<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Stealth%3A_Teknik_Siluman</id>
	<title>Stealth: Teknik Siluman - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Stealth%3A_Teknik_Siluman"/>
	<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Stealth:_Teknik_Siluman&amp;action=history"/>
	<updated>2026-05-04T15:03:35Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.4</generator>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Stealth:_Teknik_Siluman&amp;diff=51141&amp;oldid=prev</id>
		<title>Onnowpurbo at 04:01, 27 May 2018</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Stealth:_Teknik_Siluman&amp;diff=51141&amp;oldid=prev"/>
		<updated>2018-05-27T04:01:27Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 04:01, 27 May 2018&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;The type and scope of the penetration test will determine the need for being stealthy during a penetration test&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;The reasons to avoid detection while testing are varied&lt;/del&gt;; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;one of the benefits would include testing the equipment that is supposedly protecting the network&lt;/del&gt;; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;another could be that your client would like to know just how long it would take the Information Technology team to respond to a targeted attack on the environment&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Not only will you need to be wary of the administrators and other observers on the &lt;/del&gt;target &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;network&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;you will also need to understand the automated methods of detection such as &lt;/del&gt;web &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;applications&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;networks&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;and &lt;/del&gt;host&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;-based IDSs that are in place to avoid triggering alerts&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Jenis dan ruang lingkup uji penetrasi akan menentukan kebutuhan untuk secara diam-diam / stealthty dalam melakukan tes penetrasi&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Alasan untuk menghindari deteksi saat pengujian bervariasi&lt;/ins&gt;; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;salah satu manfaatnya termasuk menguji peralatan yang seharusnya melindungi jaringan&lt;/ins&gt;; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;yang lain mungkin adalah bahwa klien anda ingin tahu berapa lama waktu yang dibutuhkan tim Teknologi Informasi untuk menanggapi serangan yang ditargetkan pada lingkungan&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Anda tidak hanya perlu waspada terhadap administrator dan pengamat lain di jaringan &lt;/ins&gt;target, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;anda juga perlu memahami metode pendeteksi otomatis seperti aplikasi &lt;/ins&gt;web, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;jaringan&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;dan IDS berbasis &lt;/ins&gt;host &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;yang ada untuk menghindari pemicu peringatan&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;When presented with a particularly opportune &lt;/del&gt;target, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;take the time to validate that it is not some sort of &lt;/del&gt;honeypot &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;that has been set up to trigger alerts when &lt;/del&gt;abnormal &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;traffic or activity is detected&lt;/del&gt;! &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;No sense in walking into a trap set by a clever &lt;/del&gt;administrator. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Note that&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;if you do find a system like this&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;it is still very important to ensure that it is set up properly and not inadvertently allowing access to critical&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Ketika disajikan dengan &lt;/ins&gt;target &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;yang sangat tepat&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;luangkan waktu untuk memvalidasi bahwa itu bukan semacam &lt;/ins&gt;honeypot &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;yang telah diatur untuk memicu peringatan ketika lalu lintas atau aktivitas &lt;/ins&gt;abnormal &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;terdeteksi&lt;/ins&gt;! &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Tidak masuk akal untuk masuk perangkap yang diatur oleh &lt;/ins&gt;administrator &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;yang pintar&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Perhatikan bahwa&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;jika anda menemukan sistem seperti ini&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;sangat penting untuk memastikan bahwa sistem ini diatur dengan benar dan tidak secara tidak sengaja memungkinkan akses ke aset-aset &lt;/ins&gt;internal &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;yang penting karena kesalahan konfigurasi&lt;/ins&gt;!&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;internal &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;assets due to a configuration error&lt;/del&gt;!&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Ada beberapa skill yang penting untuk di kuasai agar serangan yang kita lakukan tidak terdeteksi, skill tersebut antara lain adalah,&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;In this chapter, we will review the following:&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* Kemampuan untuk melakukan penetrasi ke jaringan yang di firewall.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Pentesting firewalled environments&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Menyusup di bawah &lt;/ins&gt;IDS&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;• Sliding in under the &lt;/del&gt;IDS&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* Setup lingkungan di dalam jaringan yang diserang.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;• Setting up shop internally&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* Menganalisa / me-review &lt;/ins&gt;traffic &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;jaringan&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;• Reviewing network &lt;/del&gt;traffic&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Menggunakan kredensial &lt;/ins&gt;standard&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Using &lt;/del&gt;standard &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;credentials&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* Teknik membersihkan system yang kita ambil alih.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;• Cleaning up compromised systems&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Stealth:_Teknik_Siluman&amp;diff=51140&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot;The type and scope of the penetration test will determine the need for being stealthy during a penetration test. The reasons to avoid detection while testing are varied; one o...&quot;</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Stealth:_Teknik_Siluman&amp;diff=51140&amp;oldid=prev"/>
		<updated>2018-05-27T03:53:00Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;The type and scope of the penetration test will determine the need for being stealthy during a penetration test. The reasons to avoid detection while testing are varied; one o...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;The type and scope of the penetration test will determine the need for being stealthy during a penetration test. The reasons to avoid detection while testing are varied; one of the benefits would include testing the equipment that is supposedly protecting the network; another could be that your client would like to know just how long it would take the Information Technology team to respond to a targeted attack on the environment. Not only will you need to be wary of the administrators and other observers on the target network, you will also need to understand the automated methods of detection such as web applications, networks, and host-based IDSs that are in place to avoid triggering alerts.&lt;br /&gt;
&lt;br /&gt;
When presented with a particularly opportune target, take the time to validate that it is not some sort of honeypot that has been set up to trigger alerts when abnormal traffic or activity is detected! No sense in walking into a trap set by a clever administrator. Note that, if you do find a system like this, it is still very important to ensure that it is set up properly and not inadvertently allowing access to critical&lt;br /&gt;
internal assets due to a configuration error!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In this chapter, we will review the following:&lt;br /&gt;
* Pentesting firewalled environments&lt;br /&gt;
• Sliding in under the IDS&lt;br /&gt;
• Setting up shop internally&lt;br /&gt;
• Reviewing network traffic&lt;br /&gt;
* Using standard credentials&lt;br /&gt;
• Cleaning up compromised systems&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>