SlideShare a Scribd company logo
1 of 26
Download to read offline
NovizulEvendi
FO Techno-OS/T’Lab
a branch of computer technology known as information
security as applied to computers and networks
 Security by design
 Security architecture
 Hardware mechanisms that protect computers and data
 Secure operating systems
 Secure coding
 Capabilities and access control lists
computing
 Hacker (computersecurity) or cracker, who accesses a
computersystem by circumventing its security system
 Hacker (programmer subculture), who shares an anti-
authoritarian approach to software development now
associatedwith the free software movemen
 Hacker (hobbyist), who makes innovative customizations
or combinations of retail electronic and computer
equipment
 Skills
 Style
 Attitude
 Status
 Ethics
 Learn how to program
 Get one of the open-source Unixes and learn to use and
run it
 Learn how to use the World Wide Web
 If you don't have functional English, learn it!!
 The world is full of fascinating problems waiting to be
solved.
 No problem should ever have to be solved twice.
 Boredom and drudgery are evil.
 Freedom is good.
 Attitudeis no substitutefor competence.
 Write open-sourcesoftware
 Help test and debug open-source software
 Publish useful information
 Help keep the infrastructure working
 Serve the hacker culture itself
 Reconnaissance
hackersfirst perform routine and detailed reconnaissance.
Methods of reconnaissance include Dumpster Diving, Social
Engineering, Google Searching & Google Hacking, and work
their way up to more insidious methods such as infiltrating
youremployees environmentsfrom coffee shops to simply
walking in and setting up in a cubicle and asking a lot of
questions.
 Scanning
can reveal vulnerabilities that create a hit list, or triage
list, for hackers to work through.
Typically, hackers perform port scans and port mapping,
while attempting to discover what services and versions of
services are actively available on any open or available ports.
 Gaining Access
Open ports can lead to a hacker gaining direct access to
services and possibly to internal network connections.
Whether the hacker is successful attacking an internal
system has much to do with how vulnerable the specific
system is, which is related to system configurations and
architecture.
 Maintain Access
Hackers may choose to continue attacking and exploiting
the target system, or to explore deeper into the target
network and look for more systems and services
Hackers can continue to sniff your network looking for more
information to use againstyou.
 Covering Tracks
 Most hackers will attempt to cover their footprints and
tracks as carefully as possible.
Gaining root level access and administrative access is a big
part of covering one’s tracks as the hacker can remove log
entries and do so as a privileged administrator as opposed
to an unknown hacker.
 Attacking
 Sniffing
 Arp Spoofing
 DNS Spoofing
 Man In The Middle Attack
 Defend
 Tunelling
 Arp Static
Packet sniffer comes in two categories:
Active sniffers
Passive sniffers.
 Alice sends a message to Bob, which is intercepted by
Mallory:
Alice "Hi Bob, it's Alice. Give me your key"--> Mallory Bob
 Mallory relays this message to Bob; Bob cannot tell it is not
really from Alice:
Alice Mallory "Hi Bob, it's Alice. Give me your key"--> Bob
 Bob responds with his encryption key:
Alice Mallory <--[Bob's_key] Bob
 Mallory replaces Bob's key with her own, and relays this to
Alice, claiming that it is Bob's key:
Alice <--[Mallory's_key] Mallory Bob
 Alice encrypts a message with what she believes to be Bob's
key, thinking that only Bob can read it:
Alice "Meet me at the bus stop!"[encryptedwith Mallory's key]-->
Mallory Bob
Alive Bob
Mallory
 Attacking
 DDOS (Distributed Denial of Service Attacks)
 Defend
 Firewall/IDS
 Disableservices by default.
LOGICAL VIEW OF ATTACK NET
Attacker
Master
Victim
Slave SlaveSlave SlaveSlave
ControlTraffic
Attack Traffic
 Attacking
 Vulnerability
 Exploit
 Defend
 Firewall
 Path Software
 Close Service/Port If Not Use
 Attacking
 ByPass Pasword login
 Defend
 Lock Bios
 Disable other Bootable
 Attacking
 Session Hijacking
 Session Sidejacking
 Defend
 Don’t Use “Remeber me” While Login
 Tunelling (https/ssh)
TCP session hijackingis when
a hacker takes over a TCP
session between two
machines
 VirtualBOX
 Virtual Network
Only 2 Method for Configuration Netwroking Virtual
 Bridge
 Host-Only Adapter
N
Na
b
b
a
b
b
A = Real
B = Virtual
N = LAN
 Virtual OS for Attacker
 Attack From Linux OS
 Attack From Windows OS
Web : www.tlab.co.id
Mail: karuwak@tlab.co.id
Web : www.techno-os.net
Mail: karuwak@techno-os.net
Company
Community
karuwak@gmail.com
Virtualisasi Hacking

More Related Content

What's hot

Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentationMahmoud Ibra
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Securitydrkelleher
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]justin johnson
 
Bruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linxBruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linxidsecconf
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy stepsLee Toulouse
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenKlaus Drosch
 
