Difference between revisions of "Cyber Security (en)"
Jump to navigation
Jump to search
Onnowpurbo (talk | contribs) |
Onnowpurbo (talk | contribs) |
||
(24 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
==TCP/IP CONCEPT== | ==TCP/IP CONCEPT== | ||
− | |||
*[https://andipublisher.com/produk/detail/internet-tcpip-konsep-amp-implementasi TCP/IP: Buku TCP/IP OWP] | *[https://andipublisher.com/produk/detail/internet-tcpip-konsep-amp-implementasi TCP/IP: Buku TCP/IP OWP] | ||
− | |||
*[https://en.wikipedia.org/wiki/History_of_the_Internet TCP/IP: Sejarah Internet Dunia (en)] | *[https://en.wikipedia.org/wiki/History_of_the_Internet TCP/IP: Sejarah Internet Dunia (en)] | ||
*[https://id.wikipedia.org/wiki/Sejarah_Internet TCP/IP: Sejarah Internet Dunia] | *[https://id.wikipedia.org/wiki/Sejarah_Internet TCP/IP: Sejarah Internet Dunia] | ||
+ | |||
+ | |||
+ | *[[TCP/IP: Konsep Dasar]] | ||
+ | *[[TCP/IP: Sejarah Internet Indonesia]] | ||
*[[TCP/IP: Penggunaan Wireshark]] | *[[TCP/IP: Penggunaan Wireshark]] | ||
*[[TCP/IP: Penggunaan tcpdump]] | *[[TCP/IP: Penggunaan tcpdump]] | ||
− | *[[TCP/IP: | + | *[[TCP/IP: Basic Concept (en)]] |
− | *[[TCP/IP: | + | *[[TCP/IP: Indonesia Internet History(en)]] |
− | + | *[[TCP/IP: Wireshark howto(en)]] | |
− | + | *[[TCP/IP: tcpdump howto (en)]] | |
− | *[[TCP/IP: | ||
− | *[[TCP/IP: | ||
Line 36: | Line 36: | ||
*[[SIMULATOR: Network Simulator (en)]] | *[[SIMULATOR: Network Simulator (en)]] | ||
− | *[[SIMULATOR: VirtualBox | + | *[[SIMULATOR: VirtualBox Installation (en)]] |
− | *[[SIMULATOR: OpenWRT | + | *[[SIMULATOR: OpenWRT Router Creation (en)]] |
− | *[[SIMULATOR: OpenWRT X86 | + | *[[SIMULATOR: OpenWRT X86 for VirtualBox (en)]] |
− | *[[SIMULATOR: GNS3: Simulator | + | *[[SIMULATOR: GNS3: Network Simulator (en)]] |
− | *[[SIMULATOR: CISCO: Packet Tracer(en)]] | + | *[[SIMULATOR: CISCO: Packet Tracer (en)]] |
− | *[[SIMULATOR: GNS3: | + | *[[SIMULATOR: GNS3: Connecting LAN / Switch to Internet Cloud (en)]] |
− | *[[SIMULATOR: GNS3: | + | *[[SIMULATOR: GNS3: Connecting LAN / Switch to NAT (en)]] |
− | *[[SIMULATOR: Mikrotik: Router | + | *[[SIMULATOR: Mikrotik: Simple Router (en)]] |
− | *[[SIMULATOR: GNS3: | + | *[[SIMULATOR: GNS3: Simple Network with OpenWRT (en)]] |
+ | |||
Line 89: | Line 90: | ||
*[[Routing: OSPF6D Quagga di OpenWRT]] | *[[Routing: OSPF6D Quagga di OpenWRT]] | ||
*[[Routing: OSPF6 Quagga IPv6]] | *[[Routing: OSPF6 Quagga IPv6]] | ||
− | |||
*[[Routing (en)]] | *[[Routing (en)]] | ||
− | *[[Routing: | + | *[[Routing: Static (en)]] |
− | *[[Routing: | + | *[[Routing: Dynamic (en)]] |
− | *[[Routing: Network Address Translation(en)]] | + | *[[Routing: Network Address Translation (en)]] |
*[[Routing: Advanced (en)]] | *[[Routing: Advanced (en)]] | ||
*[[Routing: Quagga (en)]] | *[[Routing: Quagga (en)]] | ||
− | *[[Routing: OSPF6D Quagga | + | *[[Routing: OSPF6D Quagga in OpenWRT (en)]] |
− | *[[Routing: OSPF6 Quagga IPv6(en)]] | + | *[[Routing: OSPF6 Quagga IPv6 (en)]] |
Line 127: | Line 127: | ||
− | + | *[[Routing: Mikrotik: Simple OSPF (en)]] | |
− | *[[Routing: Mikrotik: OSPF | + | *[[Routing: Mikrotik: OSPF Multi-area Network (en)]] |
− | *[[Routing: Mikrotik: OSPF | + | *[[Routing: Mikrotik: Simple BGP without Filters (en)]] |
− | *[[Routing: Mikrotik: BGP | + | *[[Routing: Mikrotik: BGP 2 Links to 3 BGP Redistribute 2 OSPF (en)]] |
− | *[[Routing: Mikrotik: BGP 2 | + | *[[Routing: Cisco: Simple OSPF (en)]] |
− | *[[Routing: Cisco: OSPF | + | *[[Routing: Cisco: OSPF Multi-area Network (en)]] |
− | *[[Routing: Cisco: OSPF | + | *[[Routing: Cisco: Simple BGP without Filters (en)]] |
− | *[[Routing: Cisco: BGP | + | *[[Routing: Cisco: BGP 2 Links to 3 BGP Redistribute 2 OSPF (en)]] |
− | *[[Routing: Cisco: BGP 2 | + | *[[Routing: Quagga: Simple OSPF (en)]] |
− | *[[Routing: Quagga: OSPF | + | *[[Routing: Quagga: OSPF Multi-area Network (en)]] |
− | *[[Routing: Quagga: OSPF Multi-area | + | *[[Routing: IPv6: Mikrotik: Simple OSPF (en)]] |
