Difference between revisions of "Cyber Security (en)"
		
		
		
		
		
		Jump to navigation
		Jump to search
		
				
		
		
	
Onnowpurbo (talk | contribs)  | 
				Onnowpurbo (talk | contribs)   | 
				||
| (55 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
==TCP/IP CONCEPT==  | ==TCP/IP CONCEPT==  | ||
| − | |||
*[https://andipublisher.com/produk/detail/internet-tcpip-konsep-amp-implementasi TCP/IP: Buku TCP/IP OWP]  | *[https://andipublisher.com/produk/detail/internet-tcpip-konsep-amp-implementasi TCP/IP: Buku TCP/IP OWP]  | ||
| − | |||
*[https://en.wikipedia.org/wiki/History_of_the_Internet TCP/IP: Sejarah Internet Dunia (en)]  | *[https://en.wikipedia.org/wiki/History_of_the_Internet TCP/IP: Sejarah Internet Dunia (en)]  | ||
*[https://id.wikipedia.org/wiki/Sejarah_Internet TCP/IP: Sejarah Internet Dunia]  | *[https://id.wikipedia.org/wiki/Sejarah_Internet TCP/IP: Sejarah Internet Dunia]  | ||
| + | |||
| + | |||
| + | *[[TCP/IP: Konsep Dasar]]  | ||
| + | *[[TCP/IP: Sejarah Internet Indonesia]]  | ||
*[[TCP/IP: Penggunaan Wireshark]]  | *[[TCP/IP: Penggunaan Wireshark]]  | ||
*[[TCP/IP: Penggunaan tcpdump]]  | *[[TCP/IP: Penggunaan tcpdump]]  | ||
| − | *[[TCP/IP:   | + | *[[TCP/IP: Basic Concept (en)]]  | 
| − | *[[TCP/IP:   | + | *[[TCP/IP: Indonesia Internet History(en)]]  | 
| − | + | *[[TCP/IP: Wireshark howto(en)]]  | |
| − | + | *[[TCP/IP: tcpdump howto (en)]]  | |
| − | *[[TCP/IP:   | ||
| − | *[[TCP/IP:   | ||
| Line 35: | Line 35: | ||
| − | *[[SIMULATOR:   | + | *[[SIMULATOR: Network Simulator (en)]]  | 
| − | *[[SIMULATOR: VirtualBox   | + | *[[SIMULATOR: VirtualBox Installation (en)]]  | 
| − | *[[SIMULATOR: OpenWRT   | + | *[[SIMULATOR: OpenWRT Router Creation (en)]]  | 
| − | *[[SIMULATOR: OpenWRT X86   | + | *[[SIMULATOR: OpenWRT X86 for VirtualBox (en)]]  | 
| − | *[[SIMULATOR: GNS3: Simulator   | + | *[[SIMULATOR: GNS3: Network Simulator (en)]]  | 
| − | *[[SIMULATOR: CISCO: Packet Tracer(en)]]  | + | *[[SIMULATOR: CISCO: Packet Tracer (en)]]  | 
| − | *[[SIMULATOR: GNS3:   | + | *[[SIMULATOR: GNS3: Connecting LAN / Switch to Internet Cloud (en)]]  | 
| − | *[[SIMULATOR: GNS3:   | + | *[[SIMULATOR: GNS3: Connecting LAN / Switch to NAT (en)]]  | 
| − | *[[SIMULATOR: Mikrotik: Router   | + | *[[SIMULATOR: Mikrotik: Simple Router (en)]]  | 
| − | *[[SIMULATOR: GNS3:   | + | *[[SIMULATOR: GNS3: Simple Network with OpenWRT (en)]]  | 
| + | |||
| Line 89: | Line 90: | ||
*[[Routing: OSPF6D Quagga di OpenWRT]]  | *[[Routing: OSPF6D Quagga di OpenWRT]]  | ||
*[[Routing: OSPF6 Quagga IPv6]]  | *[[Routing: OSPF6 Quagga IPv6]]  | ||
| − | |||
*[[Routing (en)]]  | *[[Routing (en)]]  | ||
| − | *[[Routing:   | + | *[[Routing: Static (en)]]  | 
| − | *[[Routing:   | + | *[[Routing: Dynamic (en)]]  | 
| − | *[[Routing: Network Address Translation(en)]]  | + | *[[Routing: Network Address Translation (en)]]  | 
*[[Routing: Advanced (en)]]  | *[[Routing: Advanced (en)]]  | ||
*[[Routing: Quagga (en)]]  | *[[Routing: Quagga (en)]]  | ||
| − | *[[Routing: OSPF6D Quagga   | + | *[[Routing: OSPF6D Quagga in OpenWRT (en)]]  | 
| − | *[[Routing: OSPF6 Quagga IPv6(en)]]  | + | *[[Routing: OSPF6 Quagga IPv6 (en)]]  | 
| Line 127: | Line 127: | ||
| − | + | *[[Routing: Mikrotik: Simple OSPF (en)]]  | |
| − | *[[Routing: Mikrotik: OSPF   | + | *[[Routing: Mikrotik: OSPF Multi-area Network (en)]]  | 
| − | *[[Routing: Mikrotik: OSPF   | + | *[[Routing: Mikrotik: Simple BGP without Filters (en)]]  | 
| − | *[[Routing: Mikrotik: BGP   | + | *[[Routing: Mikrotik: BGP 2 Links to 3 BGP Redistribute 2 OSPF (en)]]  | 
| − | *[[Routing: Mikrotik: BGP 2   | + | *[[Routing: Cisco: Simple OSPF (en)]]  | 
| − | *[[Routing: Cisco: OSPF   | + | *[[Routing: Cisco: OSPF Multi-area Network (en)]]  | 
| − | *[[Routing: Cisco: OSPF   | + | *[[Routing: Cisco: Simple BGP without Filters (en)]]  | 
| − | *[[Routing: Cisco: BGP   | + | *[[Routing: Cisco: BGP 2 Links to 3 BGP Redistribute 2 OSPF (en)]]  | 
| − | *[[Routing: Cisco: BGP 2   | + | *[[Routing: Quagga: Simple OSPF (en)]]  | 
