New pages
Jump to navigation
Jump to search
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)
- 19:04, 27 October 2024 Report Penetration Test: Example of Vulnerability Findings (en) (hist | edit) [2,626 bytes] Onnowpurbo (talk | contribs) (Created page with "Below is an example write-up to explain the Vulnerability Findings section in a penetration testing report: =Vulnerability Findings= ==1. SQL Injection Vulnerability (CVE-20...")
- 18:57, 27 October 2024 CTF Challenge Solutions for Review (en) (hist | edit) [7,969 bytes] Onnowpurbo (talk | contribs) (Created page with "=Penyelesaian CTF Challenges for Ethical Hacking Course Review= Capture The Flag (CTF) is an exciting and effective competition for honing cybersecurity skills. CTF challenge...")
- 18:41, 27 October 2024 Hands-on: CTF Challenge (Individual/Group) (en) (hist | edit) [7,006 bytes] Onnowpurbo (talk | contribs) (Created page with "'''What is a CTF Challenge?''' CTF (Capture the Flag) is a cybersecurity competition or challenge where participants are required to find and exploit vulnerabilities in syste...")
- 18:30, 27 October 2024 Tools: Drozer, APKTool (en) (hist | edit) [7,405 bytes] Onnowpurbo (talk | contribs) (Created page with "==Drozer: A Versatile Tool for Android Security Testing== '''What is Drozer?''' '''Drozer''' is an open-source framework designed to conduct in-depth security testing on And...")
- 18:08, 27 October 2024 Hands-on: Android APK Analysis and Exploitation (en) (hist | edit) [4,571 bytes] Onnowpurbo (talk | contribs) (Created page with "To conduct analysis and exploitation of Android APKs in an '''ethical hacking''' course, we will utilize several tools in Kali Linux 2024.3, including '''APKTool''', '''Drozer...")
- 10:34, 27 October 2024 Inkscape: Install Ubuntu 24.04 (hist | edit) [81 bytes] Onnowpurbo (talk | contribs) (Created page with " sudo add-apt-repository ppa:inkscape.dev/trunk sudo apt install inkscape-trunk")
- 10:33, 27 October 2024 Graphics Design: Inkscape (hist | edit) [38 bytes] Onnowpurbo (talk | contribs) (Created page with " * Inkscape: Install Ubuntu 24.04")
- 09:55, 27 October 2024 Lmms (hist | edit) [31 bytes] Onnowpurbo (talk | contribs) (Created page with "Instalasi apt -y install lmms")
- 08:47, 24 October 2024 Install WordPress di Ubuntu 24.04 dgn Apache2 MariaDB PHP8 (hist | edit) [4,236 bytes] Onnowpurbo (talk | contribs) (Created page with "Bagi anda yang berminat untuk membuat sendiri Server Blog dapat menggunakan Wordpress. Pertama-tama siapkan beberapa fasilitas pendukung Wordpress seperti MySQL...")
- 17:46, 21 October 2024 Kali Linux: Attack Active Directory (hist | edit) [60 bytes] Onnowpurbo (talk | contribs) (Created page with " LDAPDomainDump https://github.com/dirkjanm/ldapdomaindump")
- 10:26, 21 October 2024 Forensic: msfvenom attack (hist | edit) [39 bytes] Onnowpurbo (talk | contribs) (Redirected page to Forenisc: msfvenom attack) Tag: New redirect
- 05:41, 21 October 2024 Forensic Report: Findings (en) (hist | edit) [3,776 bytes] Onnowpurbo (talk | contribs) (Created page with "==6. Examination Results== This section is the core of an investigation or audit. Here, all the evidence and data collected during the examination process will be presented,...")
- 05:36, 21 October 2024 Forensic Report: Examination Procedures (en) (hist | edit) [3,719 bytes] Onnowpurbo (talk | contribs) (Created page with "Sure! Here's the translated text in English while retaining the wiki format: ==5. Digital Forensic Examination Procedures== '''Digital forensic examination procedures''' are...")