− | *[[Routing: IPv6: Mikrotik: OSPF | + | *[[Routing: IPv6: Mikrotik: OSPF Multi-area Network (en)]] |
− | *[[Routing: IPv6: Mikrotik: OSPF | + | *[[Routing: IPv6: Mikrotik: Simple BGP without Filters (en)]] |
− | *[[Routing: IPv6: Mikrotik: BGP | + | *[[Routing: IPv6: Cisco: Simple OSPF (en)]] |
− | *[[Routing: IPv6: Cisco: OSPF | + | *[[Routing: IPv6: Cisco: OSPF Multi-area Network (en)]] |
− | *[[Routing: IPv6: Cisco: OSPF | + | *[[Routing: IPv6: Cisco: Simple BGP without Filters (en)]] |
− | *[[Routing: IPv6: Cisco: BGP | + | *[[Routing: IPv6: Quagga: Simple BGP without Filters (en)]] |
− | *[[Routing: IPv6: Quagga: BGP | ||
==VoIP and OpenBTS== | ==VoIP and OpenBTS== | ||
Line 178: | Line 177: | ||
*[[Benchmarking: Tuning Kernel untuk Network Performance]] | *[[Benchmarking: Tuning Kernel untuk Network Performance]] | ||
*[[Benchmarking: dnsperf: mengukur kinerja DNS Server]] | *[[Benchmarking: dnsperf: mengukur kinerja DNS Server]] | ||
− | |||
*[[Benchmarking: Network Management System (en)]] | *[[Benchmarking: Network Management System (en)]] | ||
*[[Benchmarking: Network (en)]] | *[[Benchmarking: Network (en)]] | ||
− | *[[Benchmarking: Data Center Tier Standard(en)]] | + | *[[Benchmarking: Data Center Tier Standard (en)]] |
− | *[[Benchmarking: iperf: | + | *[[Benchmarking: iperf: Measuring Connection Capacity (en)]] |
− | *[[Benchmarking: Tuning Kernel | + | *[[Benchmarking: Tuning Kernel for Network Performance (en)]] |
− | *[[Benchmarking: dnsperf: | + | *[[Benchmarking: dnsperf: Measuring DNS Server Performance (en)]] |
+ | |||
Line 209: | Line 208: | ||
*[[IoT: Network Programming (en)]] | *[[IoT: Network Programming (en)]] | ||
− | *[[IoT: Socket Programming | + | *[[IoT: Socket Programming Using Python (en)]] |
− | *[[IoT: | + | *[[IoT: Creating Android Apps with AppInventor (en)]] |
*[[IoT: Internet of Things (en)]] | *[[IoT: Internet of Things (en)]] | ||
*[[IoT: Arduino (en)]] | *[[IoT: Arduino (en)]] | ||
Line 232: | Line 231: | ||
* [[HACKER: Hacker (en)]] | * [[HACKER: Hacker (en)]] | ||
− | * [[HACKER: | + | * [[HACKER: The Internet Underworld (en)]] |
− | * [[HACKER: | + | * [[HACKER: Hacker Ethics (en)]] |
− | * [[HACKER: | + | * [[HACKER: Hacker Rules of Engagement (en)]] |
− | * [[HACKER: | + | * [[HACKER: How the Hacking Process is Conducted (en)]] |
− | * [[HACKER: | + | * [[HACKER: Understanding Hacker Community Characteristics (en)]] |
− | * [[HACKER: | + | * [[HACKER: Various Hacking Tips (en)]] |
* [[HACKER: Ethical Hacking (en)]] | * [[HACKER: Ethical Hacking (en)]] | ||
+ | |||
+ | |||
Line 257: | Line 258: | ||
− | * [[HACKER: | + | * [[HACKER: Set Up Kali Linux (en)]] |
− | * [[HACKER: | + | * [[HACKER: Telnet Server (en)]] |
* [[HACKER: Squirrelmail (en)]] | * [[HACKER: Squirrelmail (en)]] | ||
* [[HACKER: SAMBA (en)]] | * [[HACKER: SAMBA (en)]] | ||
− | * [[HACKER: SAMBA: | + | * [[HACKER: SAMBA: Adding User (en)]] |
* [[HACKER: DVWA (en)]] | * [[HACKER: DVWA (en)]] | ||
− | * [[HACKER: DVWA: | + | * [[HACKER: DVWA: Installation (en)]] |
− | * [[HACKER: MySQL: | + | * [[HACKER: MySQL: Making Vulnerable (en)]] |
− | * [[HACKER: MySQL: | + | * [[HACKER: MySQL: Opening Access Block (en)]] |
+ | |||
+ | |||
Line 283: | Line 286: | ||
− | * [[FOOT PRINTING: | + | * [[FOOT PRINTING: Planning Network Target Penetration Testing (en)]] |
− | * [[FOOT PRINTING: Workflow | + | * [[FOOT PRINTING: Hacker Attack Reconnaissance Workflow (en)]] |
* [[FOOT PRINTING: nmap (en)]] | * [[FOOT PRINTING: nmap (en)]] | ||
− | * [[FOOT PRINTING: | + | * [[FOOT PRINTING: Unicornscan: Scanning Attack Targets (en)]] |
* [[FOOT PRINTING: whois (en)]] | * [[FOOT PRINTING: whois (en)]] | ||
− | * [[FOOT PRINTING: | + | * [[FOOT PRINTING: Grabber: Scanning Vulnerabilities (en)]] |
− | * [[FOOT PRINTING: | + | * [[FOOT PRINTING: Evaluating Indonesian e-Banking Sites (en)]] |
+ | |||
Line 305: | Line 309: | ||
* [[SNIFFING: Wireshark (en)]] | * [[SNIFFING: Wireshark (en)]] | ||
* [[SNIFFING: tcpdump (en)]] | * [[SNIFFING: tcpdump (en)]] | ||
− | * [[SNIFFING: MITM: | + | * [[SNIFFING: MITM: Concept (en)]] |
