SlideShare a Scribd company logo
Fools your enemy with Mikrotik
BY: DIDIET KUSUMADIHARDJA
MIKROTIK USER MEETING (MUM) 2016
JAKARTA, INDONESIA
14 OCTOBER 2016
About Me
Didiet Kusumadihardja
1. IT Security Specialist
 PT. Mitra Solusi Telematika
2. Trainer & IT Consultant
 Arch Networks
MTCNA, MTCINE, MTCWE, MTCUME, MTCTCE, MTCRE
Didiet Kusumadihardja - didiet@arch.web.id
2
PT. Mitra Solusi Telematika
Didiet Kusumadihardja - didiet@arch.web.id
3
Gedung TMT 2. GF
Jl. Cilandak KKO
Jakarta
Global
IT Security
Incident
Didiet Kusumadihardja - didiet@arch.web.id
4
Global IT Security Incident 2014
Didiet Kusumadihardja - didiet@arch.web.id
5
Entire Network Canceled
Global IT Security Incident 2015
Didiet Kusumadihardja - didiet@arch.web.id
6
3 Tahun di Hack ( 2012 – 2015)
Global IT Security Incident 2016
Didiet Kusumadihardja - didiet@arch.web.id
7
500 Juta Account
3 Miliar Account ???
Source: Tech Times
Indonesia
IT Security
Incident
Didiet Kusumadihardja - didiet@arch.web.id
8
Didiet Kusumadihardja - didiet@arch.web.id
9
Source: Akamai
INDONESIA
IS
SAFE?
Indonesia IT Security Incident 2013
Didiet Kusumadihardja - didiet@arch.web.id
10
polri.go.id
2013
Deface
Motive: Fame?
Indonesia IT Security Incident 2016
Didiet Kusumadihardja - didiet@arch.web.id
11
Teman Ahok
DDoS Attack
Motive: Politics?
Indonesia IT Security Incident 2016
Didiet Kusumadihardja - didiet@arch.web.id
12
Videotron
Kebayoran Baru
Jakarta Selatan
Motive: Curiosity?
Source: Carnegie Mellon UniversityDidiet Kusumadihardja - didiet@arch.web.id
13
IT Security
Trends
Gak Perlu
Pinter Buat
Hacking
Hacking Tools Example
Didiet Kusumadihardja - didiet@arch.web.id
14
Cain & Abel
Kali Linux
Didiet Kusumadihardja - didiet@arch.web.id
15
Source: SCMagazine
Modern Business
Cybercrime as
a Service (CaaS)
How Hackers
do it?
Didiet Kusumadihardja - didiet@arch.web.id
16
Hacking Phase
1.Reconnaissance
2.Scanning
3.Gaining Access
4.Maintaining Access
5.Clearing Tracks
Source: Ethical Hacking by EC-CouncilDidiet Kusumadihardja - didiet@arch.web.id
17
Hacking Phase (Cont’d)
1.Reconnaissance
2.Scanning
3.Gaining Access
4.Maintaining Access
5.Clearing Tracks
Information Gathering
OS Detail Open Port
Version
Device Type
Application Vulnerability
Exploit Vulnerability
Escalate Privilege
Backdoors
Delete/overwrite Event/Logs
Data harvesting
Didiet Kusumadihardja - didiet@arch.web.id
18
Hacking Phase Analogy
1.Reconnaissance
2.Scanning
3.Gaining Access
4.Maintaining Access
5.Clearing Tracks
Didiet Kusumadihardja - didiet@arch.web.id
19
When we fools them?
1.Reconnaissance
2.Scanning
3.Gaining Access
4.Maintaining Access
5.Clearing Tracks
Didiet Kusumadihardja - didiet@arch.web.id
20
Why at Scanning Phase?
Didiet Kusumadihardja - didiet@arch.web.id
21
TELNET SSH
Scanning Tools
SoftPerfect Network Scanner
The Dude
Didiet Kusumadihardja - didiet@arch.web.id
22
How to fools
them?
Didiet Kusumadihardja - didiet@arch.web.id
23
Use a bait
Didiet Kusumadihardja - didiet@arch.web.id
24
Honey Pot
Hacker
Bait
Web Server Example