| − | *[[Routing: Quagga: OSPF   | + | *[[Routing: Quagga: OSPF Multi-area Network (en)]]  | 
| − | *[[Routing: Quagga: OSPF Multi-area   | + | *[[Routing: IPv6: Mikrotik: Simple OSPF (en)]]  | 
| − | *[[Routing: IPv6: Mikrotik: OSPF   | + | *[[Routing: IPv6: Mikrotik: OSPF Multi-area Network (en)]]  | 
| − | *[[Routing: IPv6: Mikrotik: OSPF   | + | *[[Routing: IPv6: Mikrotik: Simple BGP without Filters (en)]]  | 
| − | *[[Routing: IPv6: Mikrotik: BGP   | + | *[[Routing: IPv6: Cisco: Simple OSPF (en)]]  | 
| − | *[[Routing: IPv6: Cisco: OSPF   | + | *[[Routing: IPv6: Cisco: OSPF Multi-area Network (en)]]  | 
| − | *[[Routing: IPv6: Cisco: OSPF   | + | *[[Routing: IPv6: Cisco: Simple BGP without Filters (en)]]  | 
| − | *[[Routing: IPv6: Cisco: BGP   | + | *[[Routing: IPv6: Quagga: Simple BGP without Filters (en)]]  | 
| − | *[[Routing: IPv6: Quagga: BGP   | ||
==VoIP and OpenBTS==  | ==VoIP and OpenBTS==  | ||
| Line 178: | Line 177: | ||
*[[Benchmarking: Tuning Kernel untuk Network Performance]]  | *[[Benchmarking: Tuning Kernel untuk Network Performance]]  | ||
*[[Benchmarking: dnsperf: mengukur kinerja DNS Server]]  | *[[Benchmarking: dnsperf: mengukur kinerja DNS Server]]  | ||
| − | |||
*[[Benchmarking: Network Management System (en)]]  | *[[Benchmarking: Network Management System (en)]]  | ||
*[[Benchmarking: Network (en)]]  | *[[Benchmarking: Network (en)]]  | ||
| − | *[[Benchmarking: Data Center Tier Standard(en)]]  | + | *[[Benchmarking: Data Center Tier Standard (en)]]  | 
| − | *[[Benchmarking: iperf:   | + | *[[Benchmarking: iperf: Measuring Connection Capacity (en)]]  | 
| − | *[[Benchmarking: Tuning Kernel   | + | *[[Benchmarking: Tuning Kernel for Network Performance (en)]]  | 
| − | *[[Benchmarking: dnsperf:   | + | *[[Benchmarking: dnsperf: Measuring DNS Server Performance (en)]]  | 
| + | |||
| Line 209: | Line 208: | ||
*[[IoT: Network Programming (en)]]  | *[[IoT: Network Programming (en)]]  | ||
| − | *[[IoT: Socket Programming   | + | *[[IoT: Socket Programming Using Python (en)]]  | 
| − | *[[IoT:   | + | *[[IoT: Creating Android Apps with AppInventor (en)]]  | 
*[[IoT: Internet of Things (en)]]  | *[[IoT: Internet of Things (en)]]  | ||
*[[IoT: Arduino (en)]]  | *[[IoT: Arduino (en)]]  | ||
| Line 220: | Line 219: | ||
==INTRO HACKING==  | ==INTRO HACKING==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[HACKER: Hacker]]  | * [[HACKER: Hacker]]  | ||
| Line 242: | Line 231: | ||
* [[HACKER: Hacker (en)]]  | * [[HACKER: Hacker (en)]]  | ||
| − | * [[HACKER:   | + | * [[HACKER: The Internet Underworld (en)]]  | 
| − | * [[HACKER:   | + | * [[HACKER: Hacker Ethics (en)]]  | 
| − | * [[HACKER:   | + | * [[HACKER: Hacker Rules of Engagement (en)]]  | 
| − | * [[HACKER:   | + | * [[HACKER: How the Hacking Process is Conducted (en)]]  | 
| − | * [[HACKER:   | + | * [[HACKER: Understanding Hacker Community Characteristics (en)]]  | 
| − | * [[HACKER:   | + | * [[HACKER: Various Hacking Tips (en)]]  | 
* [[HACKER: Ethical Hacking (en)]]  | * [[HACKER: Ethical Hacking (en)]]  | ||
| + | |||
| + | |||
* [https://www.computersecuritystudent.com/ HACKER: Computer Security Student]  | * [https://www.computersecuritystudent.com/ HACKER: Computer Security Student]  | ||
* [https://www.youtube.com/playlist?list=PLXHnX-wg99azrZVE1xBWkx_oyQulUFWZj YOUTUBE: Teknik Hacking]  | * [https://www.youtube.com/playlist?list=PLXHnX-wg99azrZVE1xBWkx_oyQulUFWZj YOUTUBE: Teknik Hacking]  | ||
| − | |||
==HACKING PREPARATION==  | ==HACKING PREPARATION==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[HACKER: Siapkan Kali Linux]]  | * [[HACKER: Siapkan Kali Linux]]  | ||
| Line 280: | Line 258: | ||
| − | * [[HACKER:   | + | * [[HACKER: Set Up Kali Linux (en)]]  | 
| − | * [[HACKER:   | + | * [[HACKER: Telnet Server (en)]]  | 
* [[HACKER: Squirrelmail (en)]]  | * [[HACKER: Squirrelmail (en)]]  | ||
* [[HACKER: SAMBA (en)]]  | * [[HACKER: SAMBA (en)]]  | ||
| − | * [[HACKER: SAMBA:   | + | * [[HACKER: SAMBA: Adding User (en)]]  | 
* [[HACKER: DVWA (en)]]  | * [[HACKER: DVWA (en)]]  | ||
| − | * [[HACKER: DVWA:   | + | * [[HACKER: DVWA: Installation (en)]]  | 