* [[SNIFFING: MITM: ARPSpoof (en)]] | * [[SNIFFING: MITM: ARPSpoof (en)]] | ||
* [[SNIFFING: MITM: Proxy (en)]] | * [[SNIFFING: MITM: Proxy (en)]] | ||
Line 328: | Line 332: | ||
− | + | * [[WIRELESS: Wajanbolic e-goen (en)]] | |
− | * [[WIRELESS: | + | * [[WIRELESS: WiFi-based Wireless Internet (en)]] |
− | * [[WIRELESS: Wireless Internet | + | * [[WIRELESS: WiFi Network Design (en)]] |
− | * [[WIRELESS: | + | * [[WIRELESS: Wireless Network Design Using Radio Mobile Wireless (en)]] |
− | * [[WIRELESS: | + | * [[WIRELESS: MESH using OLSR (en)]] |
− | * [[WIRELESS: MESH | ||
* [[WIRELESS: Wireless Hacking (en)]] | * [[WIRELESS: Wireless Hacking (en)]] | ||
* [[WIRELESS: Scanning HotSpot (en)]] | * [[WIRELESS: Scanning HotSpot (en)]] | ||
− | * [[WIRELESS: | + | * [[WIRELESS: Techniques for Cracking WEP (en)]] |
− | * [[WIRELESS: | + | * [[WIRELESS: Techniques for Cracking WPA (en)]] |
− | * [[WIRELESS: Reaver: | + | * [[WIRELESS: Reaver: Wireless Security Penetration (en)]] |
− | * [[WIRELESS: Reaver: 5 | + | * [[WIRELESS: Reaver: 5 Steps to Crack WPA (en)]] |
− | * [[WIRELESS: Reaver: | + | * [[WIRELESS: Reaver: Tips and Tricks (en)]] |
+ | |||
Line 356: | Line 360: | ||
− | * [[PASSWORD: Password Attack | + | * [[PASSWORD: Password Attack using Kali Linux (en)]] |
− | * [[PASSWORD: Password Attack | + | * [[PASSWORD: hydra: Password Attack (en)]] |
− | * [[PASSWORD: | + | * [[PASSWORD: JohnTheRipper: Cracking Windows Passwords (en)]] |
− | * [[PASSWORD: Hack | + | * [[PASSWORD: Hack Online Passwords with Kali Linux (en)]] |
− | * [[PASSWORD: Hack | + | * [[PASSWORD: Hack Offline Passwords with Kali Linux (en)]] |
− | * [[PASSWORD: ophcrack | + | * [[PASSWORD: ophcrack: Cracking Windows Passwords (en)]] |
Line 377: | Line 381: | ||
− | * [[SQL: nmap: | + | * [[SQL: nmap: SQL Attack (en)]] |
− | * [[SQL: nmap: | + | * [[SQL: nmap: Check SQL Injection (en)]] |
− | * [[SQL: nmap: | + | * [[SQL: nmap: Hack MySQL Password (en)]] |
* [[SQL: SQLMap (en)]] | * [[SQL: SQLMap (en)]] | ||
− | * [[SQL: SQLMap - | + | * [[SQL: SQLMap - SQL Injection to DVWA (en)]] |
− | * [[SQL: SQLMap - | + | * [[SQL: SQLMap - Example of Remote Database Hack (en)]] |
==DOMAIN NAME SYSTEM and DEFACE WEB== | ==DOMAIN NAME SYSTEM and DEFACE WEB== | ||
Line 406: | Line 410: | ||
* [[DNS: ICANN (en)]] | * [[DNS: ICANN (en)]] | ||
* [[DNS: PowerDNS (en)]] | * [[DNS: PowerDNS (en)]] | ||
− | * [[DNS: | + | * [[DNS: Webmin: DNS Configuration (en)]] |
* [[HACKING: deface (en)]] | * [[HACKING: deface (en)]] | ||
* [[HACKING: Web Deface (en)]] | * [[HACKING: Web Deface (en)]] | ||
− | * [[HACKING: 13 | + | * [[HACKING: 13 Steps to Web Deface (en)]] |
− | * [[HACKING: Defacing Rooting | + | * [[HACKING: Defacing Rooting for Beginners (en)]] |
==ATTACK FILE SHARING== | ==ATTACK FILE SHARING== | ||
Line 421: | Line 425: | ||
− | * [[SHARING: | + | * [[SHARING: SMB Share Enumeration (en)]] |
* [[SHARING: Brute Force Hack SMB Password (en)]] | * [[SHARING: Brute Force Hack SMB Password (en)]] | ||
− | * [[SHARING: | + | * [[SHARING: Cracking SAMBA File Sharing (en)]] |
− | * [[SHARING: | + | * [[SHARING: Cracking File Sharing Passwords in Windows 7 (en)]] |
− | * [[SHARING: SAMBA | + | * [[SHARING: SAMBA Creating Users (en)]] |
==OVERVIEW CYBER SECURITY== | ==OVERVIEW CYBER SECURITY== | ||
Line 433: | Line 437: | ||
* [[SECURITY: Cyber Defence]] | * [[SECURITY: Cyber Defence]] | ||
* [[SECURITY: 20 Linux Server Hardening Security Tips]] | * [[SECURITY: 20 Linux Server Hardening Security Tips]] | ||
− | |||
* [[SECURITY: Basic OS Security ]] | * [[SECURITY: Basic OS Security ]] | ||
+ | * [[SECURITY: Network Security (en)]] | ||
* [[SECURITY: Cyber Security Technology Map (en)]] | * [[SECURITY: Cyber Security Technology Map (en)]] | ||
* [[SECURITY: Cyber Defence (en)]] | * [[SECURITY: Cyber Defence (en)]] | ||
* [[SECURITY: 20 Linux Server Hardening Security Tips (en)]] | * [[SECURITY: 20 Linux Server Hardening Security Tips (en)]] | ||
− | |||