Web Server
HTTP HTTPS
=
Didiet Kusumadihardja - didiet@arch.web.id
25
Confuse your enemy
Didiet Kusumadihardja - didiet@arch.web.id
26
HTTP HTTPS
Server Farm Network Example
192.168.1.2  DNS Server
192.168.1.5  Web Server
192.168.1.10  DB Server
192.168.1.15  Mail Server
SERVER X
Didiet Kusumadihardja - didiet@arch.web.id
27
192.168.1.0/24
Confuse your enemy
192.168.1.1  Fake Server 1
192.168.1.2  DNS Server
192.168.1.3  Fake Server 2
192.168.1.4  Fake Server 3
192.168.1.5  Web Server
192.168.1.6  Fake Server 4
192.168.1.7  Fake Server 5
192.168.1.8  Fake Server 6
192.168.1.9  Fake Server 7
192.168.1.10  DB Server
192.168.1.11  Fake Server 8
192.168.1.12  Fake Server 9
192.168.1.13  Fake Server 10
192.168.1.14  Fake Server 11
192.168.1.15  Mail Server
Didiet Kusumadihardja - didiet@arch.web.id
28
192.168.1.0/24
How we do it with
Mikrotik?
Didiet Kusumadihardja - didiet@arch.web.id
29
NAT
(Network Address Translation)
Didiet Kusumadihardja - didiet@arch.web.id
30
Fake NAT
Didiet Kusumadihardja - didiet@arch.web.id
31
Fake Ports at your Web Server
HTTP & HTTPS to
Legitimate Server
Other Ports to
Fake Server
Didiet Kusumadihardja - didiet@arch.web.id
32
Simple NAT for Web Server
INTERNET
ROUTER WEB SERVER
192.168.2.3
Chain Action
NAT (Port Mapping)
Didiet Kusumadihardja - didiet@arch.web.id
33
Add Additional NAT for Bait
Web Server
192.168.2.3 Fake Server
(Honey Pot)
192.168.2.4
Didiet Kusumadihardja - didiet@arch.web.id
34
Chain Action
Fake Server at your Server Farm Network
Only one legitimate
server
Others are Fake Server
Didiet Kusumadihardja - didiet@arch.web.id
35
Another Example
Web Server
192.168.2.3
Fake Server
(Honey Pot)
192.168.2.4
Didiet Kusumadihardja - didiet@arch.web.id
36
Chain Action
Combine with Honey Pot
Didiet Kusumadihardja - didiet@arch.web.id
37
KFSensor
Others HoneyPot: Honeyd, Kippo, Dionaea, Nepenthes
What Hacker See (NMAP)
Before After
Didiet Kusumadihardja - didiet@arch.web.id
38
Nmap / Zenmap
What Hacker See (SoftPerfect NetScan)
Before After
Didiet Kusumadihardja - didiet@arch.web.id
39
SoftPerfect Network Scanner
I don’t want to use HoneyPot
Didiet Kusumadihardja - didiet@arch.web.id
40
Step 1: Chain
Step 2: Action
What we see, If someone PING
Didiet Kusumadihardja - didiet@arch.web.id
41
SRC-MAC ADDRESS
SRC-IP ADDRESS
What we see, If someone NMAP
Didiet Kusumadihardja - didiet@arch.web.id
42
Mikrotik LOG:
The Dude, Hotspot & Userman
Didiet Kusumadihardja - didiet@arch.web.id
43
IP Address  MAC Address  User ID  Person
Use Case 1
Didiet Kusumadihardja - didiet@arch.web.id
44
Internet Café
(WARNET)
University
Office
Insider Threat
Use Case 2
Didiet Kusumadihardja - didiet@arch.web.id
45
Analytics
For Fun
Learn hacking method
from hacker / script kiddies
Research
http://public.honeynet.id
(Low Interaction Honeypot)
(High Interaction Honeypot)
Thank you
.
.
Question?
DIDIET
KUSUMADIHARDJA
didiet@arch.web.id
http://didiet.arch.web.id/
https://www.facebook.com/ArchNetID/
Didiet Kusumadihardja - didiet@arch.web.id
46