| − | * [[HACKER: MySQL:   | + | * [[HACKER: MySQL: Making Vulnerable (en)]]  | 
| − | * [[HACKER: MySQL:   | + | * [[HACKER: MySQL: Opening Access Block (en)]]  | 
| + | |||
| + | |||
| Line 294: | Line 274: | ||
* [https://onnocenter.or.id/wiki/index.php/Pentest#Vulnerable_Apps HACKER: Vulnerable Apps]  | * [https://onnocenter.or.id/wiki/index.php/Pentest#Vulnerable_Apps HACKER: Vulnerable Apps]  | ||
* [https://www.youtube.com/watch?v=iQdeIik6DR8 YOUTUBE: Instalasi server korban]  | * [https://www.youtube.com/watch?v=iQdeIik6DR8 YOUTUBE: Instalasi server korban]  | ||
| − | |||
==FOOT PRINTING (INTELLIGENCE)==  | ==FOOT PRINTING (INTELLIGENCE)==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[FOOT PRINTING: Perencanaan Pengujian Penetrasi Sasaran Jaringan]]  | * [[FOOT PRINTING: Perencanaan Pengujian Penetrasi Sasaran Jaringan]]  | ||
| Line 317: | Line 286: | ||
| − | * [[FOOT PRINTING:   | + | * [[FOOT PRINTING: Planning Network Target Penetration Testing (en)]]  | 
| − | * [[FOOT PRINTING: Workflow   | + | * [[FOOT PRINTING: Hacker Attack Reconnaissance Workflow (en)]]  | 
* [[FOOT PRINTING: nmap (en)]]  | * [[FOOT PRINTING: nmap (en)]]  | ||
| − | * [[FOOT PRINTING:   | + | * [[FOOT PRINTING: Unicornscan: Scanning Attack Targets (en)]]  | 
* [[FOOT PRINTING: whois (en)]]  | * [[FOOT PRINTING: whois (en)]]  | ||
| − | * [[FOOT PRINTING:   | + | * [[FOOT PRINTING: Grabber: Scanning Vulnerabilities (en)]]  | 
| − | * [[FOOT PRINTING:   | + | * [[FOOT PRINTING: Evaluating Indonesian e-Banking Sites (en)]]  | 
| + | |||
* [https://www.kali.org/tools/ FOOT PRINTING: Tool untuk Evaluasi Web di Kali Linux (en)]  | * [https://www.kali.org/tools/ FOOT PRINTING: Tool untuk Evaluasi Web di Kali Linux (en)]  | ||
| − | |||
| − | |||
| − | |||
==SNIFFING==  | ==SNIFFING==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[SNIFFING: Wireshark]]  | * [[SNIFFING: Wireshark]]  | ||
| Line 346: | Line 305: | ||
* [[SNIFFING: MITM: ARPSpoof]]  | * [[SNIFFING: MITM: ARPSpoof]]  | ||
* [[SNIFFING: MITM: Proxy]]  | * [[SNIFFING: MITM: Proxy]]  | ||
| − | |||
* [[SNIFFING: Wireshark (en)]]  | * [[SNIFFING: Wireshark (en)]]  | ||
* [[SNIFFING: tcpdump (en)]]  | * [[SNIFFING: tcpdump (en)]]  | ||
| − | * [[SNIFFING: MITM:   | + | * [[SNIFFING: MITM: Concept (en)]]  | 
* [[SNIFFING: MITM: ARPSpoof (en)]]  | * [[SNIFFING: MITM: ARPSpoof (en)]]  | ||
* [[SNIFFING: MITM: Proxy (en)]]  | * [[SNIFFING: MITM: Proxy (en)]]  | ||
| − | |||
* [https://www.youtube.com/watch?v=roV5Ix0XbLU YOUTUBE: Konsep MiTM]  | * [https://www.youtube.com/watch?v=roV5Ix0XbLU YOUTUBE: Konsep MiTM]  | ||
| − | |||
==HACKING WIRELESS==  | ==HACKING WIRELESS==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[WIRELESS: Wajanbolid e-goen]]  | * [[WIRELESS: Wajanbolid e-goen]]  | ||
| Line 392: | Line 332: | ||
| − | + | * [[WIRELESS: Wajanbolic e-goen (en)]]  | |
| − | * [[WIRELESS:   | + | * [[WIRELESS: WiFi-based Wireless Internet (en)]]  | 
| − | * [[WIRELESS: Wireless Internet   | + | * [[WIRELESS: WiFi Network Design (en)]]  | 
| − | * [[WIRELESS:   | + | * [[WIRELESS: Wireless Network Design Using Radio Mobile Wireless (en)]]  | 
| − | * [[WIRELESS:   | + | * [[WIRELESS: MESH using OLSR (en)]]  | 
| − | * [[WIRELESS: MESH   | ||
* [[WIRELESS: Wireless Hacking (en)]]  | * [[WIRELESS: Wireless Hacking (en)]]  | ||
* [[WIRELESS: Scanning HotSpot (en)]]  | * [[WIRELESS: Scanning HotSpot (en)]]  | ||
| − | * [[WIRELESS:   | + | * [[WIRELESS: Techniques for Cracking WEP (en)]]  | 
| − | * [[WIRELESS:   | + | * [[WIRELESS: Techniques for Cracking WPA (en)]]  | 
| − | * [[WIRELESS: Reaver:   | + | * [[WIRELESS: Reaver: Wireless Security Penetration (en)]]  | 
| − | * [[WIRELESS: Reaver: 5   | + | * [[WIRELESS: Reaver: 5 Steps to Crack WPA (en)]]  | 
| − | * [[WIRELESS: Reaver:   | + | * [[WIRELESS: Reaver: Tips and Tricks (en)]]  | 
| + | |||
* [https://wndw.net/download/WNDW_Standard.pdf PDF: Wireless Network for Developing World (en)]  | * [https://wndw.net/download/WNDW_Standard.pdf PDF: Wireless Network for Developing World (en)]  | ||