- 05:31, 21 October 2024 Forensic Report: Outline (en) (hist | edit) [3,270 bytes] Onnowpurbo (talk | contribs) (Created page with "=Outline of IT Forensic Report= ==1. Title Page== * Title of the Report (clear and specific) * Name of the Report Author * Position or Affiliation * Date of Report Preparatio...")
- 05:23, 21 October 2024 Hands-on Android Forensics using ADB for analyzing SMS, calls, contacts, WhatsApp, Location Data (en) (hist | edit) [3,746 bytes] Onnowpurbo (talk | contribs) (Created page with "Sure! Here’s the translated text in English, retaining the wiki format: ==Android Forensics on Ubuntu Using ADB== '''What is Android Forensics?''' Android forensics is a...")
- 05:18, 21 October 2024 Hands-on Android Forensics using ADB (en) (hist | edit) [4,755 bytes] Onnowpurbo (talk | contribs) (Created page with "Here’s the translation while retaining the wiki format: ==Android Forensic Techniques on Ubuntu Using ADB== '''What is ADB?''' Android Debug Bridge (ADB) is a powerful co...")
- 05:08, 21 October 2024 Android Rooting Techniques if Necessary (en) (hist | edit) [3,705 bytes] Onnowpurbo (talk | contribs) (Created page with "==Apa itu Rooting?== Rooting adalah proses mendapatkan akses root (administrasi penuh) pada sistem operasi Android. Dengan root, Anda bisa melakukan kustomisasi mendalam pada...")
- 05:04, 21 October 2024 Acquisition Techniques: Physical Extraction vs. Logical Extraction (en) (hist | edit) [4,379 bytes] Onnowpurbo (talk | contribs) (Created page with "Here's the translated text while retaining the wiki format: == Acquisition Techniques in Mobile Forensics == Acquisition techniques are a crucial initial step in the mobile...")
- 04:54, 21 October 2024 Characteristics of Mobile Devices: Mobile Operating Systems, Third-Party Applications, Cloud Storage (en) (hist | edit) [2,958 bytes] Onnowpurbo (talk | contribs) (Created page with "'''Mobile Devices''' are computing devices designed for portability and ease of use. Some key characteristics of mobile devices include: ==Mobile Operating Systems== Mobile o...")
- 04:48, 21 October 2024 Mitigation to secure files and file systems (en) (hist | edit) [2,960 bytes] Onnowpurbo (talk | contribs) (Created page with "==General Mitigations:== * '''Update the System Regularly:''' ** Install system updates regularly to fix known security vulnerabilities. Use the command `sudo apt update &&...")
- 04:46, 21 October 2024 Hands-on File Forensics using dd, ntfsundelete, ext3undelete, and extundelete (en) (hist | edit) [2,565 bytes] Onnowpurbo (talk | contribs) (Created page with "==Disclaimer:== * '''Always create a copy (image) of the disk or partition to be examined.''' Directly examining the original disk may damage the data under investigation. * '...")
- 04:44, 21 October 2024 Overview of dd, ntfsundelete, ext3undelete, and extundelete (en) (hist | edit) [3,072 bytes] Onnowpurbo (talk | contribs) (Created page with "==What is a Data Recovery Tool?== A data recovery tool is a program designed to recover files that were accidentally deleted from a hard drive, flash drive, or other storage...")
- 04:43, 21 October 2024 Mitigation of backdoor in Ubuntu (en) (hist | edit) [4,342 bytes] Onnowpurbo (talk | contribs) (Created page with "==What is a Backdoor?== Before we dive into mitigation steps, it’s important to understand what a backdoor is. A backdoor is a hidden entry point into a computer system tha...")
- 04:39, 21 October 2024 Forensic backdoor in Ubuntu (en) (hist | edit) [3,440 bytes] Onnowpurbo (talk | contribs) (Created page with "'''This information is for educational and research purposes only.''' Using this information for illegal or unlawful activities is strictly prohibited. '''I strongly advise ag...")