More Related Content

What's hot

BGP on mikrotik
BGP on mikrotikBGP on mikrotik
BGP on mikrotik
Achmad Mardiansyah
 
Mikrotik Hotspot
Mikrotik HotspotMikrotik Hotspot
Mikrotik Hotspot
GLC Networks
 
Lab- Full IPsec Implementation.pdf
Lab- Full IPsec Implementation.pdfLab- Full IPsec Implementation.pdf
Lab- Full IPsec Implementation.pdf
Nesibusami
 
Routing fundamentals with mikrotik
Routing fundamentals with mikrotikRouting fundamentals with mikrotik
Routing fundamentals with mikrotik
Achmad Mardiansyah
 
MUM Melbourne : Build Enterprise Wireless with CAPsMAN
MUM Melbourne : Build Enterprise Wireless with CAPsMANMUM Melbourne : Build Enterprise Wireless with CAPsMAN
MUM Melbourne : Build Enterprise Wireless with CAPsMAN
GLC Networks
 
MikroTik MTCNA
MikroTik MTCNAMikroTik MTCNA
MikroTik MTCNA
Ali Layth
 
Mikrotik firewall raw table
Mikrotik firewall raw tableMikrotik firewall raw table
Mikrotik firewall raw table
Achmad Mardiansyah
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
MohamedJafar5
 
Mikrotik ppt
Mikrotik pptMikrotik ppt
Mikrotik ppt
044249
 
VLAN on mikrotik
VLAN on mikrotikVLAN on mikrotik
VLAN on mikrotik
Achmad Mardiansyah
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2
Yaser Rahmati
 
Using mikrotik with radius
Using mikrotik with radiusUsing mikrotik with radius
Using mikrotik with radius
Achmad Mardiansyah
 
HOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterHOTSPOT on MikroTik Router
HOTSPOT on MikroTik Router
KHNOG
 
Cisco packet tracer dhcp
Cisco packet tracer   dhcpCisco packet tracer   dhcp
Cisco packet tracer dhcp
rishi ram khanal
 
ISP load balancing with mikrotik nth
ISP load balancing with mikrotik nthISP load balancing with mikrotik nth
ISP load balancing with mikrotik nth
Achmad Mardiansyah
 
BGP tuning: Peer with loopback
BGP tuning: Peer with loopbackBGP tuning: Peer with loopback
BGP tuning: Peer with loopback
GLC Networks
 
OpeVPN on Mikrotik
OpeVPN on MikrotikOpeVPN on Mikrotik
OpeVPN on Mikrotik
GLC Networks
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
Mikrotik fastpath
Mikrotik fastpathMikrotik fastpath
Mikrotik fastpath
Achmad Mardiansyah
 
Basic command to configure mikrotik
Basic command to configure mikrotikBasic command to configure mikrotik
Basic command to configure mikrotik
Tola LENG
 

What's hot (20)

BGP on mikrotik
BGP on mikrotikBGP on mikrotik
BGP on mikrotik
 
Mikrotik Hotspot
Mikrotik HotspotMikrotik Hotspot
Mikrotik Hotspot
 
Lab- Full IPsec Implementation.pdf
Lab- Full IPsec Implementation.pdfLab- Full IPsec Implementation.pdf
Lab- Full IPsec Implementation.pdf
 
Routing fundamentals with mikrotik
Routing fundamentals with mikrotikRouting fundamentals with mikrotik
Routing fundamentals with mikrotik
 
MUM Melbourne : Build Enterprise Wireless with CAPsMAN
MUM Melbourne : Build Enterprise Wireless with CAPsMANMUM Melbourne : Build Enterprise Wireless with CAPsMAN
MUM Melbourne : Build Enterprise Wireless with CAPsMAN
 
MikroTik MTCNA
MikroTik MTCNAMikroTik MTCNA
MikroTik MTCNA
 
Mikrotik firewall raw table
Mikrotik firewall raw tableMikrotik firewall raw table
Mikrotik firewall raw table
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
 
Mikrotik ppt
Mikrotik pptMikrotik ppt
Mikrotik ppt
 
VLAN on mikrotik
VLAN on mikrotikVLAN on mikrotik
VLAN on mikrotik
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2
 
Using mikrotik with radius
Using mikrotik with radiusUsing mikrotik with radius
Using mikrotik with radius
 
HOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterHOTSPOT on MikroTik Router
HOTSPOT on MikroTik Router
 
Cisco packet tracer dhcp
Cisco packet tracer   dhcpCisco packet tracer   dhcp
Cisco packet tracer dhcp
 
ISP load balancing with mikrotik nth
ISP load balancing with mikrotik nthISP load balancing with mikrotik nth
ISP load balancing with mikrotik nth
 
BGP tuning: Peer with loopback
BGP tuning: Peer with loopbackBGP tuning: Peer with loopback
BGP tuning: Peer with loopback
 
OpeVPN on Mikrotik
OpeVPN on MikrotikOpeVPN on Mikrotik
OpeVPN on Mikrotik
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Mikrotik fastpath
Mikrotik fastpathMikrotik fastpath
Mikrotik fastpath
 
Basic command to configure mikrotik
Basic command to configure mikrotikBasic command to configure mikrotik
Basic command to configure mikrotik
 

Viewers also liked

CAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTikCAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTik
Dobri Boyadzhiev
 
Detecting network virus using mikrotik
Detecting network virus using mikrotikDetecting network virus using mikrotik
Detecting network virus using mikrotik
Achmad Mardiansyah
 
Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)Rofiq Fauzi
 
Wireless Project Using CAPsMAN
Wireless Project Using CAPsMANWireless Project Using CAPsMAN
Wireless Project Using CAPsMANAidan Venn MSc
 
MUM Madrid 2016 - Mikrotik y Suricata
MUM Madrid 2016 - Mikrotik y SuricataMUM Madrid 2016 - Mikrotik y Suricata
MUM Madrid 2016 - Mikrotik y Suricata
Fajar Nugroho
 
Hotspot on Mikrotik Router
Hotspot on Mikrotik RouterHotspot on Mikrotik Router
Hotspot on Mikrotik Router
KHNOG
 
Mikrotik Hotspot User Manager
Mikrotik Hotspot User ManagerMikrotik Hotspot User Manager
Mikrotik Hotspot User Manager
KHNOG
 
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
Rofiq Fauzi
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
Rofiq Fauzi
 
(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN
Andry Ansah
 
MikroTik BGP Security - MUM 2014 (rofiq fauzi)
MikroTik BGP Security - MUM 2014 (rofiq fauzi)MikroTik BGP Security - MUM 2014 (rofiq fauzi)
MikroTik BGP Security - MUM 2014 (rofiq fauzi)
Rofiq Fauzi
 
Trabajo Practico Nº 1.IFTS Nº1.
Trabajo Practico Nº 1.IFTS Nº1.Trabajo Practico Nº 1.IFTS Nº1.
Trabajo Practico Nº 1.IFTS Nº1.
CELESTE UCCI
 
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Lorenzo Busatti
 
Gerência fácil com RoMON
Gerência fácil com RoMONGerência fácil com RoMON
Gerência fácil com RoMON
Pietro Scherer
 
AfterGlow
AfterGlowAfterGlow
AfterGlow
Raffael Marty
 
Mikrotik
MikrotikMikrotik
Mikrotik
Michał Ruta
 
Microsoft Office356 - prezentacja mozliwosci
Microsoft Office356 - prezentacja mozliwosciMicrosoft Office356 - prezentacja mozliwosci
Microsoft Office356 - prezentacja mozliwosci
Michał Ruta
 
mikrotik
mikrotikmikrotik
mikrotik
dewi aulia
 
Choosing MikroTik for Your Network
Choosing MikroTik for Your NetworkChoosing MikroTik for Your Network
Choosing MikroTik for Your Network
Faisal Reza
 
Presentation DHCP Server
Presentation DHCP ServerPresentation DHCP Server
Presentation DHCP Server
Andry Ansah
 

Viewers also liked (20)

CAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTikCAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTik
 
Detecting network virus using mikrotik
Detecting network virus using mikrotikDetecting network virus using mikrotik
Detecting network virus using mikrotik
 
Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)Mikrotik Network Simulator (MUM Presentation Material 2013)
Mikrotik Network Simulator (MUM Presentation Material 2013)
 
Wireless Project Using CAPsMAN
Wireless Project Using CAPsMANWireless Project Using CAPsMAN
Wireless Project Using CAPsMAN
 