* [https://wndw.net/pdf/wndw-id/wndw-id-ebook.pdf PDF: Wireless Network for Developing World (id)]  | * [https://wndw.net/pdf/wndw-id/wndw-id-ebook.pdf PDF: Wireless Network for Developing World (id)]  | ||
| − | |||
==ATTACK PASSWORD==  | ==ATTACK PASSWORD==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[PASSWORD: Password Attack menggunakan Kali Linux]]  | * [[PASSWORD: Password Attack menggunakan Kali Linux]]  | ||
| − | |||
* [[PASSWORD: Password Attack Menggunakan Hydra]]  | * [[PASSWORD: Password Attack Menggunakan Hydra]]  | ||
* [[PASSWORD: Teknik Menjebol Password Windows dengan JohnTheRipper]]  | * [[PASSWORD: Teknik Menjebol Password Windows dengan JohnTheRipper]]  | ||
| Line 431: | Line 360: | ||
| − | * [[PASSWORD: Password Attack   | + | * [[PASSWORD: Password Attack using Kali Linux (en)]]  | 
| − | * [[PASSWORD:   | + | * [[PASSWORD: hydra: Password Attack (en)]]  | 
| − | + | * [[PASSWORD: JohnTheRipper: Cracking Windows Passwords (en)]]  | |
| − | * [[PASSWORD:   | + | * [[PASSWORD: Hack Online Passwords with Kali Linux (en)]]  | 
| − | * [[PASSWORD: Hack   | + | * [[PASSWORD: Hack Offline Passwords with Kali Linux (en)]]  | 
| − | * [[PASSWORD: Hack   | + | * [[PASSWORD: ophcrack: Cracking Windows Passwords (en)]]  | 
| − | * [[PASSWORD: ophcrack   | ||
| + | * [https://en.wikipedia.org/wiki/Password_cracking Menjebol Password (en)]  | ||
* [http://onnocenter.or.id/wiki/index.php/Pentest#Wordlist PASSWORD: Wordlist]  | * [http://onnocenter.or.id/wiki/index.php/Pentest#Wordlist PASSWORD: Wordlist]  | ||
| − | |||
==ATTACK DATABASE SQL==  | ==ATTACK DATABASE SQL==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[SQL: nmap: serang SQL]]  | * [[SQL: nmap: serang SQL]]  | ||
| Line 458: | Line 377: | ||
* [[SQL: nmap: hack password mysql]]  | * [[SQL: nmap: hack password mysql]]  | ||
* [[SQL: SQLMap]]  | * [[SQL: SQLMap]]  | ||
| − | * [[SQL: SQLMap   | + | * [[SQL: SQLMap: SQLInjection ke DVWA]]  | 
| − | * [[SQL: SQLMap   | + | * [[SQL: SQLMap: contoh remote hack database]]  | 
| − | * [[SQL: nmap:   | + | * [[SQL: nmap: SQL Attack (en)]]  | 
| − | * [[SQL: nmap:   | + | * [[SQL: nmap: Check SQL Injection (en)]]  | 
| − | * [[SQL: nmap:   | + | * [[SQL: nmap: Hack MySQL Password (en)]]  | 
* [[SQL: SQLMap (en)]]  | * [[SQL: SQLMap (en)]]  | ||
| − | * [[SQL: SQLMap -   | + | * [[SQL: SQLMap - SQL Injection to DVWA (en)]]  | 
| − | * [[SQL: SQLMap -   | + | * [[SQL: SQLMap - Example of Remote Database Hack (en)]]  | 
==DOMAIN NAME SYSTEM and DEFACE WEB==  | ==DOMAIN NAME SYSTEM and DEFACE WEB==  | ||
| Line 476: | Line 395: | ||
* [https://www.ietf.org/ Internet Engineerig Task Force (IETF)]  | * [https://www.ietf.org/ Internet Engineerig Task Force (IETF)]  | ||
* [https://en.wikipedia.org/wiki/Internet_Assigned_Numbers_Authority Internet Assigned Numbers Authority (IANA)]  | * [https://en.wikipedia.org/wiki/Internet_Assigned_Numbers_Authority Internet Assigned Numbers Authority (IANA)]  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| Line 500: | Line 410: | ||
* [[DNS: ICANN (en)]]  | * [[DNS: ICANN (en)]]  | ||
* [[DNS: PowerDNS (en)]]  | * [[DNS: PowerDNS (en)]]  | ||
| − | * [[DNS:   | + | * [[DNS: Webmin: DNS Configuration (en)]]  | 
* [[HACKING: deface (en)]]  | * [[HACKING: deface (en)]]  | ||
* [[HACKING: Web Deface (en)]]  | * [[HACKING: Web Deface (en)]]  | ||
| − | * [[HACKING: 13   | + | * [[HACKING: 13 Steps to Web Deface (en)]]  | 
| − | * [[HACKING: Defacing Rooting   | + | * [[HACKING: Defacing Rooting for Beginners (en)]]  | 
| − | |||
==ATTACK FILE SHARING==  | ==ATTACK FILE SHARING==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[SHARING: Enumerasi SMB Share]]  | * [[SHARING: Enumerasi SMB Share]]  | ||
| Line 523: | Line 425: | ||
| − | * [[SHARING:   | + | * [[SHARING: SMB Share Enumeration (en)]]  | 
* [[SHARING: Brute Force Hack SMB Password (en)]]  | * [[SHARING: Brute Force Hack SMB Password (en)]]  | ||
| − | * [[SHARING:   | + | * [[SHARING: Cracking SAMBA File Sharing (en)]]  | 
