Difference between revisions of "Ethical Hacking"
		
		
		
		
		
		Jump to navigation
		Jump to search
		
				
		
		
	
Onnowpurbo (talk | contribs)  | 
				Onnowpurbo (talk | contribs)   | 
				||
| Line 17: | Line 17: | ||
* [[Teknik Open Source Intelligence (OSINT)]]  | * [[Teknik Open Source Intelligence (OSINT)]]  | ||
* [[Passive dan Active Reconnaissance]]  | * [[Passive dan Active Reconnaissance]]  | ||
| − | * [[Tools: WHOIS,   | + | * [[Tools: WHOIS, dig, Maltego, Google Dorking]]  | 
* [[Hands-on: Pengumpulan Informasi Target secara Pasif]]  | * [[Hands-on: Pengumpulan Informasi Target secara Pasif]]  | ||
Revision as of 03:09, 22 September 2024
Outline kuliah Ethical Hacking untuk 14 pertemuan dengan fokus pada pengetahuan praktis dan skill hacking. Tiap pertemuan menggabungkan teori dan hands-on lab untuk mengembangkan keterampilan secara bertahap:
Pengantar Ethical Hacking
- Definisi Ethical Hacking
 - Peran dan Tanggung Jawab Ethical Hacker
 - Legalitas, Etika, dan Hukum terkait Hacking
 - Perangkat Tool dan Lingkungan Kerja (VM, Kali Linux)
 - Hands-on: Setup Lab dan Lingkungan Testing Aman
 
Metodologi Penetration Testing
- Fase Penetration Testing (Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks)
 - Standar Penetration Testing (OWASP, NIST)
 - Hands-on: Membuat Rencana Penetration Testing
 
Reconnaissance (Information Gathering)
- Teknik Open Source Intelligence (OSINT)
 - Passive dan Active Reconnaissance
 - Tools: WHOIS, dig, Maltego, Google Dorking
 - Hands-on: Pengumpulan Informasi Target secara Pasif
 
Scanning dan Enumeration
- Network Scanning: Nmap, Netcat
 - Vulnerability Scanning: OpenVAS, Nessus
 - Enumeration Services: SMB, SNMP, FTP, HTTP
 - Hands-on: Identifikasi Port, Services, dan Vulnerability Target
 
Exploitation Basics
- Pengertian Eksploitasi
 - Memahami Common Vulnerabilities (CVE)
 - Membuat Exploit sederhana berdasarkan CVE
 - Memilih dan Memodifikasi Exploit
 - Tools: Metasploit Framework
 - Hands-on: Menggunakan Metasploit untuk Eksploitasi
 
Web Application Hacking - Bagian 1
- Konsep HTTP, Session, dan Cookies
 - Vulnerabilities umum: SQL Injection, XSS
 - Tools: Burp Suite, OWASP ZAP
 - Hands-on: Eksploitasi SQL Injection pada Aplikasi Web
 
Web Application Hacking - Bagian 2
- CSRF (Cross-Site Request Forgery)
 - RCE (Remote Code Execution)
 - Directory Traversal, File Inclusion
 - Hands-on: Menggunakan Burp Suite untuk Menganalisis dan Mengeksploitasi Web App
 
Password Cracking dan Authentication Bypass
- Teknik Password Cracking (Brute Force, Dictionary, Rainbow Table)
 - Bypass Authentication: Vulnerable Login Forms
 - Tools: John the Ripper, Hydra
 - Hands-on: Password Cracking dan Authentication Bypass
 
Wireless Network Hacking
- Teknik dan Protokol Wireless (WEP, WPA/WPA2)
 - Attacks: WEP Cracking, WPA Handshake Capture
 - Tools: Aircrack-ng, Wireshark
 - Hands-on: Menyerang Wireless Network dan Memecahkan Password WiFi
 
Social Engineering
- Teknik Social Engineering: Phishing, Pretexting, Baiting
 - Email Spoofing dan Spear Phishing
 - Tools: Social Engineering Toolkit (SET)
 - Hands-on: Simulasi Phishing Attack
 
Privilege Escalation
- Konsep Privilege Escalation
 - Local vs Remote Escalation
 - Exploiting Misconfigured Services
 - Hands-on: Menaikkan Privilege di Sistem Linux dan Windows
 
Post-Exploitation dan Maintaining Access
- Backdoors dan Persistence
 - Data Exfiltration
 - Cleaning Tracks: Log Deletion, Anti-Forensics
 - Hands-on: Menginstal Backdoor dan Teknik Persistensi di Sistem Target
 
Mobile Hacking
- Arsitektur dan Security Model Android & iOS
 - Vulnerabilities di Aplikasi Mobile
 - Tools: Drozer, APKTool
 - Hands-on: Analisis dan Eksploitasi APK Android