* [[SECURITY: Basic OS Security (en)]] | * [[SECURITY: Basic OS Security (en)]] | ||
+ | * [https://tldp.org/HOWTO/html_single/Security-HOWTO/ SECURITY: Linux Security Howto (en)] | ||
* [https://www.bssn.go.id/monitoring-keamanan-siber/ SECURITY: BSSN: Security Report] | * [https://www.bssn.go.id/monitoring-keamanan-siber/ SECURITY: BSSN: Security Report] | ||
* [http://www.owasp.org/index.php/Category:Principle SECURITY: Apps Security Principle] | * [http://www.owasp.org/index.php/Category:Principle SECURITY: Apps Security Principle] | ||
Line 462: | Line 466: | ||
* [[VULNERABILITY: Network Target Penetration Testing Planning (en)]] | * [[VULNERABILITY: Network Target Penetration Testing Planning (en)]] | ||
− | * [[VULNERABILITY: | + | * [[VULNERABILITY: Web Directory Traversal Vulnerability (en)]] |
* [[VULNERABILITY: nikto: Search Web Vulnerability (en)]] | * [[VULNERABILITY: nikto: Search Web Vulnerability (en)]] | ||
* [[VULNERABILITY: nikto: Check DVWA (en)]] | * [[VULNERABILITY: nikto: Check DVWA (en)]] | ||
* [[VULNERABILITY: Grabber: Scan Vulnerability (en)]] | * [[VULNERABILITY: Grabber: Scan Vulnerability (en)]] | ||
* [[VULNERABILITY: w3af (en)]] | * [[VULNERABILITY: w3af (en)]] | ||
− | * [[VULNERABILITY: OpenVAS Installation (en)]] | + | * [[VULNERABILITY: OpenVAS: Installation (en)]] |
* [[VULNERABILITY: Legion (en)]] | * [[VULNERABILITY: Legion (en)]] | ||
Line 476: | Line 480: | ||
* [[SERVER: 20 Linux Server Hardening Security Tips]] | * [[SERVER: 20 Linux Server Hardening Security Tips]] | ||
− | |||
* [[SERVER: Postfix]] | * [[SERVER: Postfix]] | ||
* [[SERVER: Squirrelmail]] | * [[SERVER: Squirrelmail]] | ||
Line 487: | Line 490: | ||
* [[SERVER: 20 Linux Server Hardening Security Tips (en)]] | * [[SERVER: 20 Linux Server Hardening Security Tips (en)]] | ||
− | |||
* [[SERVER: Postfix (en)]] | * [[SERVER: Postfix (en)]] | ||
* [[SERVER: Squirrelmail (en)]] | * [[SERVER: Squirrelmail (en)]] | ||
Line 494: | Line 496: | ||
* [[SERVER: IMAP (en)]] | * [[SERVER: IMAP (en)]] | ||
* [[SERVER: SMTP (en)]] | * [[SERVER: SMTP (en)]] | ||
− | * [[SERVER: MailScanner Installation (en)]] | + | * [[SERVER: MailScanner: Installation (en)]] |
+ | |||
+ | |||
+ | * [http://tldp.org/HOWTO/html_single/Security-HOWTO/ SERVER: Linux Security Howto (en)] | ||
==FIREWALL== | ==FIREWALL== | ||
Line 656: | Line 661: | ||
* [[GnuPG: GNU Privacy Guard (en)]] | * [[GnuPG: GNU Privacy Guard (en)]] | ||
* [[GnuPG: Howto (en)]] | * [[GnuPG: Howto (en)]] | ||
− | * [[GnuPG: | + | * [[GnuPG: Mini Howto (en)]] |
* [[GnuPG: Privacy Handbook (en)]] | * [[GnuPG: Privacy Handbook (en)]] | ||
* [[OpenSSL (en)]] | * [[OpenSSL (en)]] | ||
− | * [[OpenSSL: | + | * [[OpenSSL: Evaluating e-Banking Sites (en)]] |
* [[OpenSSL: Simple Tutorial (en)]] | * [[OpenSSL: Simple Tutorial (en)]] | ||
− | * [[OpenSSL: | + | * [[OpenSSL: Encrypt Decrypt File (en)]] |
− | * [[OpenSSL: | + | * [[OpenSSL: Setting SSL for HTTPS in Ubuntu (en)]] |
− | * [[OpenSSL: | + | * [[OpenSSL: Creating RootCA (en)]] |
Latest revision as of 06:28, 7 January 2025
TCP/IP CONCEPT
- TCP/IP: Konsep Dasar
- TCP/IP: Sejarah Internet Indonesia
- TCP/IP: Penggunaan Wireshark
- TCP/IP: Penggunaan tcpdump
- TCP/IP: Basic Concept (en)
- TCP/IP: Indonesia Internet History(en)
- TCP/IP: Wireshark howto(en)
- TCP/IP: tcpdump howto (en)
NETWORK SIMULATOR
- SIMULATOR: Simulasi Jaringan
- SIMULATOR: VirtualBox Instalasi
- SIMULATOR: OpenWRT membuat router
- SIMULATOR: OpenWRT X86 untuk VirtualBox
- SIMULATOR: GNS3: Simulator Jaringan
- SIMULATOR: CISCO: Packet Tracer
- SIMULATOR: GNS3: Menyambungkan LAN / Switch ke Cloud Internet
- SIMULATOR: GNS3: Menyambungkan LAN / Switch ke NAT
- SIMULATOR: Mikrotik: Router Sederhana
- SIMULATOR: GNS3: Jaringan Sederhana dengan OpenWRT
- SIMULATOR: Network Simulator (en)
- SIMULATOR: VirtualBox Installation (en)
- SIMULATOR: OpenWRT Router Creation (en)
- SIMULATOR: OpenWRT X86 for VirtualBox (en)
- SIMULATOR: GNS3: Network Simulator (en)
- SIMULATOR: CISCO: Packet Tracer (en)