| − | * [[SHARING:   | + | * [[SHARING: Cracking File Sharing Passwords in Windows 7 (en)]]  | 
| − | * [[SHARING: SAMBA   | + | * [[SHARING: SAMBA Creating Users (en)]]  | 
==OVERVIEW CYBER SECURITY==  | ==OVERVIEW CYBER SECURITY==  | ||
| − | * [[Keamanan Jaringan]]  | + | * [[SECURITY: Keamanan Jaringan]]  | 
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[SECURITY: Cyber Security Technology Map]]  | * [[SECURITY: Cyber Security Technology Map]]  | ||
* [[SECURITY: Cyber Defence]]  | * [[SECURITY: Cyber Defence]]  | ||
* [[SECURITY: 20 Linux Server Hardening Security Tips]]  | * [[SECURITY: 20 Linux Server Hardening Security Tips]]  | ||
| − | |||
* [[SECURITY: Basic OS Security ]]  | * [[SECURITY: Basic OS Security ]]  | ||
| + | * [[SECURITY: Network Security (en)]]  | ||
* [[SECURITY: Cyber Security Technology Map (en)]]  | * [[SECURITY: Cyber Security Technology Map (en)]]  | ||
* [[SECURITY: Cyber Defence (en)]]  | * [[SECURITY: Cyber Defence (en)]]  | ||
* [[SECURITY: 20 Linux Server Hardening Security Tips (en)]]  | * [[SECURITY: 20 Linux Server Hardening Security Tips (en)]]  | ||
| − | |||
* [[SECURITY: Basic OS Security (en)]]  | * [[SECURITY: Basic OS Security (en)]]  | ||
| − | * http://www.owasp.org/index.php/Category:Principle   | + | * [https://tldp.org/HOWTO/html_single/Security-HOWTO/ SECURITY: Linux Security Howto (en)]  | 
| − | * http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html  | + | * [https://www.bssn.go.id/monitoring-keamanan-siber/ SECURITY: BSSN: Security Report]  | 
| − | * https://www.youtube.com/playlist?list=PLXHnX-wg99ayU13dXsXGuFVil8-G7H545   | + | * [http://www.owasp.org/index.php/Category:Principle SECURITY: Apps Security Principle]  | 
| − | + | * [http://www.cyberciti.biz/tips/php-security-best-practices-tutorial.html SECURITY: PHP Security Best Practice]  | |
| + | * [https://www.youtube.com/playlist?list=PLXHnX-wg99ayU13dXsXGuFVil8-G7H545 YOUTUBE: Cyber Security]  | ||
==VULNERABILITY ANALYSIS==  | ==VULNERABILITY ANALYSIS==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[VULNERABILITY: Network Target Penetration Testing Planning]]  | * [[VULNERABILITY: Network Target Penetration Testing Planning]]  | ||
| − | * [[VULNERABILITY:   | + | * [[VULNERABILITY: Web Directory Traversal Vulnerability]]  | 
* [[VULNERABILITY: nikto: Search Web Vulnerability]]  | * [[VULNERABILITY: nikto: Search Web Vulnerability]]  | ||
* [[VULNERABILITY: nikto: Check DVWA]]  | * [[VULNERABILITY: nikto: Check DVWA]]  | ||
| Line 583: | Line 466: | ||
* [[VULNERABILITY: Network Target Penetration Testing Planning (en)]]  | * [[VULNERABILITY: Network Target Penetration Testing Planning (en)]]  | ||
| − | * [[VULNERABILITY:   | + | * [[VULNERABILITY: Web Directory Traversal Vulnerability (en)]]  | 
* [[VULNERABILITY: nikto: Search Web Vulnerability (en)]]  | * [[VULNERABILITY: nikto: Search Web Vulnerability (en)]]  | ||
* [[VULNERABILITY: nikto: Check DVWA (en)]]  | * [[VULNERABILITY: nikto: Check DVWA (en)]]  | ||
* [[VULNERABILITY: Grabber: Scan Vulnerability (en)]]  | * [[VULNERABILITY: Grabber: Scan Vulnerability (en)]]  | ||
* [[VULNERABILITY: w3af (en)]]  | * [[VULNERABILITY: w3af (en)]]  | ||
| − | * [[VULNERABILITY: OpenVAS Installation (en)]]  | + | * [[VULNERABILITY: OpenVAS: Installation (en)]]  | 
* [[VULNERABILITY: Legion (en)]]  | * [[VULNERABILITY: Legion (en)]]  | ||
| Line 595: | Line 478: | ||
==BASIC SERVER SECURITY==  | ==BASIC SERVER SECURITY==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[SERVER: 20 Linux Server Hardening Security Tips]]  | * [[SERVER: 20 Linux Server Hardening Security Tips]]  | ||
| − | |||
* [[SERVER: Postfix]]  | * [[SERVER: Postfix]]  | ||
* [[SERVER: Squirrelmail]]  | * [[SERVER: Squirrelmail]]  | ||
| Line 620: | Line 490: | ||
* [[SERVER: 20 Linux Server Hardening Security Tips (en)]]  | * [[SERVER: 20 Linux Server Hardening Security Tips (en)]]  | ||
| − | |||
* [[SERVER: Postfix (en)]]  | * [[SERVER: Postfix (en)]]  | ||
* [[SERVER: Squirrelmail (en)]]  | * [[SERVER: Squirrelmail (en)]]  | ||
| Line 627: | Line 496: | ||
* [[SERVER: IMAP (en)]]  | * [[SERVER: IMAP (en)]]  | ||
