consequences&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Menyewa peretas profesional berdasarkan kontrak&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;bisnis terkadang menggunakan ini sebagai cara untuk mengakses alat dan teknik terbaru dan mengidentifikasi kerentanan dalam sistem dan jaringan mereka sebelum dapat dieksploitasi oleh aktor jahat&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Namun&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;penting untuk diingat bahwa mempekerjakan seorang peretas untuk aktivitas ilegal seperti serangan dunia maya dapat menimbulkan konsekuensi hukum yang berat&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;It is crucial to use &lt;/del&gt;HaaS &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;for ethical hacking and penetration testing only&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;to help keep your systems secure and protect sensitive information from malicious actors&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;There are many drawbacks&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;and it can be a double-edged sword&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;There is a dark side to &lt;/del&gt;HaaS, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;where hackers can be hired for illegal activities such as cyber-attacks and espionage.  &lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Sangat penting untuk menggunakan &lt;/ins&gt;HaaS &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;hanya untuk peretasan etis dan pengujian penetrasi&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;untuk membantu menjaga keamanan sistem Anda dan melindungi informasi sensitif dari aktor jahat&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Ada banyak kekurangannya&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;dan itu bisa menjadi pedang bermata dua&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Ada sisi gelap &lt;/ins&gt;HaaS, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;di mana peretas dapat disewa untuk aktivitas ilegal seperti serangan dunia maya dan spionase&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Furthermore, in some countries, using HaaS for activities may be illegal, and it is important to ensure that all activities are conducted within the bounds of the law. &lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Logpoint has the only Converged SIEM that collects, analyzes, and prioritizes security incidents. Get in touch today to book a demo and find out how we can take your cybersecurity to the next level&lt;/del&gt;.  &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Selain itu, di beberapa negara, menggunakan HaaS untuk aktivitas mungkin ilegal, dan penting untuk memastikan bahwa semua aktivitas dilakukan dalam batas-batas hukum.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Logpoint memiliki satu-satunya SIEM Terkonvergensi yang mengumpulkan, menganalisis, dan memprioritaskan insiden keamanan. Hubungi hari ini untuk memesan demo dan cari tahu bagaimana kami dapat meningkatkan keamanan siber Anda ke level selanjutnya.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Referensi==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Referensi==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* https://www.logpoint.com/en/blog/hacker-as-a-service-what-is-haas/&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* https://www.logpoint.com/en/blog/hacker-as-a-service-what-is-haas/&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Hacker_as_a_Service&amp;diff=68355&amp;oldid=prev</id>
		<title>Onnowpurbo: /* HaaS uses 'The Bad' */</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Hacker_as_a_Service&amp;diff=68355&amp;oldid=prev"/>
		<updated>2023-04-14T02:42:22Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;HaaS uses &amp;#039;The Bad&amp;#039;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 02:42, 14 April 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l20&quot; &gt;Line 20:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 20:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Contoh lain penggunaan HaaS adalah mempekerjakan seorang peretas untuk menguji keamanan aplikasi seluler. Peretas berpotensi menemukan beberapa kerentanan kritis yang memungkinkan penyerang mencuri informasi sensitif dari pengguna aplikasi. Ini menyoroti pentingnya menguji keamanan aplikasi seluler dan bagaimana HaaS dapat menjadi cara yang efektif untuk melakukannya.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Contoh lain penggunaan HaaS adalah mempekerjakan seorang peretas untuk menguji keamanan aplikasi seluler. Peretas berpotensi menemukan beberapa kerentanan kritis yang memungkinkan penyerang mencuri informasi sensitif dari pengguna aplikasi. Ini menyoroti pentingnya menguji keamanan aplikasi seluler dan bagaimana HaaS dapat menjadi cara yang efektif untuk melakukannya.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==HaaS &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;uses &lt;/del&gt;'The Bad'==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==HaaS &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;menggunakan &lt;/ins&gt;'The Bad'==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;The &lt;/del&gt;FBI &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;arrested five people for using hacking-for-hire websites to obtain &lt;/del&gt;email &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;account passwords&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Two men from &lt;/del&gt;Arkansas &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;operated the &lt;/del&gt;needapassword.com &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;site and faced up to five years in jail if found guilty of computer fraud&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Three other people paid over &lt;/del&gt;$23&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;,&lt;/del&gt;000 &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;to similar websites outside the US&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;The &lt;/del&gt;FBI &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;worked with police forces in Romania&lt;/del&gt;, India, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;and &lt;/del&gt;China, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;and arrested six other alleged site administrators overseas&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;The sites charged between &lt;/del&gt;$100 &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;and &lt;/del&gt;$500 &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;for obtaining passwords&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;FBI &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;menangkap lima orang karena menggunakan situs web peretasan untuk mendapatkan kata sandi akun &lt;/ins&gt;email. