Recent changes

Jump to navigation Jump to search

Track the most recent changes to the wiki on this page.

Recent changes options Show last 50 | 100 | 250 | 500 changes in last 1 | 3 | 7 | 14 | 30 days
Hide registered users | Hide anonymous users | Hide my edits | Show bots | Hide minor edits
Show new changes starting from 06:06, 1 November 2024
   
List of abbreviations:
N
This edit created a new page (also see list of new pages)
m
This is a minor edit
b
This edit was performed by a bot
(±123)
The page size changed by this number of bytes

31 October 2024

     18:44  Acquisition Techniques (en)‎‎ 3 changes history +653 [Onnowpurbo‎ (3×)]
     
18:44 (cur | prev) +260 Onnowpurbo talk contribs →‎Disk Imaging
     
18:38 (cur | prev) +393 Onnowpurbo talk contribs →‎Memory Dump
     
18:30 (cur | prev) 0 Onnowpurbo talk contribs

30 October 2024

     19:45  Hands-On: Spoofing Attack on SMTP Server & WebMail (en)‎‎ 2 changes history +30 [Onnowpurbo‎ (2×)]
     
19:45 (cur | prev) +10 Onnowpurbo talk contribs →‎Mitigation with GnuPG / OpenGPG
     
19:44 (cur | prev) +20 Onnowpurbo talk contribs →‎Mitigation with GnuPG
     05:56  Hands-on Android Forensics using ADB (en) diffhist -12 Onnowpurbo talk contribs →‎Case Example and Analysis Steps
     04:55  Analysis Techniques (en) diffhist -279 Onnowpurbo talk contribs →‎Conclusion

29 October 2024

     09:48  Linux Operating System (en)‎‎ 3 changes history +9 [Onnowpurbo‎ (3×)]
     
09:48 (cur | prev) +19 Onnowpurbo talk contribs →‎Investigation Tools and Techniques
     
09:44 (cur | prev) +13 Onnowpurbo talk contribs →‎Investigation Tools and Techniques
     
09:27 (cur | prev) -23 Onnowpurbo talk contribs →‎Investigation Tools and Techniques
     09:24  Mitigation of backdoor in Ubuntu (en)‎‎ 3 changes history +834 [Onnowpurbo‎ (3×)]
     
09:24 (cur | prev) +175 Onnowpurbo talk contribs →‎Useful Tools:
     
09:22 (cur | prev) +580 Onnowpurbo talk contribs →‎Useful Tools:
     
09:17 (cur | prev) +79 Onnowpurbo talk contribs →‎Useful Tools:
N    09:14  Grep: Scanning Backdoor diffhist +2,204 Onnowpurbo talk contribs Created page with "==grep== Dan yang terakhir, kita memiliki perintah grep yang merupakan tool command line yang hebat di Unix dan Linux. Perintah ini digunakan untuk mencari dan memeriksa kump..."
     09:14  Forensic: IT‎‎ 2 changes history +66 [Onnowpurbo‎ (2×)]
     
09:14 (cur | prev) +30 Onnowpurbo talk contribs →‎PERTEMUAN: Forensic Backdoor via Command Injection Attack
     
09:09 (cur | prev) +36 Onnowpurbo talk contribs →‎PERTEMUAN: Forensic Backdoor via Command Injection Attack
N    09:10  Grep: Scanning for backdoor (en) diffhist +2,031 Onnowpurbo talk contribs Created page with "==grep== And the last but not the least, we have the grep command which is a powerful command-line tool in Unix and Linux. It is used for searching and probing data sets for..."
     09:02  Intrusion Investigation (en) diffhist +22 Onnowpurbo talk contribs →‎Server Log Analysis
N    07:27  Hands-on: Target Port, Services, and Vulnerability Identification (en) diffhist +8,129 Onnowpurbo talk contribs Created page with "Before we begin, it’s important to understand some basic concepts: * '''Port:''' Think of a port as the doorway to an application or service on a system. Each application o..."
     07:24  Ethical Hacking‎‎ 4 changes history +1 [Onnowpurbo‎ (4×)]
     
07:24 (cur | prev) +2 Onnowpurbo talk contribs →‎Scanning dan Enumeration
     
06:37 (cur | prev) 0 Onnowpurbo talk contribs →‎Reconnaissance (Information Gathering)
     
06:36 (cur | prev) +4 Onnowpurbo talk contribs →‎Reconnaissance (Information Gathering)
     