- SIMULATOR: GNS3: Connecting LAN / Switch to Internet Cloud (en)
- SIMULATOR: GNS3: Connecting LAN / Switch to NAT (en)
- SIMULATOR: Mikrotik: Simple Router (en)
- SIMULATOR: GNS3: Simple Network with OpenWRT (en)
IPv6
- IPv6: Kuliah Lengkap
- IPv6: Buku (1)
- IPv6: Buku (2)
- YOUTUBE: Lebih Dalam dengan IPv6
- YOUTUBE: Cek Kesiapan Sistem untuk IPv6
- YOUTUBE: Konfigurasi Interface IPv6
- YOUTUBE: Route Jaringan IPv6
- YOUTUBE: Mengkonfigurasi IPv6 Presisten dan Automatis
- YOUTUBE: Keamanan IPv6
- YOUTUBE: IPv6 Mobility
- YOUTUBE: IPv6 Web Server
- YOUTUBE: Domain Name System IPv6
ROUTING
- Routing
- Routing: Statik
- Routing: Dinamis
- Routing: Network Address Translation
- Routing: Advanced
- Routing: Quagga
- Routing: OSPF6D Quagga di OpenWRT
- Routing: OSPF6 Quagga IPv6
- Routing (en)
- Routing: Static (en)
- Routing: Dynamic (en)
- Routing: Network Address Translation (en)
- Routing: Advanced (en)
- Routing: Quagga (en)
- Routing: OSPF6D Quagga in OpenWRT (en)
- Routing: OSPF6 Quagga IPv6 (en)
- YOUTUBE: Mikrotik Routing Statik dengan 2 Router
- YOUTUBE: Mikrotik Routing OSPF Sederhana
- YOUTUBE: Mikrotik Routing BGP
ADVANCED ROUTING
- Routing: Mikrotik: OSPF Sederhana
- Routing: Mikrotik: OSPF multi-area network
- Routing: Mikrotik: BGP Sederhana tanpa filter
- Routing: Mikrotik: BGP 2 link ke 3 BGP redistribute 2 OSPF
- Routing: Cisco: OSPF Sederhana
- Routing: Cisco: OSPF multi-area network
- Routing: Cisco: BGP Sederhana tanpa filter
- Routing: Cisco: BGP 2 link ke 3 BGP redistribute 2 OSPF
- Routing: Quagga: OSPF Sederhana
- Routing: Quagga: OSPF Multi-area network
- Routing: IPv6: Mikrotik: OSPF Sederhana
- Routing: IPv6: Mikrotik: OSPF multi-area network
- Routing: IPv6: Mikrotik: BGP Sederhana tanpa filter
- Routing: IPv6: Cisco: OSPF Sederhana
- Routing: IPv6: Cisco: OSPF multi-area network
- Routing: IPv6: Cisco: BGP Sederhana tanpa filter
- Routing: IPv6: Quagga: BGP Sederhana tanpa filter
- Routing: Mikrotik: Simple OSPF (en)
- Routing: Mikrotik: OSPF Multi-area Network (en)
- Routing: Mikrotik: Simple BGP without Filters (en)
- Routing: Mikrotik: BGP 2 Links to 3 BGP Redistribute 2 OSPF (en)
- Routing: Cisco: Simple OSPF (en)
- Routing: Cisco: OSPF Multi-area Network (en)
- Routing: Cisco: Simple BGP without Filters (en)
- Routing: Cisco: BGP 2 Links to 3 BGP Redistribute 2 OSPF (en)
- Routing: Quagga: Simple OSPF (en)
- Routing: Quagga: OSPF Multi-area Network (en)
- Routing: IPv6: Mikrotik: Simple OSPF (en)
- Routing: IPv6: Mikrotik: OSPF Multi-area Network (en)
- Routing: IPv6: Mikrotik: Simple BGP without Filters (en)
- Routing: IPv6: Cisco: Simple OSPF (en)
- Routing: IPv6: Cisco: OSPF Multi-area Network (en)
- Routing: IPv6: Cisco: Simple BGP without Filters (en)
- Routing: IPv6: Quagga: Simple BGP without Filters (en)
VoIP and OpenBTS
- VoIP
- VoIP: Softswitch
- VoIP: Asterisk Softswitch
- VoIP: Kamailio Softswitch
- VoIP: ENUM
- VoIP: OpenBTS
- VoIP: 5G
- VoIP(en)
- VoIP: Softswitch(en)
- VoIP: Asterisk Softswitch(en)
- VoIP: Kamailio Softswitch(en)
- VoIP: ENUM(en)
- VoIP: OpenBTS(en)
- VoIP: 5G(en)
NETWORK BENCHMARKING
- Benchmarking: Network Management System
- Benchmarking: Network
- Benchmarking: Data Center Tier Standard
- Benchmarking: iperf: mengukur kapasitas sambungan
- Benchmarking: Tuning Kernel untuk Network Performance
- Benchmarking: dnsperf: mengukur kinerja DNS Server
- Benchmarking: Network Management System (en)
- Benchmarking: Network (en)
- Benchmarking: Data Center Tier Standard (en)
- Benchmarking: iperf: Measuring Connection Capacity (en)
- Benchmarking: Tuning Kernel for Network Performance (en)
- Benchmarking: dnsperf: Measuring DNS Server Performance (en)
- YOUTUBE: Mengukur / benchmarking file sharing server dg dbench
- YOUTUBE: Benchmarking linux network
- YOUTUBE: Mengukur pps server router dengan hping3
- YOUTUBE: Overview Network Management
- YOUTUBE: UBUNTU 20.04 instalasi SNMP
NETWORK PROGRAMMING
Materi lebih lengkap untuk Network Programming, ada di kuliah (FREE) Internet of Things (IoT).
