Materi yang saya sampaikan pada cara Focus Group Discussion (FGD) BSSN mengenai peraturan Voluntary Vulnerability Disclosure Program (VVDP) milik BSSN, berkaitan dengan uji publik peraturan. Semoga bermanfaat
Materi yang saya sampaikan pada cara Focus Group Discussion (FGD) BSSN mengenai peraturan Voluntary Vulnerability Disclosure Program (VVDP) milik BSSN, berkaitan dengan uji publik peraturan. Semoga bermanfaat
Cybercrime: A threat to Financial industryAmmar WK
Cybercrime to Financial Services, aimed at taking over customer transactions and online banking sessions, also
attacks against the financial institutions
themselves.
Pemateri akan membahas tentang fenomena "bug bounty" di dunia keamanan, membahas juga
mengenai "0day" exploit yang menjadi senjata andalan para pelaku kejahatan siber sampai "APT actor",
dan mengajak bersama-sama untuk membahas apakah benar "bug bounty" dapat membendung dampak dari 0day exploit.
Nowadays, like the technology itself, hacking activities against mobile phone is growing very rapidly, both for mobile devices (operating system) or mobile applications, some applications providers even dedicate a penetration testing activity for applications that they created right before it gets released to the public, while others open a bug bounty programs, and sadly the rest just watch and do nothing.
On the other side, malware developer arround the world also already move their main target and has been developing malware to take over the mobile devices which surely keep all our personal/private and our work, some of it even make us to pay for getting it back.
This talks will be focusing more on the trend of mobile device security lately, mobile security penetration testing activity, also in practice, showing several types of common weaknesses/vulnerabiliies within the mobile applications and how the exploitation is done by the attacker, malware is created and planted, until it is successfully to take over the target mobile device.
The content:
1. Discuss about famous web attack vector
2. DVWA low security level walkthrough
3. Web Application Security Tools, nikto and nmap
4. Burp Suite Usage