User contributions
Jump to navigation
Jump to search
- 04:55, 30 October 2024 diff hist -279 Analysis Techniques (en) →Conclusion current
- 09:48, 29 October 2024 diff hist +19 Linux Operating System (en) →Investigation Tools and Techniques
- 09:44, 29 October 2024 diff hist +13 Linux Operating System (en) →Investigation Tools and Techniques
- 09:27, 29 October 2024 diff hist -23 Linux Operating System (en) →Investigation Tools and Techniques
- 09:24, 29 October 2024 diff hist +175 Mitigation of backdoor in Ubuntu (en) →Useful Tools: current
- 09:22, 29 October 2024 diff hist +580 Mitigation of backdoor in Ubuntu (en) →Useful Tools:
- 09:17, 29 October 2024 diff hist +79 Mitigation of backdoor in Ubuntu (en) →Useful Tools:
- 09:14, 29 October 2024 diff hist +2,204 N Grep: Scanning Backdoor Created page with "==grep== Dan yang terakhir, kita memiliki perintah grep yang merupakan tool command line yang hebat di Unix dan Linux. Perintah ini digunakan untuk mencari dan memeriksa kump..." current
- 09:14, 29 October 2024 diff hist +30 Forensic: IT →PERTEMUAN: Forensic Backdoor via Command Injection Attack current
- 09:10, 29 October 2024 diff hist +2,031 N Grep: Scanning for backdoor (en) Created page with "==grep== And the last but not the least, we have the grep command which is a powerful command-line tool in Unix and Linux. It is used for searching and probing data sets for..." current
- 09:09, 29 October 2024 diff hist +36 Forensic: IT →PERTEMUAN: Forensic Backdoor via Command Injection Attack
- 09:02, 29 October 2024 diff hist +22 Intrusion Investigation (en) →Server Log Analysis
- 07:27, 29 October 2024 diff hist +8,129 N Hands-on: Target Port, Services, and Vulnerability Identification (en) Created page with "Before we begin, it’s important to understand some basic concepts: * '''Port:''' Think of a port as the doorway to an application or service on a system. Each application o..." current
- 07:24, 29 October 2024 diff hist +2 Ethical Hacking →Scanning dan Enumeration current
- 07:23, 29 October 2024 diff hist +3,805 N Teknik dan Protokol Wireless (WEP, WPA/WPA2) (en) Created page with "'''Disclaimer:''' This information is provided for educational and research purposes in the field of cybersecurity. Use of this information for illegal or unethical purposes i..." current
- 07:22, 29 October 2024 diff hist +3,849 N Attacks: WEP Cracking, WPA Handshake Capture (en) Created page with "==Understanding WEP Cracking and WPA Handshake Capture Attacks== * '''WEP Cracking:''' WEP (Wired Equivalent Privacy) is a wireless network security protocol that is consider..." current
- 07:20, 29 October 2024 diff hist +2,894 N Report Penetration Test: Examples of Exploitation Findings (en) Created page with "==Exploit Findings: SQL Injection Vulnerability in Web Applications== ===Vulnerabilities Discovered:=== SQL Injection (SQLi) is a security vulnerability where an attacker can..." current
- 07:19, 29 October 2024 diff hist +3,523 N Report Penetration Test: Examples of Impact Findings (en) Created page with "==Potential Impact== Each vulnerability found in the system can have a significant impact if exploited by an unauthorized party. Here are some possible impact scenarios for so..." current
- 07:18, 29 October 2024 diff hist +4,590 N Report Penetration Test: Example of Risk Analysis (en) Created page with "==Overview== This report aims to evaluate the risk level of various vulnerabilities detected during penetration testing on the web application of *Company XYZ*. Each vulnerab..." current
- 07:17, 29 October 2024 diff hist +4,012 N Data Exfiltration (en) Created page with "'''Data exfiltration''' is the process of stealing data from a system unauthorizedly and moving it to another location that can be accessed by an attacker. Kali Linux, as a po..." current
- 07:16, 29 October 2024 diff hist +4,377 N Exploiting Misconfigured Services (en) Created page with "==What are Misconfigured Services?== Misconfigured services refer to services (such as web servers, database servers, or applications) that are not configured properly. This..." current
- 07:15, 29 October 2024 diff hist -314 Hands-on: Gaining Root and Administrator Access in Linux and Windows (en)
- 07:14, 29 October 2024 diff hist +3,660 N Hands-on: Gaining Root and Administrator Access in Linux and Windows (en) Created page with "=Privilege Escalation pada Ubuntu 24.04 Server Linux dan Windows 10= Privilege escalation adalah teknik yang digunakan untuk mendapatkan hak akses lebih tinggi dari yang dibe..."
