Difference between revisions of "Forensic: IT"
		
		
		
		
		
		Jump to navigation
		Jump to search
		
				
		
		
	
Onnowpurbo (talk | contribs)  | 
				Onnowpurbo (talk | contribs)   | 
				||
| Line 83: | Line 83: | ||
| − | * [[  | + | * [[Example of attackes dan forensic using Metasploitable (en)]]  | 
* [[Forensic: nmap smb-enum-users.nse attack (en)]]  | * [[Forensic: nmap smb-enum-users.nse attack (en)]]  | ||
* [[Forensic: nmap mysql-brute.nse attack (en)]]  | * [[Forensic: nmap mysql-brute.nse attack (en)]]  | ||
Revision as of 05:35, 20 October 2024
PERTEMUAN: Pengenalan IT Forensik
PERTEMUAN: Proses Akuisisi Data
PERTEMUAN: Analisis Data
PERTEMUAN: Investigasi Sistem Operasi
PERTEMUAN: Investigasi Jaringan
PERTEMUAN: Forensic eMail
- Protocol SMTP POP3 IMAP
 - Hands-On: Attack Spoofing SMTP Server & WebMail
 - Mitigasi eMail attack: GnuPG
 
PERTEMUAN: Forensic SQL Injection Attack
- SQL Overview
 - MySQL
 - SQL Injection Attack
 - Hands-On: Attack SQL Injection
 - Mitigasi: SQL Injection
 - Mitigasi: Snort IPS
 
PERTEMUAN: Forensic Command Injection Attack
- Command Line di Server Linux
 - Hands-on Command Injection Attack
 - Forensic Command Injection Attack
 - Mitigasi Command Injection Attack
 
PERTEMUAN: Forensic Backdoor via Command Injection Attack
- TCP port communication via nc
 - mkfifo: cara kerja
 - Hands-on mkfifo attack backdoor di DVWA via Command Injection
 - Forensic backdoor di Ubuntu
 - Mitigasi backdoor di Ubuntu
 
PERTEMUAN: Forensic File System Linux
- Overview tentang dd, ntfsundelete, ext3undelete dan extundelete
 - Hands-on File Forensic menggunakan dd, ntfsundelete, ext3undelete, dan extundelete
 - Mitigasi agar file dan file system aman
 
PERTEMUAN: Investigasi Perangkat Mobile
- Karakteristik Perangkat Mobile: Sistem operasi mobile, Aplikasi pihak ketiga, Cloud storage
 - Teknik Akuisisi Physical extraction vs. Logical extraction
 - Teknik Rooting Android jika diperlukan
 - Hands-on Forensic Android menggunakan ADB
 - Hands-on Forensic Android menggunakan ADB untuk analisa SMS, panggilan, kontak, Whatsapp, Data Lokasi
 
PERTEMUAN: Misc Attack & Forensic
- Berbagai latihan serangan dan forensic pada Metasploitable
 - Forensic: nmap smb-enum-users.nse attack
 - Forensic: nmap mysql-brute.nse attack
 - Forensic: nmap ssh2-enum-algos attack
 - Forensic: msfconsole use auxiliary/scanner/smb/smb_login attack
 - Forensic: msfconsole use auxiliary/scanner/smb/smb_enumshares attack
 - Forenisc: msfvenom attack
 
- Example of attackes dan forensic using Metasploitable (en)
 - Forensic: nmap smb-enum-users.nse attack (en)
 - Forensic: nmap mysql-brute.nse attack (en)
 - Forensic: nmap ssh2-enum-algos attack (en)
 - Forensic: msfconsole use auxiliary/scanner/smb/smb_login attack (en)
 - Forensic: msfconsole use auxiliary/scanner/smb/smb_enumshares attack (en)
 - Forenisc: msfvenom attack (en)