Teknik Hacking Sederhana
Network probing and information gathering
Network probing and information gathering
Menggunakan dig, nslookupNetwork Enumartion, menggunakan dig, nmap, ping, traceroute
Melihat file HTML
Finger (jika di aktifkan)
Identifying trusted network components, menggunakan nmap, AMDhack.
Perform types of checks
A TCP portscan of a host.Taking advantage of vulnerable components
A listing of shares via. samba / netbios.
Identification of vulnerable versions of server daemons, including Sendmail, IMAP, POP3, RPC status & RPC mountd.
Identify vulnerable network components & compromise the hosts.Upon gain access to vulnerable components
Upon executing such a program remotely to exploit a vulnerable server daemon
Gain root access to your host.
'clean-up‘ operation of doctoring your hosts logsAbusing access & privileges
'backdooring' service binaries.
place an .rhosts file in the /usr/bin to allow remote bin access to the host via rsh & csh
Downloading sensitive information
Cracking other trusted hosts and networks
Taking down networks, rm -rf / &Install trojans & backdoors + remove logs.
Installing sniffers to 'sniff' data flowing across the internal network ==> a remote root compromise of an internal host.
Teknik Security Jaringan
Beberapa Fokus Pembahasan :
Beberapa Fokus Pembahasan :
Pertahanan Pada De-Militerized Zone
- Filtering Router
- Network Based Intrution Detection System
- Secure Web Server
- VPN & Cryptographics Communication
- Firewall
- Host Based Intrution Detection System
- Authentication
- Authorization
- Trusted Operating System
Tidak ada komentar:
Posting Komentar
Catatan: Hanya anggota dari blog ini yang dapat mengirim komentar.