User contributions
Jump to navigation
Jump to search
- 04:21, 9 November 2024 diff hist +1,559 N Python: Ubuntu 24.04 Install Created page with "Untuk menginstal Python di Ubuntu 24.04, Anda dapat mengikuti langkah-langkah berikut: ==Memperbarui Daftar Paket:== Sebelum memulai instalasi, pastikan sistem Anda diperbaru..."
- 04:18, 9 November 2024 diff hist +35 Sekitar Python →Persiapan
- 19:06, 6 November 2024 diff hist -3 Hands-On: Attack SQL Injection (en) →2. /var/log/snort/alert current
- 18:38, 6 November 2024 diff hist +34 Hands-On: Attack SQL Injection (en) →Using Wireshark
- 09:53, 2 November 2024 diff hist 0 Tools and Techniques (en) →Important: current
- 08:37, 2 November 2024 diff hist +9 Linux Operating System (en) →Investigation Tools and Techniques current
- 08:35, 2 November 2024 diff hist +242 Linux Operating System (en) →Investigation Tools and Techniques
- 08:31, 2 November 2024 diff hist +795 Linux Operating System (en) →Investigation Tools and Techniques
- 08:28, 2 November 2024 diff hist +1,020 Linux Operating System (en) →Investigation Tools and Techniques
- 08:21, 2 November 2024 diff hist +83 Linux Operating System (en) →Investigation Tools and Techniques
- 08:08, 2 November 2024 diff hist +144 Linux Operating System (en) →Investigation Tools and Techniques
- 08:03, 2 November 2024 diff hist -12 Linux Operating System (en) →Investigation Tools and Techniques
- 08:01, 2 November 2024 diff hist +735 Intrusion Investigation (en) →Server Log Analysis current
- 07:56, 2 November 2024 diff hist +803 Intrusion Investigation (en) →Server Log Analysis
- 07:50, 2 November 2024 diff hist +1,205 Intrusion Investigation (en) →Malware Detection
- 07:44, 2 November 2024 diff hist +115 Intrusion Investigation (en) →Malware Detection
- 07:40, 2 November 2024 diff hist +49 Intrusion Investigation (en) →Malware Detection
- 07:37, 2 November 2024 diff hist +584 Intrusion Investigation (en) →Incident Response
- 07:33, 2 November 2024 diff hist +62 Intrusion Investigation (en) →Incident Response
- 07:29, 2 November 2024 diff hist +2 Intrusion Investigation (en) →Tools Used
- 18:44, 31 October 2024 diff hist +260 Acquisition Techniques (en) →Disk Imaging current
- 18:38, 31 October 2024 diff hist +393 Acquisition Techniques (en) →Memory Dump
- 18:30, 31 October 2024 diff hist 0 Acquisition Techniques (en)
- 19:45, 30 October 2024 diff hist +10 Hands-On: Spoofing Attack on SMTP Server & WebMail (en) →Mitigation with GnuPG / OpenGPG current
- 19:44, 30 October 2024 diff hist +20 Hands-On: Spoofing Attack on SMTP Server & WebMail (en) →Mitigation with GnuPG
- 05:56, 30 October 2024 diff hist -12 Hands-on Android Forensics using ADB (en) →Case Example and Analysis Steps current
- 04:55, 30 October 2024 diff hist -279 Analysis Techniques (en) →Conclusion current
- 09:48, 29 October 2024 diff hist +19 Linux Operating System (en) →Investigation Tools and Techniques
- 09:44, 29 October 2024 diff hist +13 Linux Operating System (en) →Investigation Tools and Techniques
- 09:27, 29 October 2024 diff hist -23 Linux Operating System (en) →Investigation Tools and Techniques
- 09:24, 29 October 2024 diff hist +175 Mitigation of backdoor in Ubuntu (en) →Useful Tools: current
- 09:22, 29 October 2024 diff hist +580 Mitigation of backdoor in Ubuntu (en) →Useful Tools:
- 09:17, 29 October 2024 diff hist +79 Mitigation of backdoor in Ubuntu (en) →Useful Tools:
- 09:14, 29 October 2024 diff hist +2,204 N Grep: Scanning Backdoor Created page with "==grep== Dan yang terakhir, kita memiliki perintah grep yang merupakan tool command line yang hebat di Unix dan Linux. Perintah ini digunakan untuk mencari dan memeriksa kump..." current