- IoT: Network Programming
- IoT: Socket Programming Menggunakan Python
- IoT: Membuat Apps Android dengan AppInventor
- IoT: Internet of Things
- IoT: Arduino
- IoT: WeMOS
- IoT: Network Programming (en)
- IoT: Socket Programming Using Python (en)
- IoT: Creating Android Apps with AppInventor (en)
- IoT: Internet of Things (en)
- IoT: Arduino (en)
- IoT: WeMOS (en)
INTRO HACKING
- HACKER: Hacker
- HACKER: Dunia Bawah Tanah di Internet
- HACKER: Etika Hacker
- HACKER: Aturan Main Hacker
- HACKER: Bagaimana Proses Hacking Dilakukan
- HACKER: Memahami Karakteristisk Komunitas Hacker
- HACKER: Beberapa Tip Hacking
- HACKER: Ethical Hacking
- HACKER: Hacker (en)
- HACKER: The Internet Underworld (en)
- HACKER: Hacker Ethics (en)
- HACKER: Hacker Rules of Engagement (en)
- HACKER: How the Hacking Process is Conducted (en)
- HACKER: Understanding Hacker Community Characteristics (en)
- HACKER: Various Hacking Tips (en)
- HACKER: Ethical Hacking (en)
HACKING PREPARATION
- HACKER: Siapkan Kali Linux
- HACKER: telnet server
- HACKER: Squirrelmail
- HACKER: SAMBA
- HACKER: SAMBA: menambahkan user
- HACKER: DVWA
- HACKER: DVWA: Instalasi
- HACKER: MySQL: membuat vulnerable
- HACKER: MySQL: membuka blok akses
- HACKER: Set Up Kali Linux (en)
- HACKER: Telnet Server (en)
- HACKER: Squirrelmail (en)
- HACKER: SAMBA (en)
- HACKER: SAMBA: Adding User (en)
- HACKER: DVWA (en)
- HACKER: DVWA: Installation (en)
- HACKER: MySQL: Making Vulnerable (en)
- HACKER: MySQL: Opening Access Block (en)
FOOT PRINTING (INTELLIGENCE)
- FOOT PRINTING: Perencanaan Pengujian Penetrasi Sasaran Jaringan
- FOOT PRINTING: Workflow Pengintaian Serangan dari Hacker
- FOOT PRINTING: nmap
- FOOT PRINTING: Teknik Scan Sasaran Serangan menggunakan Unicornscan
- FOOT PRINTING: whois
- FOOT PRINTING: Scan Vulnerability menggunakan Grabber
- FOOT PRINTING: Evaluasi Situs e-Banking Indonesia
- FOOT PRINTING: Planning Network Target Penetration Testing (en)
- FOOT PRINTING: Hacker Attack Reconnaissance Workflow (en)
- FOOT PRINTING: nmap (en)
- FOOT PRINTING: Unicornscan: Scanning Attack Targets (en)
- FOOT PRINTING: whois (en)
- FOOT PRINTING: Grabber: Scanning Vulnerabilities (en)
- FOOT PRINTING: Evaluating Indonesian e-Banking Sites (en)
SNIFFING
- SNIFFING: Wireshark
- SNIFFING: tcpdump
- SNIFFING: MITM: Konsep
- SNIFFING: MITM: ARPSpoof
- SNIFFING: MITM: Proxy
- SNIFFING: Wireshark (en)
- SNIFFING: tcpdump (en)
- SNIFFING: MITM: Concept (en)
- SNIFFING: MITM: ARPSpoof (en)
- SNIFFING: MITM: Proxy (en)
HACKING WIRELESS
- WIRELESS: Wajanbolid e-goen
- WIRELESS: Wireless Internet berbasis WiFi
- WIRELESS: Disain Jaringan WiFi
- WIRELESS: Disain Jaringan Wireless Menggunakan Radio Mobile Wireless
- WIRELESS: MESH menggunakan OLSR
- WIRELESS: Wireless Hacking
- WIRELESS: Scanning HotSpot
- WIRELESS: Teknik Menjebol WEP
- WIRELESS: Teknik Menjebol WPA
- WIRELESS: Reaver: Penetrasi Keamanan Wireless
- WIRELESS: Reaver: 5 Langkah Menjebol WPA
- WIRELESS: Reaver: Tip dan Trick
- WIRELESS: Wajanbolic e-goen (en)
- WIRELESS: WiFi-based Wireless Internet (en)
- WIRELESS: WiFi Network Design (en)
- WIRELESS: Wireless Network Design Using Radio Mobile Wireless (en)
- WIRELESS: MESH using OLSR (en)
- WIRELESS: Wireless Hacking (en)
- WIRELESS: Scanning HotSpot (en)
- WIRELESS: Techniques for Cracking WEP (en)
- WIRELESS: Techniques for Cracking WPA (en)
- WIRELESS: Reaver: Wireless Security Penetration (en)
- WIRELESS: Reaver: 5 Steps to Crack WPA (en)
- WIRELESS: Reaver: Tips and Tricks (en)
ATTACK PASSWORD
- PASSWORD: Password Attack menggunakan Kali Linux
- PASSWORD: Password Attack Menggunakan Hydra
- PASSWORD: Teknik Menjebol Password Windows dengan JohnTheRipper
- PASSWORD: Hack Password Online dengan Kali Linux
- PASSWORD: Hack Password Offline dengan Kali Linux
- PASSWORD: ophcrack - untuk menjebol password windows
- PASSWORD: Password Attack using Kali Linux (en)
- PASSWORD: hydra: Password Attack (en)