- 07:14, 29 October 2024 diff hist -187 Hands-on: Menaikkan Privilege di Sistem Linux dan Windows
- 07:08, 29 October 2024 diff hist +3,783 N Teknik Social Engineering: Phishing, Pretexting, Baiting (en) Created page with "'''Social engineering''' is a psychological manipulation technique to obtain sensitive information from individuals. In the context of ethical hacking, this technique is used..." current
- 07:06, 29 October 2024 diff hist +3,624 N Email Spoofing dan Spear Phishing (en) Created page with "==Social Engineering: Manipulating Humans to Gain Access== Social engineering is a psychological manipulation technique used by cybercriminals to gain sensitive information o..." current
- 07:06, 29 October 2024 diff hist +7,031 N Tools: Social Engineering Toolkit (SET) (en) Created page with "Explanation of Social Engineering Toolkit (SET) in Kali Linux 24.03 for ethical hacking course purposes. ==What is Social Engineering Toolkit (SET)?== SET is an open-source..." current
- 07:04, 29 October 2024 diff hist -49 Tools: Social Engineering Toolkit (SET) →Pranala Menarik
- 07:03, 29 October 2024 diff hist -609 Tools: Social Engineering Toolkit (SET)
- 06:55, 29 October 2024 diff hist -87 Tools: Social Engineering Toolkit (SET)
- 06:51, 29 October 2024 diff hist +3,403 N Hands-on: Simulasi Phishing Attack (en) Created page with "Here is an explanation and example of a '''Phishing Attack''' simulation using '''Kali Linux 2024.3''' in the context of an ethical hacking course. ==Phishing Attack Overview..." current
- 06:51, 29 October 2024 diff hist -33 Hands-on: Simulasi Phishing Attack current
- 06:47, 29 October 2024 diff hist +3,986 N Tools: WHOIS, dig, Maltego, Google Dorking (en) Created page with "=WHOIS= ==What is WHOIS?== WHOIS is a query protocol used to find public information about internet domain registrations. This information can include the owner's name, emai..." current
- 06:45, 29 October 2024 diff hist -7 Passive and Active Reconnaissance (en) current
- 06:44, 29 October 2024 diff hist +8,861 N Passive and Active Reconnaissance (en) Created page with "Reconnaissance or information gathering in the context of cybersecurity is the initial phase of a cyber attack or penetration testing (pentest), where an attacker or pentester..."
- 06:37, 29 October 2024 diff hist 0 Ethical Hacking →Reconnaissance (Information Gathering)
- 06:37, 29 October 2024 diff hist +3,460 N Open Source Intelligence (OSINT) Techniques (en) Created page with "Open Source Intelligence (OSINT) techniques are methods of gathering information from open and public sources. It is often used in the passive reconnaissance phase. OSINT invo..." current
- 06:36, 29 October 2024 diff hist +4 Ethical Hacking →Reconnaissance (Information Gathering)
- 06:35, 29 October 2024 diff hist +7 Hands-on: Passive Target Information Gathering (en) current
- 06:34, 29 October 2024 diff hist +4,235 N Hands-on: Passive Target Information Gathering (en) Created page with "For hands-on ethical hacking using Kali Linux 2024.3, we can passively collect target information as part of the reconnaissance stage. Passive information gathering is the pro..."
- 06:34, 29 October 2024 diff hist -5 Ethical Hacking →Reconnaissance (Information Gathering)
- 06:32, 29 October 2024 diff hist +3,618 N Directory Traversal, File Inclusion (en) Created page with "==Directory Traversal and File Inclusion: Exploring the File System Unexpectedly== ==What is Directory Traversal?== Directory traversal is a vulnerability in a web applicati..." current
- 06:32, 29 October 2024 diff hist -7 Tools: Aircrack-ng, Wireshark current
- 06:31, 29 October 2024 diff hist -6 Tools: Aircrack-ng, Wireshark (en) current
- 06:31, 29 October 2024 diff hist +4,095 N Tools: Aircrack-ng, Wireshark (en) Created page with "Sure, let's discuss in detail about the Aircrack-ng and Wireshark tools in Kali Linux 24.03, and how they are used in the context of ethical hacking courses. ==Aircrack-ng==..."
- 06:30, 29 October 2024 diff hist -187 Tools: Aircrack-ng, Wireshark
- 05:46, 29 October 2024 diff hist +3,281 N Hands-on: Attack Wireless Network and Cracking WiFi Password (en) Created page with "Here is a detailed explanation and example of '''Attacking Wireless Networks and Cracking WiFi Passwords''' using '''KALI Linux 2024.3''' for ethical hacking college needs: =..." current
- 05:46, 29 October 2024 diff hist -5 Ethical Hacking →Wireless Network Hacking
- 05:45, 29 October 2024 diff hist -14 Hands-on: Menyerang Wireless Network dan Memecahkan Password WiFi →Contoh Kasus current
- 05:44, 29 October 2024 diff hist -227 Hands-on: Menyerang Wireless Network dan Memecahkan Password WiFi