Recent changes

Jump to navigation Jump to search

Track the most recent changes to the wiki on this page.

Recent changes options Show last 50 | 100 | 250 | 500 changes in last 1 | 3 | 7 | 14 | 30 days
Hide registered users | Hide anonymous users | Hide my edits | Hide bots | Hide minor edits
Show new changes starting from 07:12, 1 November 2024
   
List of abbreviations:
N
This edit created a new page (also see list of new pages)
m
This is a minor edit
b
This edit was performed by a bot
(±123)
The page size changed by this number of bytes

31 October 2024

     18:44  Acquisition Techniques (en)‎‎ 3 changes history +653 [Onnowpurbo‎ (3×)]
     
18:44 (cur | prev) +260 Onnowpurbo talk contribs →‎Disk Imaging
     
18:38 (cur | prev) +393 Onnowpurbo talk contribs →‎Memory Dump
     
18:30 (cur | prev) 0 Onnowpurbo talk contribs

30 October 2024

     19:45  Hands-On: Spoofing Attack on SMTP Server & WebMail (en)‎‎ 2 changes history +30 [Onnowpurbo‎ (2×)]
     
19:45 (cur | prev) +10 Onnowpurbo talk contribs →‎Mitigation with GnuPG / OpenGPG
     
19:44 (cur | prev) +20 Onnowpurbo talk contribs →‎Mitigation with GnuPG
     05:56  Hands-on Android Forensics using ADB (en) diffhist -12 Onnowpurbo talk contribs →‎Case Example and Analysis Steps
     04:55  Analysis Techniques (en) diffhist -279 Onnowpurbo talk contribs →‎Conclusion

29 October 2024

     09:48  Linux Operating System (en)‎‎ 3 changes history +9 [Onnowpurbo‎ (3×)]
     
09:48 (cur | prev) +19 Onnowpurbo talk contribs →‎Investigation Tools and Techniques
     
09:44 (cur | prev) +13 Onnowpurbo talk contribs →‎Investigation Tools and Techniques
     
09:27 (cur | prev) -23 Onnowpurbo talk contribs →‎Investigation Tools and Techniques
     09:24  Mitigation of backdoor in Ubuntu (en)‎‎ 3 changes history +834 [Onnowpurbo‎ (3×)]
     
09:24 (cur | prev) +175 Onnowpurbo talk contribs →‎Useful Tools:
     
09:22 (cur | prev) +580 Onnowpurbo talk contribs →‎Useful Tools:
     
09:17 (cur | prev) +79 Onnowpurbo talk contribs →‎Useful Tools:
N    09:14  Grep: Scanning Backdoor diffhist +2,204 Onnowpurbo talk contribs Created page with "==grep== Dan yang terakhir, kita memiliki perintah grep yang merupakan tool command line yang hebat di Unix dan Linux. Perintah ini digunakan untuk mencari dan memeriksa kump..."
     09:14  Forensic: IT‎‎ 2 changes history +66 [Onnowpurbo‎ (2×)]
     
09:14 (cur | prev) +30 Onnowpurbo talk contribs →‎PERTEMUAN: Forensic Backdoor via Command Injection Attack
     
09:09 (cur | prev) +36 Onnowpurbo talk contribs →‎PERTEMUAN: Forensic Backdoor via Command Injection Attack
N    09:10  Grep: Scanning for backdoor (en) diffhist +2,031 Onnowpurbo talk contribs Created page with "==grep== And the last but not the least, we have the grep command which is a powerful command-line tool in Unix and Linux. It is used for searching and probing data sets for..."
     09:02  Intrusion Investigation (en) diffhist +22 Onnowpurbo talk contribs →‎Server Log Analysis
N    07:27  Hands-on: Target Port, Services, and Vulnerability Identification (en) diffhist +8,129 Onnowpurbo talk contribs Created page with "Before we begin, it’s important to understand some basic concepts: * '''Port:''' Think of a port as the doorway to an application or service on a system. Each application o..."
     07:24  Ethical Hacking diffhist +2 Onnowpurbo talk contribs →‎Scanning dan Enumeration
N    07:23  Teknik dan Protokol Wireless (WEP, WPA/WPA2) (en) diffhist +3,805 Onnowpurbo talk contribs Created page with "'''Disclaimer:''' This information is provided for educational and research purposes in the field of cybersecurity. Use of this information for illegal or unethical purposes i..."
N    07:22  Attacks: WEP Cracking, WPA Handshake Capture (en) diffhist +3,849 Onnowpurbo talk contribs Created page with "==Understanding WEP Cracking and WPA Handshake Capture Attacks== * '''WEP Cracking:''' WEP (Wired Equivalent Privacy) is a wireless network security protocol that is consider..."
N    07:20  Report Penetration Test: Examples of Exploitation Findings (en) diffhist +2,894 Onnowpurbo talk contribs Created page with "==Exploit Findings: SQL Injection Vulnerability in Web Applications== ===Vulnerabilities Discovered:=== SQL Injection (SQLi) is a security vulnerability where an attacker can..."
N    07:19  Report Penetration Test: Examples of Impact Findings (en) diffhist +3,523 Onnowpurbo talk contribs Created page with "==Potential Impact== Each vulnerability found in the system can have a significant impact if exploited by an unauthorized party. Here are some possible impact scenarios for so..."
N    07:18  Report Penetration Test: Example of Risk Analysis (en) diffhist +4,590 Onnowpurbo talk contribs Created page with "==Overview== This report aims to evaluate the risk level of various vulnerabilities detected during penetration testing on the web application of *Company XYZ*. Each vulnerab..."
N    07:17  Data Exfiltration (en) diffhist +4,012 Onnowpurbo talk contribs Created page with "'''Data exfiltration''' is the process of stealing data from a system unauthorizedly and moving it to another location that can be accessed by an attacker. Kali Linux, as a po..."
N    07:16  Exploiting Misconfigured Services (en) diffhist +4,377 Onnowpurbo talk contribs Created page with "==What are Misconfigured Services?== Misconfigured services refer to services (such as web servers, database servers, or applications) that are not configured properly. This..."
N    07:15  Hands-on: Gaining Root and Administrator Access in Linux and Windows (en)‎‎ 2 changes history +3,346 [Onnowpurbo‎ (2×)]
     
07:15 (cur | prev) -314 Onnowpurbo talk contribs
N    
07:14 (cur | prev) +3,660 Onnowpurbo talk contribs Created page with "=Privilege Escalation pada Ubuntu 24.04 Server Linux dan Windows 10= Privilege escalation adalah teknik yang digunakan untuk mendapatkan hak akses lebih tinggi dari yang dibe..."
     07:14  Hands-on: Menaikkan Privilege di Sistem Linux dan Windows diffhist -187 Onnowpurbo talk contribs