- 04:33, 21 October 2024 Hands-on mkfifo attack backdoor in DVWA via Command Injection (en) (hist | edit) [2,691 bytes] Onnowpurbo (talk | contribs) (Created page with "'''mkfifo''' stands for '''make first-in-first-out'''. It is a command in Unix-based operating systems like Ubuntu that is used to create a *named pipe*. A pipe is an inter-pr...")
- 04:30, 21 October 2024 Mkfifo: how it works (en) (hist | edit) [2,622 bytes] Onnowpurbo (talk | contribs) (Created page with "'''mkfifo''' stands for '''make first-in-first-out'''. It is a command in Unix-based operating systems like Ubuntu that is used to create a *named pipe*. A pipe is an inter-pr...")
- 04:08, 21 October 2024 TCP port communication via nc (en) (hist | edit) [2,725 bytes] Onnowpurbo (talk | contribs) (Created page with "Netcat (nc) is a highly versatile networking utility in Linux. Often referred to as the "Swiss Army Knife" of networking, netcat (nc) can be used for various tasks, from creat...")
- 04:03, 21 October 2024 Mitigation of Command Injection Attack (en) (hist | edit) [3,395 bytes] Onnowpurbo (talk | contribs) (Created page with "Command injection is a type of security attack where the attacker injects malicious commands into user input, which are then executed by the operating system. This allows the...")
- 04:01, 21 October 2024 Forensic Command Injection Attack (en) (hist | edit) [3,668 bytes] Onnowpurbo (talk | contribs) (Created page with "'''Command Injection''' is a type of security vulnerability where attackers can inject malicious commands into user input, which are then executed by the server. DVWA (Damn Vu...")
- 19:42, 20 October 2024 Hands-on Command Injection Attack (en) (hist | edit) [2,016 bytes] Onnowpurbo (talk | contribs) (Created page with "==Setting Up the Environment:== ===Install DVWA:=== * Download the DVWA ZIP file from [https://github.com/digininja/DVWA](https://github.com/digininja/DVWA). * Extract it to...")
- 19:39, 20 October 2024 Command Line on a Linux Server (en) (hist | edit) [3,290 bytes] Onnowpurbo (talk | contribs) (Created page with "CLI is a text-based user interface that allows users to interact directly with the operating system. In Linux, the CLI is very powerful and flexible, enabling users to execute...")
- 19:38, 20 October 2024 Mitigation: Snort IPS (en) (hist | edit) [3,891 bytes] Onnowpurbo (talk | contribs) (Created page with "'''SQL Injection''' is a cyber attack technique in which an attacker injects malicious SQL code into input data that is then executed by the database. The aim can be to steal...")
- 19:36, 20 October 2024 Mitigation: SQL Injection (en) (hist | edit) [5,230 bytes] Onnowpurbo (talk | contribs) (Created page with "SQL injection attacks are one of the biggest security threats to web applications. This attack allows attackers to inject malicious SQL code into user input, thereby manipulat...")
- 19:34, 20 October 2024 Hands-On: Attack SQL Injection (en) (hist | edit) [3,970 bytes] Onnowpurbo (talk | contribs) (Created page with "This module will guide you in conducting forensic investigations on SQL injection attacks that occur on a Linux server. We will analyze system logs, particularly Apache and Sn...")
- 19:33, 20 October 2024 SQL Injection Attack (en) (hist | edit) [3,429 bytes] Onnowpurbo (talk | contribs) (Created page with "SQL Injection is a cyber attack technique in which an attacker injects malicious SQL code into data input, which is then executed by the database. This allows the attacker to...")
- 19:31, 20 October 2024 SQL Overview (en) (hist | edit) [3,159 bytes] Onnowpurbo (talk | contribs) (Created page with "Sure! Here's the translation into English while retaining the wiki format: '''SQL (Structured Query Language)''' is the standard language used for managing and manipulating d...")
- 19:29, 20 October 2024 Mitigating eMail Attacks: GnuPG (en) (hist | edit) [3,365 bytes] Onnowpurbo (talk | contribs) (Created page with "This module will guide you step by step in securing your email communications using GnuPG (GNU Privacy Guard) encryption in the Thunderbird email client. GnuPG is a powerful a...")