06:34 (cur | prev) -5 Onnowpurbo talk contribs →‎Reconnaissance (Information Gathering)
N    07:23  Teknik dan Protokol Wireless (WEP, WPA/WPA2) (en) diffhist +3,805 Onnowpurbo talk contribs Created page with "'''Disclaimer:''' This information is provided for educational and research purposes in the field of cybersecurity. Use of this information for illegal or unethical purposes i..."
N    07:22  Attacks: WEP Cracking, WPA Handshake Capture (en) diffhist +3,849 Onnowpurbo talk contribs Created page with "==Understanding WEP Cracking and WPA Handshake Capture Attacks== * '''WEP Cracking:''' WEP (Wired Equivalent Privacy) is a wireless network security protocol that is consider..."
N    07:20  Report Penetration Test: Examples of Exploitation Findings (en) diffhist +2,894 Onnowpurbo talk contribs Created page with "==Exploit Findings: SQL Injection Vulnerability in Web Applications== ===Vulnerabilities Discovered:=== SQL Injection (SQLi) is a security vulnerability where an attacker can..."
N    07:19  Report Penetration Test: Examples of Impact Findings (en) diffhist +3,523 Onnowpurbo talk contribs Created page with "==Potential Impact== Each vulnerability found in the system can have a significant impact if exploited by an unauthorized party. Here are some possible impact scenarios for so..."
N    07:18  Report Penetration Test: Example of Risk Analysis (en) diffhist +4,590 Onnowpurbo talk contribs Created page with "==Overview== This report aims to evaluate the risk level of various vulnerabilities detected during penetration testing on the web application of *Company XYZ*. Each vulnerab..."
N    07:17  Data Exfiltration (en) diffhist +4,012 Onnowpurbo talk contribs Created page with "'''Data exfiltration''' is the process of stealing data from a system unauthorizedly and moving it to another location that can be accessed by an attacker. Kali Linux, as a po..."
N    07:16  Exploiting Misconfigured Services (en) diffhist +4,377 Onnowpurbo talk contribs Created page with "==What are Misconfigured Services?== Misconfigured services refer to services (such as web servers, database servers, or applications) that are not configured properly. This..."
N    07:15  Hands-on: Gaining Root and Administrator Access in Linux and Windows (en)‎‎ 2 changes history +3,346 [Onnowpurbo‎ (2×)]
     
07:15 (cur | prev) -314 Onnowpurbo talk contribs
N    
07:14 (cur | prev) +3,660 Onnowpurbo talk contribs Created page with "=Privilege Escalation pada Ubuntu 24.04 Server Linux dan Windows 10= Privilege escalation adalah teknik yang digunakan untuk mendapatkan hak akses lebih tinggi dari yang dibe..."
     07:14  Hands-on: Menaikkan Privilege di Sistem Linux dan Windows diffhist -187 Onnowpurbo talk contribs
N    07:08  Teknik Social Engineering: Phishing, Pretexting, Baiting (en) diffhist +3,783 Onnowpurbo talk contribs Created page with "'''Social engineering''' is a psychological manipulation technique to obtain sensitive information from individuals. In the context of ethical hacking, this technique is used..."
N    07:06  Email Spoofing dan Spear Phishing (en) diffhist +3,624 Onnowpurbo talk contribs Created page with "==Social Engineering: Manipulating Humans to Gain Access== Social engineering is a psychological manipulation technique used by cybercriminals to gain sensitive information o..."
N    07:06  Tools: Social Engineering Toolkit (SET) (en) diffhist +7,031 Onnowpurbo talk contribs Created page with "Explanation of Social Engineering Toolkit (SET) in Kali Linux 24.03 for ethical hacking course purposes. ==What is Social Engineering Toolkit (SET)?== SET is an open-source..."
     07:04  Tools: Social Engineering Toolkit (SET)‎‎ 3 changes history -745 [Onnowpurbo‎ (3×)]
     
07:04 (cur | prev) -49 Onnowpurbo talk contribs →‎Pranala Menarik
     
07:03 (cur | prev) -609 Onnowpurbo talk contribs
     
06:55 (cur | prev) -87 Onnowpurbo talk contribs
N    06:51  Hands-on: Simulasi Phishing Attack (en) diffhist +3,403 Onnowpurbo talk contribs Created page with "Here is an explanation and example of a '''Phishing Attack''' simulation using '''Kali Linux 2024.3''' in the context of an ethical hacking course. ==Phishing Attack Overview..."
     06:51  Hands-on: Simulasi Phishing Attack diffhist -33 Onnowpurbo talk contribs
N    06:47  Tools: WHOIS, dig, Maltego, Google Dorking (en) diffhist +3,986 Onnowpurbo talk contribs Created page with "=WHOIS= ==What is WHOIS?== WHOIS is a query protocol used to find public information about internet domain registrations. This information can include the owner's name, emai..."
N    06:45  Passive and Active Reconnaissance (en)‎‎ 2 changes history +8,854 [Onnowpurbo‎ (2×)]
     
06:45 (cur | prev) -7 Onnowpurbo talk contribs
N    
06:44 (cur | prev) +8,861 Onnowpurbo talk contribs Created page with "Reconnaissance or information gathering in the context of cybersecurity is the initial phase of a cyber attack or penetration testing (pentest), where an attacker or pentester..."
N    06:37  Open Source Intelligence (OSINT) Techniques (en) diffhist +3,460 Onnowpurbo talk contribs Created page with "Open Source Intelligence (OSINT) techniques are methods of gathering information from open and public sources. It is often used in the passive reconnaissance phase. OSINT invo..."
N    06:35  Hands-on: Passive Target Information Gathering (en)‎‎ 2 changes history +4,242 [Onnowpurbo‎ (2×)]
     
06:35 (cur | prev) +7 Onnowpurbo talk contribs
N    
06:34 (cur | prev) +4,235 Onnowpurbo talk contribs Created page with "For hands-on ethical hacking using Kali Linux 2024.3, we can passively collect target information as part of the reconnaissance stage. Passive information gathering is the pro..."
N    06:32  Directory Traversal, File Inclusion (en) diffhist +3,618 Onnowpurbo talk contribs Created page with "==Directory Traversal and File Inclusion: Exploring the File System Unexpectedly== ==What is Directory Traversal?== Directory traversal is a vulnerability in a web applicati..."
     06:32  Tools: Aircrack-ng, Wireshark diffhist -7 Onnowpurbo talk contribs
     06:31  Tools: Aircrack-ng, Wireshark (en) diffhist -6 Onnowpurbo talk contribs