SlideShare a Scribd company logo
1 of 30
Download to read offline
DETEKSI SERANGAN SIBER BERBASIS MOBILE
HONEYPOT PADA AKSES POINT AREA PUBLIK DALAM
UPAYA PENINGKATAN PUBLIC SECURITY AWARENESS
Claudia Dwi Amanda, S.ST., M.M.Han
OUTLINE
Background
Related Works
Hostage vs Honeymob
Implementation Scenario
Result
Conclusion
CURRENT CYBERSECURITY THREAT
CURRENT CYBERSECURITY CHALLENGE
CYBER ATTACK TREND
DURING COVID-19
HONEYPOT
baiting a trap for hackers. System that’s intended to attract
cyberattacks, like a decoy. It mimics a target for hackers,
and uses their intrusion attempts to gain information about
cybercriminals and the way they are operating or to
distract them from other targets
Source: Kaspersky
ANNUAL REPORT HONEYNET
BSSN-IHP 2019
BANK DATA MALWARE
SECURED WIFI VS UNSECURED WIFI
Source: https://www.ibsscorp.com
ATTACK ON WIFI
FEATURE
• Overview
• Threat Map
• Records
• Statistics
• Services
HONEYMOB V1
• Honeymob merupakan aplikasi Android yang dibuat dan
dikembangkan menggunakan engine dasar HosTaGe.
• Perbedaannya terdapat pada pengembangan fitur :
• modifikasi pada sisi GUI
• menambahkan fitur koneksi dengan portal publik Honeynet BSSN
• menambahkan fitur log browser monitoring
• menambahkan fitur Honeyhelp
• menambahkan fitur log parsing
GUI MODIFICATION
INTEGRATED WITH PUBLIC
PORTAL OF HONEYNET
PROJECT
LOG MONITORING
BROWSING
CONNECTED WITH
HONEYHELP VA
IMPLEMENTATION SCENARIO
RESULT
RESULT
No
.
Lokasi
Jumlah
Serangan
Jumlah Alamat
IP Penyerang
1.
Starbucks Bintaro
8 6
2.
Starbucks Sentul
9 2
3.
KFC Pondok Indah
4 2
4.
KFC Margonda Depok
5 2
5.
Starbucks Margo City
Depok
4 1
6.
Garuda Lounge
Tangerang
- -
No. Lokasi Tipe Serangan
1.
Starbucks Bintaro
SMB, Port scan dan Multistage
2.
Starbucks Sentul
SMB, Port scan, dan Multistage
3.
KFC Pondok Indah
SMB, Port scan dan GHOST
4.
KFC Margonda Depok
Port scan dan Multistage
5.
Starbucks Margo City
Depok
Port scan dan Multistage
6.
Garuda Lounge
Tangerang
Tidak ada serangan
TTP RANSOM:WIN32/NEMTY.D
(MICROSOFT)
Source: https://www.ibsscorp.com
CONCLUSION
• Koneksi menggunakan Wifi publik merupakan koneksi yang tidak aman
• Pengembangan Honeymob versi 1.0 dengan menggunakan engine dasar
HosTaGe berhasil dilakukan yaitu penambahan fitur integrasi dengan portal
Honeynet BSSN, monitoring log browsing, log parsing, serta koneksi ke
Honeyhelp Virtual Assistant
• Fitur log browsing memiliki kaitan yang erat dengan penguatan hasil deteksi
serangan siber
• Secara umum tipe serangan yang terdeteksi menggunakan mobile
honeypot yaitu SMB, Port scan, Multistage, dan GHOST
WHAT SHOULD WE DO?
• Masyarakat diharapkan dapat meningkatkan security awareness ketika
menggunakan akses Wifi publik di tempat umum.
• Bentuk security awareness yang dapat dilakukan antara lain tidak membuka
link yang mencurigakan (melalui email, iklan, maupun website)
• Mengunduh aplikasi/dokumen hanya dari sumber terpercaya
• Menggunakan password yang sesuai dengan kriteria strong password
• Menutup port yang tidak digunakan
Deteksi Serangan Siber Berbasis Mobile Honeypot

More Related Content

What's hot

Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics IntroJake K.
 