- PASSWORD: JohnTheRipper: Cracking Windows Passwords (en)
- PASSWORD: Hack Online Passwords with Kali Linux (en)
- PASSWORD: Hack Offline Passwords with Kali Linux (en)
- PASSWORD: ophcrack: Cracking Windows Passwords (en)
ATTACK DATABASE SQL
- SQL: nmap: serang SQL
- SQL: nmap: cek SQL Injection
- SQL: nmap: hack password mysql
- SQL: SQLMap
- SQL: SQLMap: SQLInjection ke DVWA
- SQL: SQLMap: contoh remote hack database
- SQL: nmap: SQL Attack (en)
- SQL: nmap: Check SQL Injection (en)
- SQL: nmap: Hack MySQL Password (en)
- SQL: SQLMap (en)
- SQL: SQLMap - SQL Injection to DVWA (en)
- SQL: SQLMap - Example of Remote Database Hack (en)
DOMAIN NAME SYSTEM and DEFACE WEB
- APNIC
- Internet Society
- Internet Engineerig Task Force (IETF)
- Internet Assigned Numbers Authority (IANA)
- DNS: Domain Name System
- DNS: ICANN
- DNS: PowerDNS
- DNS: Konfigurasi DNS Menggunakan Webmin
- HACKING: deface
- HACKING: Web Deface
- HACKING: 13 Langkah Deface Web
- HACKING: Defacing Rooting untuk Pemula
- DNS: Domain Name System (en)
- DNS: ICANN (en)
- DNS: PowerDNS (en)
- DNS: Webmin: DNS Configuration (en)
- HACKING: deface (en)
- HACKING: Web Deface (en)
- HACKING: 13 Steps to Web Deface (en)
- HACKING: Defacing Rooting for Beginners (en)
ATTACK FILE SHARING
- SHARING: Enumerasi SMB Share
- SHARING: Brute Force Hack SMB Password
- SHARING: Membobol File Sharing SAMBA
- SHARING: Membobol Password File Sharing di Windows 7
- SHARING: SAMBA membuat user untuk samba
- SHARING: SMB Share Enumeration (en)
- SHARING: Brute Force Hack SMB Password (en)
- SHARING: Cracking SAMBA File Sharing (en)
- SHARING: Cracking File Sharing Passwords in Windows 7 (en)
- SHARING: SAMBA Creating Users (en)
OVERVIEW CYBER SECURITY
- SECURITY: Keamanan Jaringan
- SECURITY: Cyber Security Technology Map
- SECURITY: Cyber Defence
- SECURITY: 20 Linux Server Hardening Security Tips
- SECURITY: Basic OS Security
- SECURITY: Network Security (en)
- SECURITY: Cyber Security Technology Map (en)
- SECURITY: Cyber Defence (en)
- SECURITY: 20 Linux Server Hardening Security Tips (en)
- SECURITY: Basic OS Security (en)
- SECURITY: Linux Security Howto (en)
- SECURITY: BSSN: Security Report
- SECURITY: Apps Security Principle
- SECURITY: PHP Security Best Practice
- YOUTUBE: Cyber Security
VULNERABILITY ANALYSIS
- VULNERABILITY: Network Target Penetration Testing Planning
- VULNERABILITY: Web Directory Traversal Vulnerability
- VULNERABILITY: nikto: Search Web Vulnerability
- VULNERABILITY: nikto: Check DVWA
- VULNERABILITY: Grabber: Scan Vulnerability
- VULNERABILITY: w3af
- VULNERABILITY: OpenVAS Installation
- VULNERABILITY: Legion
- VULNERABILITY: Network Target Penetration Testing Planning (en)
- VULNERABILITY: Web Directory Traversal Vulnerability (en)
- VULNERABILITY: nikto: Search Web Vulnerability (en)
- VULNERABILITY: nikto: Check DVWA (en)
- VULNERABILITY: Grabber: Scan Vulnerability (en)
- VULNERABILITY: w3af (en)
- VULNERABILITY: OpenVAS: Installation (en)
- VULNERABILITY: Legion (en)
BASIC SERVER SECURITY
- SERVER: 20 Linux Server Hardening Security Tips
- SERVER: Postfix
- SERVER: Squirrelmail
- SERVER: List SMTP Servers various ISP
- SERVER: POP3
- SERVER: IMAP
- SERVER: SMTP
- SERVER: MailScanner Installation
- SERVER: 20 Linux Server Hardening Security Tips (en)
- SERVER: Postfix (en)
- SERVER: Squirrelmail (en)
- SERVER: List SMTP Servers various ISP (en)
- SERVER: POP3 (en)
- SERVER: IMAP (en)
- SERVER: SMTP (en)
- SERVER: MailScanner: Installation (en)
FIREWALL
- FIREWALL: Firewall
- FIREWALL: iptables
- FIREWALL: iptables: Mini howto
- FIREWALL: iptables: Create NAT
- FIREWALL: iptables: Create DMZ
- FIREWALL: iptables: Setup Default
- FIREWALL: Firewall (en)
- FIREWALL: iptables (en)
- FIREWALL: iptables: Mini howto (en)
- FIREWALL: iptables: Create NAT (en)
- FIREWALL: iptables: Create DMZ (en)
- FIREWALL: iptables: Setup Default (en)
SECURE SHELL & SECURE COPY
- ssh
- ssh: automatic login
