User contributions
Jump to navigation
Jump to search
- 09:13, 19 October 2024 diff hist +95 N Forensic: nmap ssh2-enum-algos attack Created page with " nmap -p 22 -Pn --script ssh2-enum-algos --script-args ssh2-enum-algos.mode=weak-macs localhost"
- 09:12, 19 October 2024 diff hist +277 N Forensic: nmap mysql-brute.nse attack Created page with " nmap --script=mysql-brute <target> Nmap -sT -p3306 --script mysql-brute.nse --script-args userdb=/root/user.txt --script-trace 192.168.0.100 Nmap -sT -p3306 --script..."
- 09:07, 19 October 2024 diff hist +118 N Forensic: nmap smb-enum-users.nse attack Created page with " nmap --script smb-enum-users.nse -p445 <host> sudo nmap -sU -sS --script smb-enum-users.nse -p U:137,T:139 <host>"
- 09:07, 19 October 2024 diff hist -582 Forensic: IT →PERTEMUAN: Misc Attack & Forensic
- 09:05, 19 October 2024 diff hist +135 Forensic: IT →PERTEMUAN: Misc Attack & Forensic
- 08:58, 19 October 2024 diff hist +4,799 N Hands-on: Hands-on: Creating a Penetration Testing Plan (en) Created page with "'''Penetration testing''' is an ethical simulation of cyber attacks designed to identify and evaluate security vulnerabilities in a system. Before starting hands-on testing, i..." current
- 08:54, 19 October 2024 diff hist +2,653 N Penetration Testing Standards (OWASP, NIST) (en) Created page with "==Standar Penetration Testing (Pentest): A Comparison of OWASP and NIST== Penetration testing (pentesting) refers to the practice of testing the security of a system, applica..." current
- 08:52, 19 October 2024 diff hist +2,354 N Penetration Testing Phases (Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks) (en) Created page with "==Penetration Testing or Ethical Hacking== '''Penetration testing or ethical hacking is the process of simulating a cyberattack to identify security vulnerabilities within a..." current
- 08:45, 19 October 2024 diff hist +14 Ethical Hacking →Metodologi Penetration Testing
- 08:42, 19 October 2024 diff hist -318 Perangkat Tool dan Lingkungan Kerja (VM, Kali Linux) current
- 08:37, 19 October 2024 diff hist +4,130 Hands-on: Setting Up a Secure Lab and Testing Environment (en) current
- 08:37, 19 October 2024 diff hist -4,130 Tools and Work Environment (VM, Kali Linux) (en) Blanked the page current Tag: Blanking
- 08:36, 19 October 2024 diff hist +4,130 N Tools and Work Environment (VM, Kali Linux) (en) Created page with "==Understanding the Core Components:== * '''Ubuntu 24.04:''' As the primary operating system for your host machine, Ubuntu offers both stability and flexibility. * '''Kali Li..."
- 08:34, 19 October 2024 diff hist -3,907 Hands-on: Setting Up a Secure Lab and Testing Environment (en) Blanked the page Tag: Blanking
- 08:32, 19 October 2024 diff hist +2,835 N Legality, Ethics, and Law Related to Hacking. (en) Created page with "'''Ethical hacking''', often associated with illegal activities, actually has a positive side known as '''ethical hacking'''. Ethical hacking involves using hacking techniques..." current
- 08:29, 19 October 2024 diff hist +3,907 N Roles and Responsibilities of an Ethical Hacker (en) Created page with "==Ethical Hacker or White Hat Hacker== '''An ethical hacker or white hat hacker is a cybersecurity professional who actively seeks out and exploits vulnerabilities in compute..." current
- 08:28, 19 October 2024 diff hist +3,907 N Hands-on: Setting Up a Secure Lab and Testing Environment (en) Created page with "==Ethical Hacker or White Hat Hacker== '''An ethical hacker or white hat hacker is a cybersecurity professional who actively seeks out and exploits vulnerabilities in compute..."