MUM Madrid 2016 - Mikrotik y Suricata
MUM Madrid 2016 - Mikrotik y SuricataMUM Madrid 2016 - Mikrotik y Suricata
MUM Madrid 2016 - Mikrotik y Suricata
 
Hotspot on Mikrotik Router
Hotspot on Mikrotik RouterHotspot on Mikrotik Router
Hotspot on Mikrotik Router
 
Mikrotik Hotspot User Manager
Mikrotik Hotspot User ManagerMikrotik Hotspot User Manager
Mikrotik Hotspot User Manager
 
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
MikroTik Hotspot 2.0 (IEEE 802.11u) - MUM Jakarta 2016
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
 
(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN
 
MikroTik BGP Security - MUM 2014 (rofiq fauzi)
MikroTik BGP Security - MUM 2014 (rofiq fauzi)MikroTik BGP Security - MUM 2014 (rofiq fauzi)
MikroTik BGP Security - MUM 2014 (rofiq fauzi)
 
Trabajo Practico Nº 1.IFTS Nº1.
Trabajo Practico Nº 1.IFTS Nº1.Trabajo Practico Nº 1.IFTS Nº1.
Trabajo Practico Nº 1.IFTS Nº1.
 
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
 
Gerência fácil com RoMON
Gerência fácil com RoMONGerência fácil com RoMON
Gerência fácil com RoMON
 
AfterGlow
AfterGlowAfterGlow
AfterGlow
 
Mikrotik
MikrotikMikrotik
Mikrotik
 
Microsoft Office356 - prezentacja mozliwosci
Microsoft Office356 - prezentacja mozliwosciMicrosoft Office356 - prezentacja mozliwosci
Microsoft Office356 - prezentacja mozliwosci
 
mikrotik
mikrotikmikrotik
mikrotik
 
Choosing MikroTik for Your Network
Choosing MikroTik for Your NetworkChoosing MikroTik for Your Network
Choosing MikroTik for Your Network
 
Presentation DHCP Server
Presentation DHCP ServerPresentation DHCP Server
Presentation DHCP Server
 

Similar to Fools your enemy with MikroTik

Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
ThousandEyes
 
Access RouterOS using Multi-Factor Authentication
Access RouterOS using Multi-Factor AuthenticationAccess RouterOS using Multi-Factor Authentication
Access RouterOS using Multi-Factor Authentication
Didiet Kusumadihardja
 
BRKSEC-2288.pdf
BRKSEC-2288.pdfBRKSEC-2288.pdf
BRKSEC-2288.pdf
HaitamSouissi1
 
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
Saurabh Chauhan
 
Introduction To ThousandEyes
Introduction To ThousandEyesIntroduction To ThousandEyes
Introduction To ThousandEyes
ThousandEyes
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Lietuvos kompiuterininkų sąjunga
 
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceOptimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
ThousandEyes
 
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceEMEA Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
ThousandEyes
 
December Patch Tuesday 2020
December Patch Tuesday 2020December Patch Tuesday 2020
December Patch Tuesday 2020
Ivanti
 
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceOptimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
ThousandEyes
 
Advanced Security on Kubernetes with Istio
Advanced Security on Kubernetes with IstioAdvanced Security on Kubernetes with Istio
Advanced Security on Kubernetes with Istio
Shunsuke Miyoshi
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat Security Conference
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
Tiago Monteiro
 
Cisco @ Conference Board of Canada: Connecting Education with the 21st century
Cisco @ Conference Board of Canada: Connecting Education with the 21st centuryCisco @ Conference Board of Canada: Connecting Education with the 21st century
Cisco @ Conference Board of Canada: Connecting Education with the 21st century
Marc Lijour, OCT, BSc, MBA
 
Andrea Zwirner - Magento security and hardening strategies
Andrea Zwirner - Magento security and hardening strategiesAndrea Zwirner - Magento security and hardening strategies
Andrea Zwirner - Magento security and hardening strategies
Meet Magento Italy
 
