User contributions
Jump to navigation
Jump to search
- 04:54, 21 October 2024 diff hist +2,958 N Characteristics of Mobile Devices: Mobile Operating Systems, Third-Party Applications, Cloud Storage (en) Created page with "'''Mobile Devices''' are computing devices designed for portability and ease of use. Some key characteristics of mobile devices include: ==Mobile Operating Systems== Mobile o..." current
- 04:51, 21 October 2024 diff hist -279 Karakteristik Perangkat Mobile: Sistem operasi mobile, Aplikasi pihak ketiga, Cloud storage current
- 04:48, 21 October 2024 diff hist +2,960 N Mitigation to secure files and file systems (en) Created page with "==General Mitigations:== * '''Update the System Regularly:''' ** Install system updates regularly to fix known security vulnerabilities. Use the command `sudo apt update &&..." current
- 04:46, 21 October 2024 diff hist +2,565 N Hands-on File Forensics using dd, ntfsundelete, ext3undelete, and extundelete (en) Created page with "==Disclaimer:== * '''Always create a copy (image) of the disk or partition to be examined.''' Directly examining the original disk may damage the data under investigation. * '..." current
- 04:44, 21 October 2024 diff hist +3,072 N Overview of dd, ntfsundelete, ext3undelete, and extundelete (en) Created page with "==What is a Data Recovery Tool?== A data recovery tool is a program designed to recover files that were accidentally deleted from a hard drive, flash drive, or other storage..." current
- 04:43, 21 October 2024 diff hist +3,508 N Mitigation of backdoor in Ubuntu (en) Created page with "==What is a Backdoor?== Before we dive into mitigation steps, it’s important to understand what a backdoor is. A backdoor is a hidden entry point into a computer system tha..."
- 04:39, 21 October 2024 diff hist +3,440 N Forensic backdoor in Ubuntu (en) Created page with "'''This information is for educational and research purposes only.''' Using this information for illegal or unlawful activities is strictly prohibited. '''I strongly advise ag..." current
- 04:33, 21 October 2024 diff hist +2,622 N Hands-on mkfifo attack backdoor in DVWA via Command Injection (en) Created page with "'''mkfifo''' stands for '''make first-in-first-out'''. It is a command in Unix-based operating systems like Ubuntu that is used to create a *named pipe*. A pipe is an inter-pr..."
- 04:30, 21 October 2024 diff hist +2,622 N Mkfifo: how it works (en) Created page with "'''mkfifo''' stands for '''make first-in-first-out'''. It is a command in Unix-based operating systems like Ubuntu that is used to create a *named pipe*. A pipe is an inter-pr..." current
- 04:08, 21 October 2024 diff hist +2,725 N TCP port communication via nc (en) Created page with "Netcat (nc) is a highly versatile networking utility in Linux. Often referred to as the "Swiss Army Knife" of networking, netcat (nc) can be used for various tasks, from creat..." current
- 04:03, 21 October 2024 diff hist +3,395 N Mitigation of Command Injection Attack (en) Created page with "Command injection is a type of security attack where the attacker injects malicious commands into user input, which are then executed by the operating system. This allows the..." current
- 04:01, 21 October 2024 diff hist +3,668 N Forensic Command Injection Attack (en) Created page with "'''Command Injection''' is a type of security vulnerability where attackers can inject malicious commands into user input, which are then executed by the server. DVWA (Damn Vu..." current
- 19:42, 20 October 2024 diff hist +2,016 N Hands-on Command Injection Attack (en) Created page with "==Setting Up the Environment:== ===Install DVWA:=== * Download the DVWA ZIP file from [https://github.com/digininja/DVWA](https://github.com/digininja/DVWA). * Extract it to..." current
- 19:39, 20 October 2024 diff hist +3,290 N Command Line on a Linux Server (en) Created page with "CLI is a text-based user interface that allows users to interact directly with the operating system. In Linux, the CLI is very powerful and flexible, enabling users to execute..." current
- 19:38, 20 October 2024 diff hist +3,891 N Mitigation: Snort IPS (en) Created page with "'''SQL Injection''' is a cyber attack technique in which an attacker injects malicious SQL code into input data that is then executed by the database. The aim can be to steal..." current
- 19:36, 20 October 2024 diff hist +5,261 N Mitigation: SQL Injection (en) Created page with "SQL injection attacks are one of the biggest security threats to web applications. This attack allows attackers to inject malicious SQL code into user input, thereby manipulat..."