- 08:26, 19 October 2024 diff hist +2,051 N Definition of Ethical Hacking (en) Created page with "==Ethical Hacking: A Protective Shield for the Digital World== '''What is Ethical Hacking?''' Ethical hacking is the practice of using hacking techniques to identify and fix..." current
- 08:23, 19 October 2024 diff hist +16 Ethical Hacking →Pengantar Ethical Hacking
- 08:16, 19 October 2024 diff hist +1 Ethical Hacking →Privilege Escalation
- 08:16, 19 October 2024 diff hist +11 Ethical Hacking →Privilege Escalation
- 08:14, 19 October 2024 diff hist +8 Ethical Hacking →Post-Exploitation dan Maintaining Access
- 08:12, 19 October 2024 diff hist +5 Ethical Hacking →Mobile Hacking
- 08:11, 19 October 2024 diff hist -3 Ethical Hacking →Capture The Flag (CTF) Challenge dan Review
- 08:09, 19 October 2024 diff hist +594 Ethical Hacking →Report Penetration Test
- 08:04, 19 October 2024 diff hist +201 Ethical Hacking →Capture The Flag (CTF) Challenge dan Review
- 08:04, 19 October 2024 diff hist +195 Ethical Hacking →Mobile Hacking
- 08:03, 19 October 2024 diff hist -2 Ethical Hacking →Post-Exploitation dan Maintaining Access
- 08:03, 19 October 2024 diff hist 0 Ethical Hacking →Social Engineering
- 08:03, 19 October 2024 diff hist -1 Ethical Hacking →Wireless Network Hacking
- 08:03, 19 October 2024 diff hist 0 Ethical Hacking →Password Cracking dan Authentication Bypass
- 08:02, 19 October 2024 diff hist 0 Ethical Hacking →Web Application Hacking - Bagian 2
- 08:02, 19 October 2024 diff hist +1 Ethical Hacking →Web Application Hacking - Bagian 1
- 08:02, 19 October 2024 diff hist +1 Ethical Hacking →Exploitation Basics
- 08:02, 19 October 2024 diff hist 0 Ethical Hacking →Scanning dan Enumeration
- 08:02, 19 October 2024 diff hist 0 Ethical Hacking →Reconnaissance (Information Gathering)
- 08:02, 19 October 2024 diff hist +1 Ethical Hacking →Metodologi Penetration Testing
- 08:01, 19 October 2024 diff hist 0 Ethical Hacking
- 07:59, 19 October 2024 diff hist 0 Ethical Hacking
- 07:54, 19 October 2024 diff hist +4 Ethical Hacking →Pengantar Ethical Hacking
- 07:54, 19 October 2024 diff hist +2,770 Ethical Hacking
- 06:20, 17 October 2024 diff hist -4 Berbagai latihan serangan dan forensic pada Metasploitable →Forensik IT dalam Skenario Ini current
- 06:19, 17 October 2024 diff hist +3,294 N Berbagai latihan serangan dan forensic pada Metasploitable Created page with "'''Forensik IT''' adalah cabang ilmu komputer yang berfokus pada pengumpulan, pelestarian, dan analisis data digital untuk tujuan investigasi. Dalam konteks latihan serangan,..."
- 06:17, 17 October 2024 diff hist +66 Forensic: IT →PERTEMUAN: Misc Attack & Forensic
- 06:09, 17 October 2024 diff hist -377 Investigasi Intrusi current
- 06:05, 17 October 2024 diff hist -431 Tool dan Teknik current
- 05:22, 17 October 2024 diff hist -419 Konsep Dasar Jaringan current
- 05:20, 17 October 2024 diff hist -432 Sistem Operasi Mobile current
- 05:16, 17 October 2024 diff hist -490 Sistem Operasi Linux current
- 08:08, 15 October 2024 diff hist -377 Sistem Operasi Windows