Cyber Threat Hunting - Hunting in Memory at Scale
Cyber Threat Hunting - Hunting in Memory at ScaleCyber Threat Hunting - Hunting in Memory at Scale
Cyber Threat Hunting - Hunting in Memory at ScaleInfocyte
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source IntelligenceOsama Ellahi
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning Viren Rao
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsSergey Soldatov
 
Vectra Concept Overview
Vectra Concept OverviewVectra Concept Overview
Vectra Concept OverviewIlya O
 
Trusts You Might Have Missed
Trusts You Might Have MissedTrusts You Might Have Missed
Trusts You Might Have MissedWill Schroeder
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Борьба с фишингом. Пошаговая инструкция
Борьба с фишингом. Пошаговая инструкцияБорьба с фишингом. Пошаговая инструкция
Борьба с фишингом. Пошаговая инструкцияAleksey Lukatskiy
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)Molfar
 
44CON London 2015: NTFS Analysis with PowerForensics
44CON London 2015: NTFS Analysis with PowerForensics44CON London 2015: NTFS Analysis with PowerForensics
44CON London 2015: NTFS Analysis with PowerForensicsJared Atkinson
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)david rom
 
Intruders
IntrudersIntruders
Intruderstechn
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceZaiffiEhsan
 
Network packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisNetwork packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisManjushree Mashal
 

What's hot (20)

Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Cyber Threat Hunting - Hunting in Memory at Scale
Cyber Threat Hunting - Hunting in Memory at ScaleCyber Threat Hunting - Hunting in Memory at Scale
Cyber Threat Hunting - Hunting in Memory at Scale
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
 
Vectra Concept Overview
Vectra Concept OverviewVectra Concept Overview
Vectra Concept Overview
 
VLSM & SUPERNETTING
VLSM & SUPERNETTINGVLSM & SUPERNETTING
VLSM & SUPERNETTING
 
Trusts You Might Have Missed
Trusts You Might Have MissedTrusts You Might Have Missed
Trusts You Might Have Missed
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Борьба с фишингом. Пошаговая инструкция
Борьба с фишингом. Пошаговая инструкцияБорьба с фишингом. Пошаговая инструкция
Борьба с фишингом. Пошаговая инструкция
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)
 
44CON London 2015: NTFS Analysis with PowerForensics
44CON London 2015: NTFS Analysis with PowerForensics44CON London 2015: NTFS Analysis with PowerForensics
44CON London 2015: NTFS Analysis with PowerForensics
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
Intruders
IntrudersIntruders
Intruders
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Network packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisNetwork packet analysis -capture and Analysis
Network packet analysis -capture and Analysis
 

Similar to Deteksi Serangan Siber Berbasis Mobile Honeypot

“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBERIGN MANTRA
 
Seminar CYBER DEFENCE UNSOED 21 September 2014
Seminar CYBER DEFENCE UNSOED 21 September 2014Seminar CYBER DEFENCE UNSOED 21 September 2014
Seminar CYBER DEFENCE UNSOED 21 September 2014IGN MANTRA
 
Pengantar Mobile Security
Pengantar Mobile Security Pengantar Mobile Security
Pengantar Mobile Security zakiakhmad
 
kemampuan dan keamanan digital ASN.pdf
kemampuan dan keamanan digital ASN.pdfkemampuan dan keamanan digital ASN.pdf
kemampuan dan keamanan digital ASN.pdfEkaSPratama1
 
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...IGN MANTRA
 
Seminar UBIDAR Palembang 20 June 2014
Seminar UBIDAR Palembang 20 June 2014Seminar UBIDAR Palembang 20 June 2014
Seminar UBIDAR Palembang 20 June 2014IGN MANTRA
 