- ssh: remote execute
- ssh: remote display X forwarding
- ssh: security
- ssh: reverse ssh
- scp
- scp: example
- rsync
- ssh (en)
- ssh: automatic login (en)
- ssh: remote execute (en)
- ssh: remote display X forwarding (en)
- ssh: security (en)
- ssh: reverse ssh (en)
- scp (en)
- scp: example (en)
- rsync (en)
VIRTUAL PRIVATE NETWORK (VPN)
- VPN: Virtual Private Network
- VPN: PPTP Installation
- VPN: OpenVPN Installation
- OpenVPN
- OpenVPN: Ubuntu 16.04 Installation
- OpenVPN: Ubuntu 18.04 Installation
- OpenVPN: IPv4 /32 single client
- OpenVPN: IPv4 /32 multi-client
- OpenVPN: IPv4 routed LAN
- OpenVPN: IPv4 routed 2 LAN
- OpenVPN: IPv6 /128 single client
- OpenVPN: IPv6 routed LAN
- OpenVPN: IPv6 routed 2 LAN
- VPN: Virtual Private Network (en)
- VPN: PPTP Installation (en)
- VPN: OpenVPN Installation (en)
- OpenVPN (en)
- OpenVPN: Ubuntu 16.04 Installation (en)
- OpenVPN: Ubuntu 18.04 Installation (en)
- OpenVPN: IPv4 /32 single client (en)
- OpenVPN: IPv4 /32 multi-client (en)
- OpenVPN: IPv4 routed LAN (en)
- OpenVPN: IPv4 routed 2 LAN (en)
- OpenVPN: IPv6 /128 single client (en)
- OpenVPN: IPv6 routed LAN (en)
- OpenVPN: IPv6 routed 2 LAN (en)
WEB APPLICATION FIREWALL
- WAF: Web Application Firewall
- WAF: ModSecurity
- WAF: ModSecurity: Installation
- WAF: ModSecurity: Installation and ModEvasive
- WAF: ModSecurity: Tools
- WAF: Web Application Firewall (en)
- WAF: ModSecurity (en)
- WAF: ModSecurity: Installation (en)
- WAF: ModSecurity: Installation and ModEvasive (en)
- WAF: ModSecurity: Tools (en)
HOST DEFENCE
- HIDS: Tripwire
- HIDS: dd - partition copy
- HIDS: netstat
- HIDS: lynis
- HIDS: rkhunter
- HIDS: OSSEC
- HIDS: chkrootkit
- HIDS: chown
- HIDS: chmod
- HIDS: find
- HIDS: Tripwire (en)
- HIDS: dd - partition copy (en)
- HIDS: netstat (en)
- HIDS: lynis (en)
- HIDS: rkhunter (en)
- HIDS: OSSEC (en)
- HIDS: chkrootkit (en)
- HIDS: chown (en)
- HIDS: chmod (en)
- HIDS: find (en)
INTRUSION DETECTION SYSTEM (IDS)
- IDS: Intrusion Detection System
- IDS: snort
- IDS: snort: Ubuntu 18.04 Installation
- IDS: snort: snort.log file howto read
- IDS: snort: write rules for beginner
- IDS: suricata
- IDS: suricata: Ubuntu 18.04 Installation
- IDS: suricata: Ubuntu 18.04 minimal configuration
- IDS: suricata: DDoS Attack test
- IDS: OSSEC HIDS
- IDS: OSSEC HIDS: Ubuntu 18.04 installation
- IDS: Intrusion Detection System (en)
- IDS: snort (en)
- IDS: snort: Ubuntu 18.04 Installation (en)
- IDS: snort: snort.log file howto read
- IDS: snort: write rules for beginner
- IDS: suricata (en)
- IDS: suricata: Ubuntu 18.04 Installation (en)
- IDS: suricata: Ubuntu 18.04 minimal configuration (en)
- IDS: suricata: DDoS Attack test
- IDS: OSSEC HIDS (en)
- IDS: OSSEC HIDS: Ubuntu 18.04 installation (en)
BASIC DATA SECURITY
- GnuPG: GNU Privacy Guard
- GnuPG: Howto
- GnuPG: mini howto
- GnuPG: Privacy Handbook
- OpenSSL
- OpenSSL: Mengevaluasi Situs e-Banking
- OpenSSL: Simple Tutorial
- OpenSSL: encrypt decrypt file
- OpenSSL: set SSL untuk https di Ubuntu
- OpenSSL: Membuat RootCA
- GnuPG: GNU Privacy Guard (en)
- GnuPG: Howto (en)
- GnuPG: Mini Howto (en)
- GnuPG: Privacy Handbook (en)
- OpenSSL (en)
- OpenSSL: Evaluating e-Banking Sites (en)
- OpenSSL: Simple Tutorial (en)
- OpenSSL: Encrypt Decrypt File (en)
- OpenSSL: Setting SSL for HTTPS in Ubuntu (en)
- OpenSSL: Creating RootCA (en)
- YOUTUBE: Konsep Public Key Infrastructure & Certificate Authority
- YOUTUBE: Konsep PKI & CA di UU ITE
- YOUTUBE: Public Key Infrastructure & Certificate Authority
- YOUTUBE: Experimen dengan GnuPG
- YOUTUBE: Penggunakan Enigmail di Thunderbird
FORENSIK
INFORMATION SECURITY MANAGEMENT SYSTEM
- Keamanan Informasi
- Keamanan Informasi: Framework
- Keamanan Informasi: Incident Management
- Keamanan Informasi: Manajemen Resiko IT
- Information Security (en)
- Information Security: Framework (en)
- Information Security: Incident Management (en)
- Information Security: IT Risk Management