* [[SERVER: SMTP (en)]]  | * [[SERVER: SMTP (en)]]  | ||
| − | * [[SERVER: MailScanner Installation (en)]]  | + | * [[SERVER: MailScanner: Installation (en)]]  | 
| − | |||
| − | * [  | + | * [http://tldp.org/HOWTO/html_single/Security-HOWTO/ SERVER: Linux Security Howto (en)]  | 
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| + | ==FIREWALL==  | ||
* [[FIREWALL: Firewall]]  | * [[FIREWALL: Firewall]]  | ||
* [[FIREWALL: iptables]]  | * [[FIREWALL: iptables]]  | ||
* [[FIREWALL: iptables: Mini howto]]  | * [[FIREWALL: iptables: Mini howto]]  | ||
| − | * [[FIREWALL: iptables:   | + | * [[FIREWALL: iptables: Create NAT]]  | 
| − | * [[FIREWALL: iptables:   | + | * [[FIREWALL: iptables: Create DMZ]]  | 
| − | * [[FIREWALL: iptables:   | + | * [[FIREWALL: iptables: Setup Default]]  | 
| Line 650: | Line 514: | ||
* [[FIREWALL: iptables (en)]]  | * [[FIREWALL: iptables (en)]]  | ||
* [[FIREWALL: iptables: Mini howto (en)]]  | * [[FIREWALL: iptables: Mini howto (en)]]  | ||
| − | * [[FIREWALL: iptables:   | + | * [[FIREWALL: iptables: Create NAT (en)]]  | 
| − | * [[FIREWALL: iptables:   | + | * [[FIREWALL: iptables: Create DMZ (en)]]  | 
| − | * [[FIREWALL: iptables:   | + | * [[FIREWALL: iptables: Setup Default (en)]]  | 
==SECURE SHELL & SECURE COPY==  | ==SECURE SHELL & SECURE COPY==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[ssh]]  | * [[ssh]]  | ||
| Line 689: | Line 542: | ||
==VIRTUAL PRIVATE NETWORK (VPN)==  | ==VIRTUAL PRIVATE NETWORK (VPN)==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[VPN: Virtual Private Network]]  | * [[VPN: Virtual Private Network]]  | ||
| Line 738: | Line 576: | ||
==WEB APPLICATION FIREWALL==  | ==WEB APPLICATION FIREWALL==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[WAF: Web Application Firewall]]  | * [[WAF: Web Application Firewall]]  | ||
| Line 760: | Line 591: | ||
==HOST DEFENCE==  | ==HOST DEFENCE==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[HIDS: Tripwire]]  | * [[HIDS: Tripwire]]  | ||
| Line 797: | Line 616: | ||
==INTRUSION DETECTION SYSTEM (IDS)==  | ==INTRUSION DETECTION SYSTEM (IDS)==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[IDS: Intrusion Detection System]]  | * [[IDS: Intrusion Detection System]]  | ||
| Line 840: | Line 646: | ||
==BASIC DATA SECURITY==  | ==BASIC DATA SECURITY==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[GnuPG: GNU Privacy Guard]]  | * [[GnuPG: GNU Privacy Guard]]  | ||
| Line 867: | Line 661: | ||
* [[GnuPG: GNU Privacy Guard (en)]]  | * [[GnuPG: GNU Privacy Guard (en)]]  | ||
* [[GnuPG: Howto (en)]]  | * [[GnuPG: Howto (en)]]  | ||
| − | * [[GnuPG:   | + | * [[GnuPG: Mini Howto (en)]]  | 
* [[GnuPG: Privacy Handbook (en)]]  | * [[GnuPG: Privacy Handbook (en)]]  | ||
* [[OpenSSL (en)]]  | * [[OpenSSL (en)]]  | ||
| − | * [[OpenSSL:   | + | * [[OpenSSL: Evaluating e-Banking Sites (en)]]  | 
* [[OpenSSL: Simple Tutorial (en)]]  | * [[OpenSSL: Simple Tutorial (en)]]  | ||
| − | * [[OpenSSL:   | + | * [[OpenSSL: Encrypt Decrypt File (en)]]  | 
| − | * [[OpenSSL:   | + | * [[OpenSSL: Setting SSL for HTTPS in Ubuntu (en)]]  | 
| − | * [[OpenSSL:   | + | * [[OpenSSL: Creating RootCA (en)]]  | 
| Line 883: | Line 677: | ||
* [https://www.youtube.com/watch?v=q2wBmfCUzCI YOUTUBE: Experimen dengan GnuPG]  | * [https://www.youtube.com/watch?v=q2wBmfCUzCI YOUTUBE: Experimen dengan GnuPG]  | ||
* [https://www.youtube.com/watch?v=VWFiruMTdtU YOUTUBE: Penggunakan Enigmail di Thunderbird]  | * [https://www.youtube.com/watch?v=VWFiruMTdtU YOUTUBE: Penggunakan Enigmail di Thunderbird]  | ||
| − | |||
| − | |||
| − | |||
==FORENSIK==  | ==FORENSIK==  | ||
| Line 898: | Line 689: | ||
==INFORMATION SECURITY MANAGEMENT SYSTEM==  | ==INFORMATION SECURITY MANAGEMENT SYSTEM==  | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
* [[Keamanan Informasi]]  | * [[Keamanan Informasi]]  | ||
Latest revision as of 06:28, 7 January 2025
TCP/IP CONCEPT
- TCP/IP: Konsep Dasar
 - TCP/IP: Sejarah Internet Indonesia
 - TCP/IP: Penggunaan Wireshark
 - TCP/IP: Penggunaan tcpdump
 
