Difference between revisions of "Ethical Hacking"

From OnnoWiki
Jump to navigation Jump to search
 
(9 intermediate revisions by the same user not shown)
Line 10: Line 10:
  
  
* [[Definisi Ethical Hacking (en) ]]
+
* [[Definition of Ethical Hacking (en) ]]
* [[Peran dan Tanggung Jawab Ethical Hacker (en) ]]
+
* [[Roles and Responsibilities of an Ethical Hacker (en) ]]
* [[Legalitas, Etika, dan Hukum terkait Hacking (en) ]]
+
* [[Legality, Ethics, and Law Related to Hacking. (en) ]]
* [[Perangkat Tool dan Lingkungan Kerja (VM, Kali Linux) (en) ]]
+
* [[Tools and Work Environment (VM, Kali Linux) (en) ]]
* [[Hands-on: Setup Lab dan Lingkungan Testing Aman (en) ]]
+
* [[Hands-on: Setting Up a Secure Lab and Testing Environment (en) ]]
  
 
==Metodologi Penetration Testing==
 
==Metodologi Penetration Testing==
Line 22: Line 22:
  
  
* [[Fase Penetration Testing (Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks) (en)]]
+
* [[Penetration Testing Phases (Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks) (en)]]
* [[Standar Penetration Testing (OWASP, NIST) (en)]]
+
* [[Penetration Testing Standards (OWASP, NIST) (en)]]
* [[Hands-on: Membuat Rencana Penetration Testing (en)]]
+
* [[Hands-on: Hands-on: Creating a Penetration Testing Plan (en)]]
  
 
==Reconnaissance (Information Gathering)==
 
==Reconnaissance (Information Gathering)==
Line 33: Line 33:
  
  
* [[Teknik Open Source Intelligence (OSINT) (en)]]
+
* [[Open Source Intelligence (OSINT) Techniques (en)]]
* [[Passive dan Active Reconnaissance (en)]]
+
* [[Passive and Active Reconnaissance (en)]]
 
* [[Tools: WHOIS, dig, Maltego, Google Dorking (en)]]
 
* [[Tools: WHOIS, dig, Maltego, Google Dorking (en)]]
* [[Hands-on: Pengumpulan Informasi Target secara Pasif (en)]]
+
* [[Hands-on: Passive Target Information Gathering (en)]]
  
 
==Scanning dan Enumeration==
 
==Scanning dan Enumeration==
Line 48: Line 48:
 
* [[Vulnerability Scanning: OpenVAS, Nessus (en)]]
 
* [[Vulnerability Scanning: OpenVAS, Nessus (en)]]
 
* [[Enumeration Services: SMB, SNMP, FTP, HTTP (en)]]
 
* [[Enumeration Services: SMB, SNMP, FTP, HTTP (en)]]
* [[Hands-on: Identifikasi Port, Services, dan Vulnerability Target (en)]]
+
* [[Hands-on: Target Port, Services, and Vulnerability Identification (en)]]
  
 
==Exploitation Basics==
 
==Exploitation Basics==
Line 114: Line 114:
 
* [[Attacks: WEP Cracking, WPA Handshake Capture (en)]]
 
* [[Attacks: WEP Cracking, WPA Handshake Capture (en)]]
 
* [[Tools: Aircrack-ng, Wireshark (en)]]
 
* [[Tools: Aircrack-ng, Wireshark (en)]]
* [[Hands-on: Menyerang Wireless Network dan Memecahkan Password WiFi (en)]]
+
* [[Hands-on: Attack Wireless Network and Cracking WiFi Password (en)]]
  
 
==Social Engineering==
 
==Social Engineering==
Line 134: Line 134:
 
* [[Hands-on: Menaikkan Privilege di Sistem Linux dan Windows]]
 
* [[Hands-on: Menaikkan Privilege di Sistem Linux dan Windows]]
  
* [[Konsep Privilege Escalation (en)]]
+
 
 +
* [[Privilege Escalation Concept (en)]]
 
* [[Local vs Remote Escalation (en)]]
 
* [[Local vs Remote Escalation (en)]]
 
* [[Exploiting Misconfigured Services (en)]]
 
* [[Exploiting Misconfigured Services (en)]]
* [[Hands-on: Menaikkan Privilege di Sistem Linux dan Windows (en)]]
+
* [[Hands-on: Gaining Root and Administrator Access in Linux and Windows (en)]]
 
 
  
 
==Post-Exploitation dan Maintaining Access==
 
==Post-Exploitation dan Maintaining Access==
Line 169: Line 169:
 
* [[Simulasi Penetration Testing Lengkap]]
 
* [[Simulasi Penetration Testing Lengkap]]
 
* [[Hands-on: CTF Challenge (Individu/Kelompok)]]
 
* [[Hands-on: CTF Challenge (Individu/Kelompok)]]
 +
  
 
* [[CTF Challenge Solutions for Review (en)]]
 
* [[CTF Challenge Solutions for Review (en)]]

Latest revision as of 07:24, 29 October 2024

Outline kuliah Ethical Hacking untuk 15 modul dengan fokus pada pengetahuan praktis dan skill hacking. Tiap pertemuan menggabungkan teori dan hands-on lab untuk mengembangkan keterampilan secara bertahap:

Pengantar Ethical Hacking


Metodologi Penetration Testing


Reconnaissance (Information Gathering)


Scanning dan Enumeration


Exploitation Basics


Web Application Hacking - Bagian 1


Web Application Hacking - Bagian 2


Password Cracking dan Authentication Bypass


Wireless Network Hacking


Social Engineering


Privilege Escalation


Post-Exploitation dan Maintaining Access


Mobile Hacking


Capture The Flag (CTF) Challenge dan Review


Report Penetration Test