- 09:14, 29 October 2024 diff hist +30 Forensic: IT →PERTEMUAN: Forensic Backdoor via Command Injection Attack current
- 09:10, 29 October 2024 diff hist +2,031 N Grep: Scanning for backdoor (en) Created page with "==grep== And the last but not the least, we have the grep command which is a powerful command-line tool in Unix and Linux. It is used for searching and probing data sets for..." current
- 09:09, 29 October 2024 diff hist +36 Forensic: IT →PERTEMUAN: Forensic Backdoor via Command Injection Attack
- 09:02, 29 October 2024 diff hist +22 Intrusion Investigation (en) →Server Log Analysis
- 07:27, 29 October 2024 diff hist +8,129 N Hands-on: Target Port, Services, and Vulnerability Identification (en) Created page with "Before we begin, it’s important to understand some basic concepts: * '''Port:''' Think of a port as the doorway to an application or service on a system. Each application o..." current
- 07:24, 29 October 2024 diff hist +2 Ethical Hacking →Scanning dan Enumeration current
- 07:23, 29 October 2024 diff hist +3,805 N Teknik dan Protokol Wireless (WEP, WPA/WPA2) (en) Created page with "'''Disclaimer:''' This information is provided for educational and research purposes in the field of cybersecurity. Use of this information for illegal or unethical purposes i..." current
- 07:22, 29 October 2024 diff hist +3,849 N Attacks: WEP Cracking, WPA Handshake Capture (en) Created page with "==Understanding WEP Cracking and WPA Handshake Capture Attacks== * '''WEP Cracking:''' WEP (Wired Equivalent Privacy) is a wireless network security protocol that is consider..." current
- 07:20, 29 October 2024 diff hist +2,894 N Report Penetration Test: Examples of Exploitation Findings (en) Created page with "==Exploit Findings: SQL Injection Vulnerability in Web Applications== ===Vulnerabilities Discovered:=== SQL Injection (SQLi) is a security vulnerability where an attacker can..." current
- 07:19, 29 October 2024 diff hist +3,523 N Report Penetration Test: Examples of Impact Findings (en) Created page with "==Potential Impact== Each vulnerability found in the system can have a significant impact if exploited by an unauthorized party. Here are some possible impact scenarios for so..." current
- 07:18, 29 October 2024 diff hist +4,590 N Report Penetration Test: Example of Risk Analysis (en) Created page with "==Overview== This report aims to evaluate the risk level of various vulnerabilities detected during penetration testing on the web application of *Company XYZ*. Each vulnerab..." current
- 07:17, 29 October 2024 diff hist +4,012 N Data Exfiltration (en) Created page with "'''Data exfiltration''' is the process of stealing data from a system unauthorizedly and moving it to another location that can be accessed by an attacker. Kali Linux, as a po..." current
- 07:16, 29 October 2024 diff hist +4,377 N Exploiting Misconfigured Services (en) Created page with "==What are Misconfigured Services?== Misconfigured services refer to services (such as web servers, database servers, or applications) that are not configured properly. This..." current
- 07:15, 29 October 2024 diff hist -314 Hands-on: Gaining Root and Administrator Access in Linux and Windows (en) current
- 07:14, 29 October 2024 diff hist +3,660 N Hands-on: Gaining Root and Administrator Access in Linux and Windows (en) Created page with "=Privilege Escalation pada Ubuntu 24.04 Server Linux dan Windows 10= Privilege escalation adalah teknik yang digunakan untuk mendapatkan hak akses lebih tinggi dari yang dibe..."
- 07:14, 29 October 2024 diff hist -187 Hands-on: Menaikkan Privilege di Sistem Linux dan Windows current