Recent changes
Jump to navigation
Jump to search
Track the most recent changes to the wiki on this page.
List of abbreviations:
- N
- This edit created a new page (also see list of new pages)
- m
- This is a minor edit
- b
- This edit was performed by a bot
- (±123)
- The page size changed by this number of bytes
31 October 2024
|
18:44 | Acquisition Techniques (en) 3 changes history +653 [Onnowpurbo (3×)] | |||
|
18:44 (cur | prev) +260 Onnowpurbo talk contribs →Disk Imaging | ||||
|
18:38 (cur | prev) +393 Onnowpurbo talk contribs →Memory Dump | ||||
|
18:30 (cur | prev) 0 Onnowpurbo talk contribs |
30 October 2024
|
19:45 | Hands-On: Spoofing Attack on SMTP Server & WebMail (en) 2 changes history +30 [Onnowpurbo (2×)] | |||
|
19:45 (cur | prev) +10 Onnowpurbo talk contribs →Mitigation with GnuPG / OpenGPG | ||||
|
19:44 (cur | prev) +20 Onnowpurbo talk contribs →Mitigation with GnuPG |
05:56 | Hands-on Android Forensics using ADB (en) diffhist -12 Onnowpurbo talk contribs →Case Example and Analysis Steps |
04:55 | Analysis Techniques (en) diffhist -279 Onnowpurbo talk contribs →Conclusion |
29 October 2024
|
09:48 | Linux Operating System (en) 3 changes history +9 [Onnowpurbo (3×)] | |||
|
09:48 (cur | prev) +19 Onnowpurbo talk contribs →Investigation Tools and Techniques | ||||
|
09:44 (cur | prev) +13 Onnowpurbo talk contribs →Investigation Tools and Techniques | ||||
|
09:27 (cur | prev) -23 Onnowpurbo talk contribs →Investigation Tools and Techniques |
|
09:24 | Mitigation of backdoor in Ubuntu (en) 3 changes history +834 [Onnowpurbo (3×)] | |||
|
09:24 (cur | prev) +175 Onnowpurbo talk contribs →Useful Tools: | ||||
|
09:22 (cur | prev) +580 Onnowpurbo talk contribs →Useful Tools: | ||||
|
09:17 (cur | prev) +79 Onnowpurbo talk contribs →Useful Tools: |
N 09:14 | Grep: Scanning Backdoor diffhist +2,204 Onnowpurbo talk contribs Created page with "==grep== Dan yang terakhir, kita memiliki perintah grep yang merupakan tool command line yang hebat di Unix dan Linux. Perintah ini digunakan untuk mencari dan memeriksa kump..." |
|
09:14 | Forensic: IT 2 changes history +66 [Onnowpurbo (2×)] | |||
|
09:14 (cur | prev) +30 Onnowpurbo talk contribs →PERTEMUAN: Forensic Backdoor via Command Injection Attack | ||||
|
09:09 (cur | prev) +36 Onnowpurbo talk contribs →PERTEMUAN: Forensic Backdoor via Command Injection Attack |
N 09:10 | Grep: Scanning for backdoor (en) diffhist +2,031 Onnowpurbo talk contribs Created page with "==grep== And the last but not the least, we have the grep command which is a powerful command-line tool in Unix and Linux. It is used for searching and probing data sets for..." |
09:02 | Intrusion Investigation (en) diffhist +22 Onnowpurbo talk contribs →Server Log Analysis |
N 07:27 | Hands-on: Target Port, Services, and Vulnerability Identification (en) diffhist +8,129 Onnowpurbo talk contribs Created page with "Before we begin, it’s important to understand some basic concepts: * '''Port:''' Think of a port as the doorway to an application or service on a system. Each application o..." |
07:24 | Ethical Hacking diffhist +2 Onnowpurbo talk contribs →Scanning dan Enumeration |
N 07:23 | Teknik dan Protokol Wireless (WEP, WPA/WPA2) (en) diffhist +3,805 Onnowpurbo talk contribs Created page with "'''Disclaimer:''' This information is provided for educational and research purposes in the field of cybersecurity. Use of this information for illegal or unethical purposes i..." |
N 07:22 | Attacks: WEP Cracking, WPA Handshake Capture (en) diffhist +3,849 Onnowpurbo talk contribs Created page with "==Understanding WEP Cracking and WPA Handshake Capture Attacks== * '''WEP Cracking:''' WEP (Wired Equivalent Privacy) is a wireless network security protocol that is consider..." |
N 07:20 | Report Penetration Test: Examples of Exploitation Findings (en) diffhist +2,894 Onnowpurbo talk contribs Created page with "==Exploit Findings: SQL Injection Vulnerability in Web Applications== ===Vulnerabilities Discovered:=== SQL Injection (SQLi) is a security vulnerability where an attacker can..." |
N 07:19 | Report Penetration Test: Examples of Impact Findings (en) diffhist +3,523 Onnowpurbo talk contribs Created page with "==Potential Impact== Each vulnerability found in the system can have a significant impact if exploited by an unauthorized party. Here are some possible impact scenarios for so..." |
N 07:18 | Report Penetration Test: Example of Risk Analysis (en) diffhist +4,590 Onnowpurbo talk contribs Created page with "==Overview== This report aims to evaluate the risk level of various vulnerabilities detected during penetration testing on the web application of *Company XYZ*. Each vulnerab..." |
N 07:17 | Data Exfiltration (en) diffhist +4,012 Onnowpurbo talk contribs Created page with "'''Data exfiltration''' is the process of stealing data from a system unauthorizedly and moving it to another location that can be accessed by an attacker. Kali Linux, as a po..." |
N 07:16 | Exploiting Misconfigured Services (en) diffhist +4,377 Onnowpurbo talk contribs Created page with "==What are Misconfigured Services?== Misconfigured services refer to services (such as web servers, database servers, or applications) that are not configured properly. This..." |
|
N 07:15 | Hands-on: Gaining Root and Administrator Access in Linux and Windows (en) 2 changes history +3,346 [Onnowpurbo (2×)] | |||
|
07:15 (cur | prev) -314 Onnowpurbo talk contribs | ||||
N |
|
07:14 (cur | prev) +3,660 Onnowpurbo talk contribs Created page with "=Privilege Escalation pada Ubuntu 24.04 Server Linux dan Windows 10= Privilege escalation adalah teknik yang digunakan untuk mendapatkan hak akses lebih tinggi dari yang dibe..." |
07:14 | Hands-on: Menaikkan Privilege di Sistem Linux dan Windows diffhist -187 Onnowpurbo talk contribs |