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Dua pria dari &lt;/ins&gt;Arkansas &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;mengoperasikan situs &lt;/ins&gt;needapassword.com &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;dan menghadapi hukuman lima tahun penjara jika terbukti bersalah melakukan penipuan komputer&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Tiga orang lainnya membayar lebih dari &lt;/ins&gt;$23&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;.&lt;/ins&gt;000 &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;ke situs web serupa di luar AS&lt;/ins&gt;. FBI &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;bekerja dengan pasukan polisi di Rumania&lt;/ins&gt;, India, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;dan &lt;/ins&gt;China, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;dan menangkap enam tersangka administrator situs lainnya di luar negeri&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Situs dikenakan biaya antara &lt;/ins&gt;$100 &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;dan &lt;/ins&gt;$500 &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;untuk mendapatkan password&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Why HaaS is an option==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Why HaaS is an option==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Hacker_as_a_Service&amp;diff=68354&amp;oldid=prev</id>
		<title>Onnowpurbo: /* HaaS uses 'The Good' */</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Hacker_as_a_Service&amp;diff=68354&amp;oldid=prev"/>
		<updated>2023-04-14T02:41:49Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;HaaS uses &amp;#039;The Good&amp;#039;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 02:41, 14 April 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l14&quot; &gt;Line 14:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 14:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Salah satu manfaat utama HaaS adalah memungkinkan bisnis mengakses profesional yang sangat terampil tanpa perlu mempekerjakan mereka secara penuh waktu. Ini dapat menghemat banyak uang, serta mengurangi risiko mempekerjakan orang yang salah untuk pekerjaan itu. HaaS juga dapat memberi bisnis akses ke alat dan teknik terbaru, yang mungkin tidak tersedia bagi mereka. Selain itu, HaaS dapat membantu bisnis untuk mengidentifikasi kerentanan dalam sistem dan jaringan mereka sebelum dapat dieksploitasi oleh aktor jahat.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Salah satu manfaat utama HaaS adalah memungkinkan bisnis mengakses profesional yang sangat terampil tanpa perlu mempekerjakan mereka secara penuh waktu. Ini dapat menghemat banyak uang, serta mengurangi risiko mempekerjakan orang yang salah untuk pekerjaan itu. HaaS juga dapat memberi bisnis akses ke alat dan teknik terbaru, yang mungkin tidak tersedia bagi mereka. Selain itu, HaaS dapat membantu bisnis untuk mengidentifikasi kerentanan dalam sistem dan jaringan mereka sebelum dapat dieksploitasi oleh aktor jahat.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==HaaS &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;uses &lt;/del&gt;'&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;The Good&lt;/del&gt;'==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==HaaS &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;menggunakan &lt;/ins&gt;'&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Yang Baik&lt;/ins&gt;'==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;One example of &lt;/del&gt;HaaS &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;in action is a company hiring a professional &lt;/del&gt;hacker &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;to perform a penetration test on its network&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;The hired hacker can identify several vulnerabilities&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;which are then fixed before they can be exploited by malicious actors&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;This is a well-known example of how companies are using Hacker as a Service to secure their systems&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Salah satu contoh &lt;/ins&gt;HaaS &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;yang beraksi adalah sebuah perusahaan yang menyewa seorang &lt;/ins&gt;hacker &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;profesional untuk melakukan uji penetrasi pada jaringannya&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Peretas yang disewa dapat mengidentifikasi beberapa kerentanan&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;yang kemudian diperbaiki sebelum dapat dieksploitasi oleh aktor jahat&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Ini adalah contoh terkenal tentang bagaimana perusahaan menggunakan Peretas sebagai Layanan untuk mengamankan sistem mereka&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Another example of using &lt;/del&gt;HaaS &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;is hiring a hacker to test the security of mobile apps&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;The hacker potentially finds several critical vulnerabilities that would allow an attacker to steal sensitive information from the app's users&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;This highlights the importance of testing the security of mobile apps and how &lt;/del&gt;HaaS &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;can be an effective way to do so&lt;/del&gt;.  &lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Contoh lain penggunaan &lt;/ins&gt;HaaS &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;adalah mempekerjakan seorang peretas untuk menguji keamanan aplikasi seluler&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Peretas berpotensi menemukan beberapa kerentanan kritis yang memungkinkan penyerang mencuri informasi sensitif dari pengguna aplikasi&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Ini menyoroti pentingnya menguji keamanan aplikasi seluler dan bagaimana &lt;/ins&gt;HaaS &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;dapat menjadi cara yang efektif untuk melakukannya&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==HaaS uses 'The Bad'==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==HaaS uses 'The Bad'==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Hacker_as_a_Service&amp;diff=68353&amp;oldid=prev</id>