- TCP/IP: Basic Concept (en)
 - TCP/IP: Indonesia Internet History(en)
 - TCP/IP: Wireshark howto(en)
 - TCP/IP: tcpdump howto (en)
 
NETWORK SIMULATOR
- SIMULATOR: Simulasi Jaringan
 - SIMULATOR: VirtualBox Instalasi
 - SIMULATOR: OpenWRT membuat router
 - SIMULATOR: OpenWRT X86 untuk VirtualBox
 - SIMULATOR: GNS3: Simulator Jaringan
 - SIMULATOR: CISCO: Packet Tracer
 - SIMULATOR: GNS3: Menyambungkan LAN / Switch ke Cloud Internet
 - SIMULATOR: GNS3: Menyambungkan LAN / Switch ke NAT
 - SIMULATOR: Mikrotik: Router Sederhana
 - SIMULATOR: GNS3: Jaringan Sederhana dengan OpenWRT
 
- SIMULATOR: Network Simulator (en)
 - SIMULATOR: VirtualBox Installation (en)
 - SIMULATOR: OpenWRT Router Creation (en)
 - SIMULATOR: OpenWRT X86 for VirtualBox (en)
 - SIMULATOR: GNS3: Network Simulator (en)
 - SIMULATOR: CISCO: Packet Tracer (en)
 - SIMULATOR: GNS3: Connecting LAN / Switch to Internet Cloud (en)
 - SIMULATOR: GNS3: Connecting LAN / Switch to NAT (en)
 - SIMULATOR: Mikrotik: Simple Router (en)
 - SIMULATOR: GNS3: Simple Network with OpenWRT (en)
 