- 19:34, 20 October 2024 diff hist +3,939 N Hands-On: Attack SQL Injection (en) Created page with "This module will guide you in conducting forensic investigations on SQL injection attacks that occur on a Linux server. We will analyze system logs, particularly Apache and Sn..."
- 19:33, 20 October 2024 diff hist +3,429 N SQL Injection Attack (en) Created page with "SQL Injection is a cyber attack technique in which an attacker injects malicious SQL code into data input, which is then executed by the database. This allows the attacker to..." current
- 19:31, 20 October 2024 diff hist +3,159 N SQL Overview (en) Created page with "Sure! Here's the translation into English while retaining the wiki format: '''SQL (Structured Query Language)''' is the standard language used for managing and manipulating d..." current
- 19:29, 20 October 2024 diff hist +3,436 N Mitigating eMail Attacks: GnuPG (en) Created page with "This module will guide you step by step in securing your email communications using GnuPG (GNU Privacy Guard) encryption in the Thunderbird email client. GnuPG is a powerful a..."
- 19:26, 20 October 2024 diff hist +4,072 N Hands-On: Spoofing Attack on SMTP Server & WebMail (en) Created page with "=Email Spoofing Attacks= Email spoofing attacks have become a serious threat, particularly for banking customers such as BCA. Cybercriminals often exploit this technique to s..."
- 19:23, 20 October 2024 diff hist +3,640 N SMTP, POP3, IMAP Protocols (en) Created page with "=Simple Explanation of How SMTP, POP3, and IMAP Protocols Work= ==Main Differences:== * '''SMTP:''' Used only for sending emails. * '''POP3:''' Downloads emails to a local d..." current
- 19:21, 20 October 2024 diff hist +4,888 N Intrusion Investigation (en) Created page with "'''Network Investigation''' is a systematic process of collecting, analyzing, and interpreting data from a computer network to identify, understand, and respond to cybersecuri..."
- 19:19, 20 October 2024 diff hist +3,900 N Tools and Techniques (en) Created page with "'''Network Investigation''' is the process of collecting, analyzing, and interpreting network data to identify, understand, and respond to cybersecurity incidents. In the cont..."
- 18:58, 20 October 2024 diff hist +4,384 N Basic Network Concepts (en) Created page with "'''Network investigation''' is a systematic process of collecting, analyzing, and interpreting data from a computer network for investigative purposes, particularly in cases o..." current
- 18:56, 20 October 2024 diff hist +4,712 N Mobile Operating System (en) Created page with "==Mobile Operating System Forensic Investigation== Forensic investigation on mobile operating systems is becoming increasingly crucial as society's dependence on mobile devic..." current
- 18:50, 20 October 2024 diff hist +4,385 N Linux Operating System (en) Created page with "==Operating System Linux in Digital Forensics== Linux, with its flexibility and open-source nature, is a primary target in various digital investigations. A deep understandin..."
- 18:14, 20 October 2024 diff hist +3,988 N Windows Operating System (en) Created page with "==Windows Operating System Investigation== A Windows operating system investigation involves the process of collecting, analyzing, and interpreting digital data stored within..." current
- 17:16, 20 October 2024 diff hist +4,173 N Trace Data Analysis (en) Created page with "'''Data analysis''' is the process of collecting, cleaning, transforming, and modeling data with the goal of discovering useful information, informing conclusions, and support..." current
- 17:14, 20 October 2024 diff hist +4,746 N Analysis Techniques (en) Created page with "'''File Carving, email Analysis, Web history analysis,''' and '''Registry analysis'''. These techniques are commonly used in digital forensic investigations to uncover hidden..."