		<title>Onnowpurbo: /* Benefits of HaaS */</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Hacker_as_a_Service&amp;diff=68353&amp;oldid=prev"/>
		<updated>2023-04-14T02:41:01Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Benefits of HaaS&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 02:41, 14 April 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l10&quot; &gt;Line 10:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 10:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Tentu saja, ini bisa dieksploitasi dan bisa sangat berisiko.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Tentu saja, ini bisa dieksploitasi dan bisa sangat berisiko.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Benefits of &lt;/del&gt;HaaS==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Manfaat &lt;/ins&gt;HaaS==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;One of the main benefits of &lt;/del&gt;HaaS &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;is that it allows businesses to access highly skilled professionals without the need to hire them full-time&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;This can save a significant amount of money&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;as well as reduce the risk of hiring the wrong person for the job&lt;/del&gt;. HaaS &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;can also provide businesses with access to the latest tools and techniques&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;which may not be available to them otherwise&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Additionally&lt;/del&gt;, HaaS &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;can help businesses to identify vulnerabilities in their systems and networks before they can be exploited by malicious actors&lt;/del&gt;.  &lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Salah satu manfaat utama &lt;/ins&gt;HaaS &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;adalah memungkinkan bisnis mengakses profesional yang sangat terampil tanpa perlu mempekerjakan mereka secara penuh waktu&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Ini dapat menghemat banyak uang&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;serta mengurangi risiko mempekerjakan orang yang salah untuk pekerjaan itu&lt;/ins&gt;. HaaS &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;juga dapat memberi bisnis akses ke alat dan teknik terbaru&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;yang mungkin tidak tersedia bagi mereka&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Selain itu&lt;/ins&gt;, HaaS &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;dapat membantu bisnis untuk mengidentifikasi kerentanan dalam sistem dan jaringan mereka sebelum dapat dieksploitasi oleh aktor jahat&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==HaaS uses 'The Good'==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==HaaS uses 'The Good'==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Hacker_as_a_Service&amp;diff=68352&amp;oldid=prev</id>
		<title>Onnowpurbo at 02:39, 14 April 2023</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Hacker_as_a_Service&amp;diff=68352&amp;oldid=prev"/>
		<updated>2023-04-14T02:39:58Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 02:39, 14 April 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l2&quot; &gt;Line 2:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 2:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Cybersecurity &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;has become a major concern for businesses and individuals alike&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;With the increasing amount of sensitive information being stored and shared &lt;/del&gt;online, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;the risk of cyber-attacks has risen dramatically&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;One trend that has emerged in recent years is the use of &lt;/del&gt;“Hacker as a Service” (HaaS). &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;This is where businesses or individuals can hire a professional hacker to perform a variety of tasks&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;such as testing the security of a website or network&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;or even launching attacks on a competitor’s network&lt;/del&gt;.  &lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Cybersecurity &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;telah menjadi perhatian utama bagi bisnis dan individu&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Dengan meningkatnya jumlah informasi sensitif yang disimpan dan dibagikan secara &lt;/ins&gt;online, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;risiko serangan dunia maya meningkat secara dramatis&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Salah satu tren yang muncul dalam beberapa tahun terakhir adalah penggunaan &lt;/ins&gt;“Hacker as a Service” (HaaS). &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Di sinilah bisnis atau individu dapat menyewa peretas profesional untuk melakukan berbagai tugas&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;seperti menguji keamanan situs web atau jaringan&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;atau bahkan melancarkan serangan pada jaringan pesaing&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;What is &lt;/del&gt;Hacker as a Service?==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Apakah &lt;/ins&gt;Hacker as a Service?==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;In its simplest form&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;it’s a type of &lt;/del&gt;outsourcing &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;for cybersecurity services&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Instead of a business hiring a full&lt;/del&gt;-&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;time employee or team to handle its cybersecurity needs&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;it can outsource these tasks to a professional hacker&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;These hackers can be hired on a contract basis and can perform a wide range of tasks&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;including penetration testing&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;vulnerability assessments&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;and even full-scale cyber-attacks&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Dalam bentuknya yang paling