Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

Generating the responses

on

  • 913 views

k1m0ch1 - Ebanking: Generating The Responses

k1m0ch1 - Ebanking: Generating The Responses

Statistics

Views

Total Views
913
Views on SlideShare
895
Embed Views
18

Actions

Likes
0
Downloads
85
Comments
0

2 Embeds 18

http://mirror2.ctf.2011.idsecconf.org 16
http://ijolabs.com 2

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Generating the responses Generating the responses Presentation Transcript

    • eBanking:     Genera,ng  The  Responses   by     k1m0ch1’s                                  Denpasar,  16  Oktober  2010  
    • Who  are  us  ?   •  k1mOch1  (    yahya.kimochi@gmail.com  )   •  Anton  hilman  (  anton@hack.my  )   10/15/10
    •   Sesuai Peraturan Bank Indonesia No. 9/15/PBI/ 2007 tentang penerapan manajemen resiko dalam penggunaan teknologi informasi oleh bank umum, maka diperlukan audit terhadap aplikasi perbankan untuk menjamin keamanan nasabah dalam melakukan kegiatan perbankan.   “Security Token” sebagai pengaman tambahan bagi aplikasi perbankan, terutama bagi aplikasi transaksi finansial.
    • Menurut  wikipedia,  bentuk  dari  Security  Token  diantaranya  adalah  :    
    • Prinsip  dari  Mobile  Token  
    • “Two  Factor  Authentification  Security  Device”  
    • “Something  You  Know…     Something  You  Have…     Something  You  Are…”  
    • “Challengen  and  Response”     (C/R)  Mode  for  Authentification  
    •    Weak  Algorithm      Response  tidak  OTP      Easly  decompile  
    • Decompile  
    • Alternatif  Solusi  Pengamanan  
    • Obfuscated  Code  
    • Encrypted  Jar  or  Class     Use  a  tools  to  encrypt  jar  file     Easier    than  obfuscated        
    • Parameter  Setting  pada  Server