- 17:09, 20 October 2024 diff hist +3,704 N Tools and Software (en) Created page with "'''Forensic data analysis''' is a scientific process of collecting, examining, and analyzing digital evidence found on electronic devices. This evidence can include files, ema..." current
- 17:01, 20 October 2024 diff hist +4,051 N Documentation and Chain of Custody (en) Created page with "'''Documentation''' is a written or visual record that captures every stage of a process, from start to finish. In various fields, especially those involving physical evidence..."
- 08:04, 20 October 2024 diff hist +4,231 N Acquisition Techniques (en) Created page with "Sure, let’s discuss in detail the three forensic data acquisition techniques you mentioned: '''disk imaging''', '''memory dump''', and '''network traffic capture'''. ==Disk..."
- 07:58, 20 October 2024 diff hist +3,401 N Basic Principles of Acquisition (en) Created page with "'''Data Acquisition''' is the process of collecting data from various sources for the purpose of analysis, storage, or further utilization. The basic principles of data acquis..." current
- 07:57, 20 October 2024 diff hist +3,832 N Law and Ethics (en) Created page with "'''IT Forensics''' is a branch of forensic science that focuses on the collection, analysis, and presentation of digital evidence within a legal context. In Indonesia, this ac..." current
- 07:56, 20 October 2024 diff hist +2 Objectives and Scope (en) →Interesting Links current
- 07:55, 20 October 2024 diff hist +2,946 N Objectives and Scope (en) Created page with "'''IT Forensics''' is a branch of science focused on the identification, collection, analysis, and presentation of digital evidence in a legal context. The primary goals of IT..."
- 07:48, 20 October 2024 diff hist +3,052 N Definition and Basic Concepts (en) Created page with "'''IT Forensics''' is a branch of science that combines principles of computer science and law to collect, preserve, and analyze digital evidence. This digital evidence can be..." current
- 07:46, 20 October 2024 diff hist +1,604 Forensic: IT
- 07:40, 20 October 2024 diff hist +432 Forensic: IT
- 06:59, 20 October 2024 diff hist 0 Bingung Menulis Mulai Dari Mana current
- 06:59, 20 October 2024 diff hist +231 Bingung Menulis Mulai Dari Mana
- 06:57, 20 October 2024 diff hist 0 N File:How-to-read-a-book.jpeg current
- 05:35, 20 October 2024 diff hist +2,970 N Example of attackes dan forensic using Metasploitable (en) Created page with "'''IT Forensics''' is a branch of computer science that focuses on the collection, preservation, and analysis of digital data for investigative purposes. In the context of att..." current
- 05:35, 20 October 2024 diff hist -5 Forensic: IT →PERTEMUAN: Misc Attack & Forensic
- 05:32, 20 October 2024 diff hist +2,571 N Forenisc: msfvenom attack (en) Created page with "== Trojan Attacks on Android == A '''Trojan''' is a type of malware that disguises itself as a legitimate application or program to trick users into installing it. On Android..." current
- 05:32, 20 October 2024 diff hist +2,601 Forenisc: msfvenom attack current
- 05:26, 20 October 2024 diff hist +3,874 N Forensic: msfconsole use auxiliary/scanner/smb/smb enumshares attack (en) Created page with "==What is `msfconsole use auxiliary/scanner/smb/smb_enumshares`?== This command is one of the modules in the Metasploit Framework used for enumeration or reconnaissance of th..." current
- 05:23, 20 October 2024 diff hist -166 Forensic: msfconsole use auxiliary/scanner/smb/smb enumshares attack current
- 05:20, 20 October 2024 diff hist +4,252 Forensic: msfconsole use auxiliary/scanner/smb/smb enumshares attack