UTHAYAKUMAR RESUME
UTHAYAKUMAR RESUMEUTHAYAKUMAR RESUME
UTHAYAKUMAR RESUMEUthaya Kumar
 
Patch Tuesday for January 2020
Patch Tuesday for January 2020Patch Tuesday for January 2020
Patch Tuesday for January 2020
Ivanti
 

Similar to Fools your enemy with MikroTik (20)

Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Access RouterOS using Multi-Factor Authentication
Access RouterOS using Multi-Factor AuthenticationAccess RouterOS using Multi-Factor Authentication
Access RouterOS using Multi-Factor Authentication
 
BRKSEC-2288.pdf
BRKSEC-2288.pdfBRKSEC-2288.pdf
BRKSEC-2288.pdf
 
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
 
Introduction To ThousandEyes
Introduction To ThousandEyesIntroduction To ThousandEyes
Introduction To ThousandEyes
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
 
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceOptimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
 
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceEMEA Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
 
December Patch Tuesday 2020
December Patch Tuesday 2020December Patch Tuesday 2020
December Patch Tuesday 2020
 
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceOptimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
 
Ketan H Murudkar
Ketan H MurudkarKetan H Murudkar
Ketan H Murudkar
 
Advanced Security on Kubernetes with Istio
Advanced Security on Kubernetes with IstioAdvanced Security on Kubernetes with Istio
Advanced Security on Kubernetes with Istio
 
Thamim
ThamimThamim
Thamim
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
Cisco @ Conference Board of Canada: Connecting Education with the 21st century
Cisco @ Conference Board of Canada: Connecting Education with the 21st centuryCisco @ Conference Board of Canada: Connecting Education with the 21st century
Cisco @ Conference Board of Canada: Connecting Education with the 21st century
 
CV_Nitin
CV_NitinCV_Nitin
CV_Nitin
 
Andrea Zwirner - Magento security and hardening strategies
Andrea Zwirner - Magento security and hardening strategiesAndrea Zwirner - Magento security and hardening strategies
Andrea Zwirner - Magento security and hardening strategies
 
UTHAYAKUMAR RESUME
UTHAYAKUMAR RESUMEUTHAYAKUMAR RESUME
UTHAYAKUMAR RESUME
 
Patch Tuesday for January 2020
Patch Tuesday for January 2020Patch Tuesday for January 2020
Patch Tuesday for January 2020
 

More from Didiet Kusumadihardja

Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
Didiet Kusumadihardja
 
Manajemen wireless rogue
Manajemen wireless rogueManajemen wireless rogue
Manajemen wireless rogue
Didiet Kusumadihardja
 
Personally identifiable information
Personally identifiable informationPersonally identifiable information
Personally identifiable information
Didiet Kusumadihardja
 
Adequate password policy
Adequate password policyAdequate password policy
Adequate password policy
Didiet Kusumadihardja
 
Notifikasi penggunaan sistem
Notifikasi penggunaan sistemNotifikasi penggunaan sistem
Notifikasi penggunaan sistem
Didiet Kusumadihardja
 
Didiet Cyber Security Consultant Portfolio - Bahasa Indonesia
Didiet Cyber Security Consultant Portfolio - Bahasa IndonesiaDidiet Cyber Security Consultant Portfolio - Bahasa Indonesia
Didiet Cyber Security Consultant Portfolio - Bahasa Indonesia
Didiet Kusumadihardja
 

More from Didiet Kusumadihardja (6)

Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
Manajemen wireless rogue
Manajemen wireless rogueManajemen wireless rogue
Manajemen wireless rogue
 
Personally identifiable information
Personally identifiable informationPersonally identifiable information
Personally identifiable information
 
Adequate password policy
Adequate password policyAdequate password policy
Adequate password policy
 
Notifikasi penggunaan sistem
Notifikasi penggunaan sistemNotifikasi penggunaan sistem
Notifikasi penggunaan sistem
 
Didiet Cyber Security Consultant Portfolio - Bahasa Indonesia
Didiet Cyber Security Consultant Portfolio - Bahasa IndonesiaDidiet Cyber Security Consultant Portfolio - Bahasa Indonesia
Didiet Cyber Security Consultant Portfolio - Bahasa Indonesia
 

Recently uploaded

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 

Recently uploaded (20)

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 

Fools your enemy with MikroTik

Editor's Notes

  1. GREETINGS!