- 19:26, 20 October 2024 Hands-On: Spoofing Attack on SMTP Server & WebMail (en) (hist | edit) [4,102 bytes] Onnowpurbo (talk | contribs) (Created page with "=Email Spoofing Attacks= Email spoofing attacks have become a serious threat, particularly for banking customers such as BCA. Cybercriminals often exploit this technique to s...")
- 19:23, 20 October 2024 SMTP, POP3, IMAP Protocols (en) (hist | edit) [3,640 bytes] Onnowpurbo (talk | contribs) (Created page with "=Simple Explanation of How SMTP, POP3, and IMAP Protocols Work= ==Main Differences:== * '''SMTP:''' Used only for sending emails. * '''POP3:''' Downloads emails to a local d...")
- 19:21, 20 October 2024 Intrusion Investigation (en) (hist | edit) [8,465 bytes] Onnowpurbo (talk | contribs) (Created page with "'''Network Investigation''' is a systematic process of collecting, analyzing, and interpreting data from a computer network to identify, understand, and respond to cybersecuri...")
- 19:19, 20 October 2024 Tools and Techniques (en) (hist | edit) [3,900 bytes] Onnowpurbo (talk | contribs) (Created page with "'''Network Investigation''' is the process of collecting, analyzing, and interpreting network data to identify, understand, and respond to cybersecurity incidents. In the cont...")
- 18:58, 20 October 2024 Basic Network Concepts (en) (hist | edit) [4,384 bytes] Onnowpurbo (talk | contribs) (Created page with "'''Network investigation''' is a systematic process of collecting, analyzing, and interpreting data from a computer network for investigative purposes, particularly in cases o...")
- 18:56, 20 October 2024 Mobile Operating System (en) (hist | edit) [4,712 bytes] Onnowpurbo (talk | contribs) (Created page with "==Mobile Operating System Forensic Investigation== Forensic investigation on mobile operating systems is becoming increasingly crucial as society's dependence on mobile devic...")
- 18:50, 20 October 2024 Linux Operating System (en) (hist | edit) [6,675 bytes] Onnowpurbo (talk | contribs) (Created page with "==Operating System Linux in Digital Forensics== Linux, with its flexibility and open-source nature, is a primary target in various digital investigations. A deep understandin...")
- 18:14, 20 October 2024 Windows Operating System (en) (hist | edit) [3,988 bytes] Onnowpurbo (talk | contribs) (Created page with "==Windows Operating System Investigation== A Windows operating system investigation involves the process of collecting, analyzing, and interpreting digital data stored within...")
- 17:16, 20 October 2024 Trace Data Analysis (en) (hist | edit) [4,173 bytes] Onnowpurbo (talk | contribs) (Created page with "'''Data analysis''' is the process of collecting, cleaning, transforming, and modeling data with the goal of discovering useful information, informing conclusions, and support...")
- 17:14, 20 October 2024 Analysis Techniques (en) (hist | edit) [4,467 bytes] Onnowpurbo (talk | contribs) (Created page with "'''File Carving, email Analysis, Web history analysis,''' and '''Registry analysis'''. These techniques are commonly used in digital forensic investigations to uncover hidden...")
- 17:09, 20 October 2024 Tools and Software (en) (hist | edit) [3,704 bytes] Onnowpurbo (talk | contribs) (Created page with "'''Forensic data analysis''' is a scientific process of collecting, examining, and analyzing digital evidence found on electronic devices. This evidence can include files, ema...")
- 17:01, 20 October 2024 Documentation and Chain of Custody (en) (hist | edit) [4,053 bytes] Onnowpurbo (talk | contribs) (Created page with "'''Documentation''' is a written or visual record that captures every stage of a process, from start to finish. In various fields, especially those involving physical evidence...")
- 08:04, 20 October 2024 Acquisition Techniques (en) (hist | edit) [4,884 bytes] Onnowpurbo (talk | contribs) (Created page with "Sure, let’s discuss in detail the three forensic data acquisition techniques you mentioned: '''disk imaging''', '''memory dump''', and '''network traffic capture'''. ==Disk...")