KSN - Statistik Malware
KSN - Statistik MalwareKSN - Statistik Malware
KSN - Statistik MalwareBayu Radityo
 
Cybertooth voip sebagai_aplikasi_pengamanan komunikasi suara era digital pada...
Cybertooth voip sebagai_aplikasi_pengamanan komunikasi suara era digital pada...Cybertooth voip sebagai_aplikasi_pengamanan komunikasi suara era digital pada...
Cybertooth voip sebagai_aplikasi_pengamanan komunikasi suara era digital pada...idsecconf
 
Seri buku literasi digital- kerangka literasi digital indonesia
Seri buku literasi digital- kerangka literasi digital indonesiaSeri buku literasi digital- kerangka literasi digital indonesia
Seri buku literasi digital- kerangka literasi digital indonesialiterasi digital
 
2018 11-12 acad-csirt updated cyber security pemda bssn
2018 11-12 acad-csirt updated cyber security pemda bssn2018 11-12 acad-csirt updated cyber security pemda bssn
2018 11-12 acad-csirt updated cyber security pemda bssnIGN MANTRA
 
Securing Your Smartphone (For Common User) - Kristian Ibrahim, Aisyah Amelia
Securing Your Smartphone (For Common User) - Kristian Ibrahim, Aisyah AmeliaSecuring Your Smartphone (For Common User) - Kristian Ibrahim, Aisyah Amelia
Securing Your Smartphone (For Common User) - Kristian Ibrahim, Aisyah Ameliaidsecconf
 
PENGELOLA DATA DIGITAL MATERI SMK .pptx
PENGELOLA DATA DIGITAL MATERI SMK  .pptxPENGELOLA DATA DIGITAL MATERI SMK  .pptx
PENGELOLA DATA DIGITAL MATERI SMK .pptxyerigoper1
 
MAKALAH CYBER ESIPONAGE.pdf
MAKALAH CYBER ESIPONAGE.pdfMAKALAH CYBER ESIPONAGE.pdf
MAKALAH CYBER ESIPONAGE.pdfDaffa Aslam
 
ADINDA FAISA KAMILA 8B KEAMANAN DATA.pptx
ADINDA FAISA KAMILA 8B KEAMANAN DATA.pptxADINDA FAISA KAMILA 8B KEAMANAN DATA.pptx
ADINDA FAISA KAMILA 8B KEAMANAN DATA.pptxssuser0d6489
 
Forensic-Cyber War.pdf
Forensic-Cyber War.pdfForensic-Cyber War.pdf
Forensic-Cyber War.pdfyogiswara11
 
Siberpedia | Panduan Pintar Keamanan Siber
Siberpedia | Panduan Pintar Keamanan SiberSiberpedia | Panduan Pintar Keamanan Siber
Siberpedia | Panduan Pintar Keamanan SiberGeri Sugiran Abdul Sukur
 
Purwarupa forensik BBM di telepon selular android mengunakan IGN-SDK - Dedi H...
Purwarupa forensik BBM di telepon selular android mengunakan IGN-SDK - Dedi H...Purwarupa forensik BBM di telepon selular android mengunakan IGN-SDK - Dedi H...
Purwarupa forensik BBM di telepon selular android mengunakan IGN-SDK - Dedi H...idsecconf
 

Similar to Deteksi Serangan Siber Berbasis Mobile Honeypot (20)

“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
 
Seminar CYBER DEFENCE UNSOED 21 September 2014
Seminar CYBER DEFENCE UNSOED 21 September 2014Seminar CYBER DEFENCE UNSOED 21 September 2014
Seminar CYBER DEFENCE UNSOED 21 September 2014
 
Pengantar Mobile Security
Pengantar Mobile Security Pengantar Mobile Security
Pengantar Mobile Security
 
kemampuan dan keamanan digital ASN.pdf
kemampuan dan keamanan digital ASN.pdfkemampuan dan keamanan digital ASN.pdf
kemampuan dan keamanan digital ASN.pdf
 
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...
2019 09-10 seminar cyber security acad csirt honeynet universitas indonesia s...
 