Hardware key logger
Hardware key loggerHardware key logger
Hardware key loggerTamim1980
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKINGNAWAZ KHAN
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & KeyloggersJithin James
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Studysecurityxploded
 

What's hot (20)

Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Computer Ethics
Computer  EthicsComputer  Ethics
Computer Ethics
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Bruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linxBruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linx
 
Hacking
HackingHacking
Hacking
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy steps
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Hardware key logger
Hardware key loggerHardware key logger
Hardware key logger
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Password Attack
Password AttackPassword Attack
Password Attack
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & Keyloggers
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Study
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Backdoor
BackdoorBackdoor
Backdoor
 

Viewers also liked

Tk2273 -teknologi_virtualisasi Cloud Computing
Tk2273  -teknologi_virtualisasi Cloud ComputingTk2273  -teknologi_virtualisasi Cloud Computing
Tk2273 -teknologi_virtualisasi Cloud ComputingSyarif Maula
 
Wireless Hacking Fast Track
Wireless Hacking Fast TrackWireless Hacking Fast Track
Wireless Hacking Fast TrackNovizul Evendi
 
Information System Security
Information System SecurityInformation System Security
Information System SecurityNovizul Evendi
 
Outline course Backtrak Pentest
Outline course Backtrak PentestOutline course Backtrak Pentest
Outline course Backtrak PentestNovizul Evendi
 
Hacking Is Not Always a Crime
Hacking Is Not Always a CrimeHacking Is Not Always a Crime
Hacking Is Not Always a CrimeNovizul Evendi
 
Hacking Backtrak Mobile
Hacking Backtrak MobileHacking Backtrak Mobile
Hacking Backtrak MobileNovizul Evendi
 
Feed machinery catalogue
Feed machinery catalogueFeed machinery catalogue
Feed machinery catalogueRobert Wang
 
Data vs info
Data vs infoData vs info
Data vs infosklux
 
Honeycomb work samples
Honeycomb work samplesHoneycomb work samples
Honeycomb work samplesNoufel AN
 
Modul praktikum hardware dan software
Modul praktikum hardware dan softwareModul praktikum hardware dan software
Modul praktikum hardware dan softwarejoko2016
 
Sales Development: Necessities of Selling in the Cloud
Sales Development: Necessities of Selling in the CloudSales Development: Necessities of Selling in the Cloud
Sales Development: Necessities of Selling in the CloudIngram Micro Cloud
 
Selling the Cloud to Your C-Suite
Selling the Cloud to Your C-SuiteSelling the Cloud to Your C-Suite
Selling the Cloud to Your C-SuiteHostway|HOSTING
 

Viewers also liked (20)

Linux & Open Source
Linux & Open SourceLinux & Open Source
Linux & Open Source
 
virtualisasi
virtualisasivirtualisasi
virtualisasi
 
Tk2273 -teknologi_virtualisasi Cloud Computing
Tk2273  -teknologi_virtualisasi Cloud ComputingTk2273  -teknologi_virtualisasi Cloud Computing
Tk2273 -teknologi_virtualisasi Cloud Computing
 
Cloud Computing Services
Cloud Computing ServicesCloud Computing Services
Cloud Computing Services
 
Dialog Technoprener
Dialog Technoprener Dialog Technoprener
Dialog Technoprener
 
T'Lab
T'LabT'Lab
T'Lab
 
Wireless Hacking Fast Track
Wireless Hacking Fast TrackWireless Hacking Fast Track
Wireless Hacking Fast Track
 
E-commerce
E-commerceE-commerce
E-commerce
 
Information System Security
Information System SecurityInformation System Security
Information System Security
 
Outline course Backtrak Pentest
Outline course Backtrak PentestOutline course Backtrak Pentest
Outline course Backtrak Pentest
 
Small servers
Small serversSmall servers
Small servers
 
Hacking Is Not Always a Crime
Hacking Is Not Always a CrimeHacking Is Not Always a Crime
Hacking Is Not Always a Crime
 
Hacking Backtrak Mobile
Hacking Backtrak MobileHacking Backtrak Mobile
Hacking Backtrak Mobile
 
Feed machinery catalogue
Feed machinery catalogueFeed machinery catalogue
Feed machinery catalogue
 
Data vs info
Data vs infoData vs info
Data vs info
 
Honeycomb work samples
Honeycomb work samplesHoneycomb work samples
Honeycomb work samples
 
Modul praktikum hardware dan software
Modul praktikum hardware dan softwareModul praktikum hardware dan software
Modul praktikum hardware dan software
 
Sales Development: Necessities of Selling in the Cloud
Sales Development: Necessities of Selling in the CloudSales Development: Necessities of Selling in the Cloud
Sales Development: Necessities of Selling in the Cloud
 
Selling the Cloud to Your C-Suite
Selling the Cloud to Your C-SuiteSelling the Cloud to Your C-Suite
Selling the Cloud to Your C-Suite
 
Selling the Cloud
Selling the CloudSelling the Cloud
Selling the Cloud
 

Similar to Virtualisasi Hacking

Recognizing security threats
Recognizing security threatsRecognizing security threats
Recognizing security threatsKishore Kumar
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With GflixacademyGaurav Mishra
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 
Cyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITWCyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITWChanchalHiwanj1
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hackerbestip
 