sederhana&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;ini adalah jenis &lt;/ins&gt;outsourcing &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;untuk layanan keamanan siber&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Alih&lt;/ins&gt;-&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;alih bisnis mempekerjakan karyawan atau tim penuh waktu untuk menangani kebutuhan keamanan sibernya&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;ia dapat mengalihdayakan tugas-tugas ini ke peretas profesional&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Peretas ini dapat disewa berdasarkan kontrak dan dapat melakukan berbagai tugas&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;termasuk pengujian penetrasi&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;penilaian kerentanan&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;dan bahkan serangan dunia maya skala penuh&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Of course&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;this is exploitable and can be truly risky&lt;/del&gt;.  &lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Tentu saja&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;ini bisa dieksploitasi dan bisa sangat berisiko&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Benefits of HaaS==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Benefits of HaaS==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Hacker_as_a_Service&amp;diff=68351&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot;Sumber: https://www.logpoint.com/en/blog/hacker-as-a-service-what-is-haas/   Cybersecurity has become a major concern for businesses and individuals alike. With the increasing...&quot;</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Hacker_as_a_Service&amp;diff=68351&amp;oldid=prev"/>
		<updated>2023-04-14T02:38:18Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Sumber: https://www.logpoint.com/en/blog/hacker-as-a-service-what-is-haas/   Cybersecurity has become a major concern for businesses and individuals alike. With the increasing...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Sumber: https://www.logpoint.com/en/blog/hacker-as-a-service-what-is-haas/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has become a major concern for businesses and individuals alike. With the increasing amount of sensitive information being stored and shared online, the risk of cyber-attacks has risen dramatically. One trend that has emerged in recent years is the use of “Hacker as a Service” (HaaS). This is where businesses or individuals can hire a professional hacker to perform a variety of tasks, such as testing the security of a website or network, or even launching attacks on a competitor’s network. &lt;br /&gt;
&lt;br /&gt;
==What is Hacker as a Service?==&lt;br /&gt;
&lt;br /&gt;
In its simplest form, it’s a type of outsourcing for cybersecurity services. Instead of a business hiring a full-time employee or team to handle its cybersecurity needs, it can outsource these tasks to a professional hacker. These hackers can be hired on a contract basis and can perform a wide range of tasks, including penetration testing, vulnerability assessments, and even full-scale cyber-attacks.&lt;br /&gt;
&lt;br /&gt;
Of course, this is exploitable and can be truly risky. &lt;br /&gt;
&lt;br /&gt;
==Benefits of HaaS==&lt;br /&gt;
&lt;br /&gt;
One of the main benefits of HaaS is that it allows businesses to access highly skilled professionals without the need to hire them full-time. This can save a significant amount of money, as well as reduce the risk of hiring the wrong person for the job. HaaS can also provide businesses with access to the latest tools and techniques, which may not be available to them otherwise. Additionally, HaaS can help businesses to identify vulnerabilities in their systems and networks before they can be exploited by malicious actors. &lt;br /&gt;
&lt;br /&gt;
==HaaS uses 'The Good'==&lt;br /&gt;
&lt;br /&gt;
One example of HaaS in action is a company hiring a professional hacker to perform a penetration test on its network. The hired hacker can identify several vulnerabilities, which are then fixed before they can be exploited by malicious actors. This is a well-known example of how companies are using Hacker as a Service to secure their systems.  &lt;br /&gt;
&lt;br /&gt;
Another example of using HaaS is hiring a hacker to test the security of mobile apps. The hacker potentially finds several critical vulnerabilities that would allow an attacker to steal sensitive information from the app's users. This highlights the importance of testing the security of mobile apps and how HaaS can be an effective way to do so. &lt;br /&gt;
&lt;br /&gt;
==HaaS uses 'The Bad'==&lt;br /&gt;
&lt;br /&gt;
The FBI arrested five people for using hacking-for-hire websites to obtain email account passwords. Two men from Arkansas operated the needapassword.com site and faced up to five years in jail if found guilty of computer fraud. Three other people paid over $23,000 to similar websites outside the US. The FBI worked with police forces in Romania, India, and China, and arrested six other alleged site administrators overseas. The sites charged between $100 and $500 for obtaining passwords.  &lt;br /&gt;
&lt;br /&gt;
==Why HaaS is an option==&lt;br /&gt;
&lt;br /&gt;
Hiring a professional hacker on a contract basis, businesses sometimes use this as a way to access the latest tools and techniques and identify vulnerabilities in their systems and networks before they can be exploited by malicious actors. However, it is important to remember that hiring a hacker for illegal activities such as cyber-attacks can lead to severe legal consequences.&lt;br /&gt;
&lt;br /&gt;
It is crucial to use HaaS for ethical hacking and penetration testing only, to help keep your systems secure and protect sensitive information from malicious actors. There are many drawbacks, and it can be a double-edged sword. There is a dark side to HaaS, where hackers can be hired for illegal activities such as cyber-attacks and espionage.  &lt;br /&gt;
&lt;br /&gt;
Furthermore, in some countries, using HaaS for activities may be illegal, and it is important to ensure that all activities are conducted within the bounds of the law. &lt;br /&gt;
&lt;br /&gt;
Logpoint has the only Converged SIEM that collects, analyzes, and prioritizes security incidents. Get in touch today to book a demo and find out how we can take your cybersecurity to the next level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* https://www.logpoint.com/en/blog/hacker-as-a-service-what-is-haas/&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>