Seminar UBIDAR Palembang 20 June 2014
Seminar UBIDAR Palembang 20 June 2014Seminar UBIDAR Palembang 20 June 2014
Seminar UBIDAR Palembang 20 June 2014
 
KSN - Statistik Malware
KSN - Statistik MalwareKSN - Statistik Malware
KSN - Statistik Malware
 
Cybertooth voip sebagai_aplikasi_pengamanan komunikasi suara era digital pada...
Cybertooth voip sebagai_aplikasi_pengamanan komunikasi suara era digital pada...Cybertooth voip sebagai_aplikasi_pengamanan komunikasi suara era digital pada...
Cybertooth voip sebagai_aplikasi_pengamanan komunikasi suara era digital pada...
 
Seri buku literasi digital- kerangka literasi digital indonesia
Seri buku literasi digital- kerangka literasi digital indonesiaSeri buku literasi digital- kerangka literasi digital indonesia
Seri buku literasi digital- kerangka literasi digital indonesia
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made WiryawanDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
 
2018 11-12 acad-csirt updated cyber security pemda bssn
2018 11-12 acad-csirt updated cyber security pemda bssn2018 11-12 acad-csirt updated cyber security pemda bssn
2018 11-12 acad-csirt updated cyber security pemda bssn
 
Securing Your Smartphone (For Common User) - Kristian Ibrahim, Aisyah Amelia
Securing Your Smartphone (For Common User) - Kristian Ibrahim, Aisyah AmeliaSecuring Your Smartphone (For Common User) - Kristian Ibrahim, Aisyah Amelia
Securing Your Smartphone (For Common User) - Kristian Ibrahim, Aisyah Amelia
 
PENGELOLA DATA DIGITAL MATERI SMK .pptx
PENGELOLA DATA DIGITAL MATERI SMK  .pptxPENGELOLA DATA DIGITAL MATERI SMK  .pptx
PENGELOLA DATA DIGITAL MATERI SMK .pptx
 
MAKALAH CYBER ESIPONAGE.pdf
MAKALAH CYBER ESIPONAGE.pdfMAKALAH CYBER ESIPONAGE.pdf
MAKALAH CYBER ESIPONAGE.pdf
 
ADINDA FAISA KAMILA 8B KEAMANAN DATA.pptx
ADINDA FAISA KAMILA 8B KEAMANAN DATA.pptxADINDA FAISA KAMILA 8B KEAMANAN DATA.pptx
ADINDA FAISA KAMILA 8B KEAMANAN DATA.pptx
 
Makalah keamanan jaringan
Makalah keamanan jaringanMakalah keamanan jaringan
Makalah keamanan jaringan
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Forensic-Cyber War.pdf
Forensic-Cyber War.pdfForensic-Cyber War.pdf
Forensic-Cyber War.pdf
 
Siberpedia | Panduan Pintar Keamanan Siber
Siberpedia | Panduan Pintar Keamanan SiberSiberpedia | Panduan Pintar Keamanan Siber
Siberpedia | Panduan Pintar Keamanan Siber
 
Purwarupa forensik BBM di telepon selular android mengunakan IGN-SDK - Dedi H...
Purwarupa forensik BBM di telepon selular android mengunakan IGN-SDK - Dedi H...Purwarupa forensik BBM di telepon selular android mengunakan IGN-SDK - Dedi H...
Purwarupa forensik BBM di telepon selular android mengunakan IGN-SDK - Dedi H...
 

More from idsecconf

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfidsecconf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...idsecconf
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfidsecconf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...idsecconf
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfidsecconf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...idsecconf
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfidsecconf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...idsecconf
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidadaidsecconf
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullahidsecconf
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaidsecconf
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...idsecconf
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwiantoidsecconf
 

More from idsecconf (20)

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullah
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
 

Deteksi Serangan Siber Berbasis Mobile Honeypot