Network Security
Network SecurityNetwork Security
Network Securityhj43us
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingsxkkjbzq2k
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTDHRUV562167
 
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault
 

Similar to Virtualisasi Hacking (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Recognizing security threats
Recognizing security threatsRecognizing security threats
Recognizing security threats
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Cyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITWCyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITW
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Internet security
Internet securityInternet security
Internet security
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Virtualisasi Hacking

  • 2. a branch of computer technology known as information security as applied to computers and networks  Security by design  Security architecture  Hardware mechanisms that protect computers and data  Secure operating systems  Secure coding  Capabilities and access control lists
  • 3. computing  Hacker (computersecurity) or cracker, who accesses a computersystem by circumventing its security system  Hacker (programmer subculture), who shares an anti- authoritarian approach to software development now associatedwith the free software movemen  Hacker (hobbyist), who makes innovative customizations or combinations of retail electronic and computer equipment
  • 4.  Skills  Style  Attitude  Status  Ethics
  • 5.  Learn how to program  Get one of the open-source Unixes and learn to use and run it  Learn how to use the World Wide Web  If you don't have functional English, learn it!!
  • 6.  The world is full of fascinating problems waiting to be solved.  No problem should ever have to be solved twice.  Boredom and drudgery are evil.  Freedom is good.  Attitudeis no substitutefor competence.
  • 7.  Write open-sourcesoftware  Help test and debug open-source software  Publish useful information  Help keep the infrastructure working  Serve the hacker culture itself
  • 8.
  • 9.  Reconnaissance hackersfirst perform routine and detailed reconnaissance. Methods of reconnaissance include Dumpster Diving, Social Engineering, Google Searching & Google Hacking, and work their way up to more insidious methods such as infiltrating youremployees environmentsfrom coffee shops to simply walking in and setting up in a cubicle and asking a lot of questions.
  • 10.  Scanning can reveal vulnerabilities that create a hit list, or triage list, for hackers to work through. Typically, hackers perform port scans and port mapping, while attempting to discover what services and versions of services are actively available on any open or available ports.
  • 11.  Gaining Access Open ports can lead to a hacker gaining direct access to services and possibly to internal network connections. Whether the hacker is successful attacking an internal system has much to do with how vulnerable the specific system is, which is related to system configurations and architecture.
  • 12.  Maintain Access Hackers may choose to continue attacking and exploiting the target system, or to explore deeper into the target network and look for more systems and services Hackers can continue to sniff your network looking for more information to use againstyou.
  • 13.  Covering Tracks  Most hackers will attempt to cover their footprints and tracks as carefully as possible. Gaining root level access and administrative access is a big part of covering one’s tracks as the hacker can remove log entries and do so as a privileged administrator as opposed to an unknown hacker.
  • 14.
  • 15.  Attacking  Sniffing  Arp Spoofing  DNS Spoofing  Man In The Middle Attack  Defend  Tunelling  Arp Static Packet sniffer comes in two categories: Active sniffers Passive sniffers.
  • 16.  Alice sends a message to Bob, which is intercepted by Mallory: Alice "Hi Bob, it's Alice. Give me your key"--> Mallory Bob  Mallory relays this message to Bob; Bob cannot tell it is not really from Alice: Alice Mallory "Hi Bob, it's Alice. Give me your key"--> Bob  Bob responds with his encryption key: Alice Mallory <--[Bob's_key] Bob  Mallory replaces Bob's key with her own, and relays this to Alice, claiming that it is Bob's key: Alice <--[Mallory's_key] Mallory Bob  Alice encrypts a message with what she believes to be Bob's key, thinking that only Bob can read it: Alice "Meet me at the bus stop!"[encryptedwith Mallory's key]--> Mallory Bob Alive Bob Mallory
  • 17.  Attacking  DDOS (Distributed Denial of Service Attacks)  Defend  Firewall/IDS  Disableservices by default.
  • 18. LOGICAL VIEW OF ATTACK NET Attacker Master Victim Slave SlaveSlave SlaveSlave ControlTraffic Attack Traffic
  • 19.  Attacking  Vulnerability  Exploit  Defend  Firewall  Path Software  Close Service/Port If Not Use
  • 20.  Attacking  ByPass Pasword login  Defend  Lock Bios  Disable other Bootable
  • 21.  Attacking  Session Hijacking  Session Sidejacking  Defend  Don’t Use “Remeber me” While Login  Tunelling (https/ssh) TCP session hijackingis when a hacker takes over a TCP session between two machines
  • 23.  Virtual Network Only 2 Method for Configuration Netwroking Virtual  Bridge  Host-Only Adapter N Na b b a b b A = Real B = Virtual N = LAN
  • 24.  Virtual OS for Attacker  Attack From Linux OS  Attack From Windows OS
  • 25. Web : www.tlab.co.id Mail: karuwak@tlab.co.id Web : www.techno-os.net Mail: karuwak@techno-os.net Company Community karuwak@gmail.com