Difference between revisions of "Cyber Security (en)"

From OnnoWiki
Jump to navigation Jump to search
Line 349: Line 349:
  
 
* [[Kali Linux: Password Attack menggunakan Kali Linux]]
 
* [[Kali Linux: Password Attack menggunakan Kali Linux]]
* [https://en.wikipedia.org/wiki/Password_cracking Menjebol Password (en)]
 
 
* [[Hydra]]
 
* [[Hydra]]
 
* [[Backtrack: Cracking Password Windows]]
 
* [[Backtrack: Cracking Password Windows]]
Line 358: Line 357:
  
 
* [[PASSWORD: Password Attack menggunakan Kali Linux]]
 
* [[PASSWORD: Password Attack menggunakan Kali Linux]]
* [[PASSWORD: Menjebol Password]]
 
 
* [[PASSWORD: Password Attack Menggunakan Hydra]]
 
* [[PASSWORD: Password Attack Menggunakan Hydra]]
 
* [[PASSWORD: Teknik Menjebol Password Windows dengan JohnTheRipper]]
 
* [[PASSWORD: Teknik Menjebol Password Windows dengan JohnTheRipper]]
Line 367: Line 365:
  
 
* [[PASSWORD: Password Attack menggunakan Kali Linux (en)]]
 
* [[PASSWORD: Password Attack menggunakan Kali Linux (en)]]
* [[PASSWORD: Menjebol Password (en)]]
 
 
* [[PASSWORD: Password Attack Menggunakan Hydra (en)]]
 
* [[PASSWORD: Password Attack Menggunakan Hydra (en)]]
 
* [[PASSWORD: Teknik Menjebol Password Windows dengan JohnTheRipper (en)]]
 
* [[PASSWORD: Teknik Menjebol Password Windows dengan JohnTheRipper (en)]]
Line 375: Line 372:
  
  
 +
* [https://en.wikipedia.org/wiki/Password_cracking Menjebol Password (en)]
 
* [http://onnocenter.or.id/wiki/index.php/Pentest#Wordlist PASSWORD: Wordlist]
 
* [http://onnocenter.or.id/wiki/index.php/Pentest#Wordlist PASSWORD: Wordlist]
 
  
 
==ATTACK DATABASE SQL==
 
==ATTACK DATABASE SQL==

Revision as of 07:10, 6 January 2025

TCP/IP CONCEPT



NETWORK SIMULATOR



IPv6





ROUTING



ADVANCED ROUTING


VoIP and OpenBTS



NETWORK BENCHMARKING



NETWORK PROGRAMMING

Materi lebih lengkap untuk Network Programming, ada di kuliah (FREE) Internet of Things (IoT).



INTRO HACKING



HACKING PREPARATION



FOOT PRINTING (INTELLIGENCE)



SNIFFING



HACKING WIRELESS



ATTACK PASSWORD




ATTACK DATABASE SQL



DOMAIN NAME SYSTEM and DEFACE WEB




ATTACK FILE SHARING



OVERVIEW CYBER SECURITY





VULNERABILITY ANALYSIS




BASIC SERVER SECURITY



FIREWALL



SECURE SHELL & SECURE COPY



VIRTUAL PRIVATE NETWORK (VPN)




WEB APPLICATION FIREWALL



HOST DEFENCE



INTRUSION DETECTION SYSTEM (IDS)




BASIC DATA SECURITY






FORENSIK


INFORMATION SECURITY MANAGEMENT SYSTEM




INTERNET SAFETY (End User)