IPv6
- IPv6: Kuliah Lengkap
 - IPv6: Buku (1)
 - IPv6: Buku (2)
 - YOUTUBE: Lebih Dalam dengan IPv6
 - YOUTUBE: Cek Kesiapan Sistem untuk IPv6
 - YOUTUBE: Konfigurasi Interface IPv6
 - YOUTUBE: Route Jaringan IPv6
 - YOUTUBE: Mengkonfigurasi IPv6 Presisten dan Automatis
 - YOUTUBE: Keamanan IPv6
 - YOUTUBE: IPv6 Mobility
 - YOUTUBE: IPv6 Web Server
 - YOUTUBE: Domain Name System IPv6
 
ROUTING
- Routing
 - Routing: Statik
 - Routing: Dinamis
 - Routing: Network Address Translation
 - Routing: Advanced
 - Routing: Quagga
 - Routing: OSPF6D Quagga di OpenWRT
 - Routing: OSPF6 Quagga IPv6
 
- Routing (en)
 - Routing: Static (en)
 - Routing: Dynamic (en)
 - Routing: Network Address Translation (en)
 - Routing: Advanced (en)
 - Routing: Quagga (en)
 - Routing: OSPF6D Quagga in OpenWRT (en)
 - Routing: OSPF6 Quagga IPv6 (en)
 
- YOUTUBE: Mikrotik Routing Statik dengan 2 Router
 - YOUTUBE: Mikrotik Routing OSPF Sederhana
 - YOUTUBE: Mikrotik Routing BGP
 
ADVANCED ROUTING
- Routing: Mikrotik: OSPF Sederhana
 - Routing: Mikrotik: OSPF multi-area network
 - Routing: Mikrotik: BGP Sederhana tanpa filter
 - Routing: Mikrotik: BGP 2 link ke 3 BGP redistribute 2 OSPF
 - Routing: Cisco: OSPF Sederhana
 - Routing: Cisco: OSPF multi-area network
 - Routing: Cisco: BGP Sederhana tanpa filter
 - Routing: Cisco: BGP 2 link ke 3 BGP redistribute 2 OSPF
 - Routing: Quagga: OSPF Sederhana
 - Routing: Quagga: OSPF Multi-area network
 - Routing: IPv6: Mikrotik: OSPF Sederhana
 - Routing: IPv6: Mikrotik: OSPF multi-area network
 - Routing: IPv6: Mikrotik: BGP Sederhana tanpa filter
 - Routing: IPv6: Cisco: OSPF Sederhana
 - Routing: IPv6: Cisco: OSPF multi-area network
 - Routing: IPv6: Cisco: BGP Sederhana tanpa filter
 - Routing: IPv6: Quagga: BGP Sederhana tanpa filter
 
- Routing: Mikrotik: Simple OSPF (en)
 - Routing: Mikrotik: OSPF Multi-area Network (en)
 - Routing: Mikrotik: Simple BGP without Filters (en)
 - Routing: Mikrotik: BGP 2 Links to 3 BGP Redistribute 2 OSPF (en)
 - Routing: Cisco: Simple OSPF (en)
 - Routing: Cisco: OSPF Multi-area Network (en)
 - Routing: Cisco: Simple BGP without Filters (en)
 - Routing: Cisco: BGP 2 Links to 3 BGP Redistribute 2 OSPF (en)
 - Routing: Quagga: Simple OSPF (en)
 - Routing: Quagga: OSPF Multi-area Network (en)
 - Routing: IPv6: Mikrotik: Simple OSPF (en)
 - Routing: IPv6: Mikrotik: OSPF Multi-area Network (en)
 - Routing: IPv6: Mikrotik: Simple BGP without Filters (en)
 - Routing: IPv6: Cisco: Simple OSPF (en)
 - Routing: IPv6: Cisco: OSPF Multi-area Network (en)
 - Routing: IPv6: Cisco: Simple BGP without Filters (en)
 - Routing: IPv6: Quagga: Simple BGP without Filters (en)
 
VoIP and OpenBTS
- VoIP
 - VoIP: Softswitch
 - VoIP: Asterisk Softswitch
 - VoIP: Kamailio Softswitch
 - VoIP: ENUM
 - VoIP: OpenBTS
 - VoIP: 5G
 
- VoIP(en)
 - VoIP: Softswitch(en)
 - VoIP: Asterisk Softswitch(en)
 - VoIP: Kamailio Softswitch(en)
 - VoIP: ENUM(en)
 - VoIP: OpenBTS(en)
 - VoIP: 5G(en)
 
NETWORK BENCHMARKING
- Benchmarking: Network Management System
 - Benchmarking: Network
 - Benchmarking: Data Center Tier Standard
 - Benchmarking: iperf: mengukur kapasitas sambungan
 - Benchmarking: Tuning Kernel untuk Network Performance
 - Benchmarking: dnsperf: mengukur kinerja DNS Server
 
- Benchmarking: Network Management System (en)
 - Benchmarking: Network (en)
 - Benchmarking: Data Center Tier Standard (en)
 - Benchmarking: iperf: Measuring Connection Capacity (en)
 - Benchmarking: Tuning Kernel for Network Performance (en)
 - Benchmarking: dnsperf: Measuring DNS Server Performance (en)
 
- YOUTUBE: Mengukur / benchmarking file sharing server dg dbench
 - YOUTUBE: Benchmarking linux network
 - YOUTUBE: Mengukur pps server router dengan hping3
 - YOUTUBE: Overview Network Management
 - YOUTUBE: UBUNTU 20.04 instalasi SNMP
 
NETWORK PROGRAMMING
Materi lebih lengkap untuk Network Programming, ada di kuliah (FREE) Internet of Things (IoT).
- IoT: Network Programming
 - IoT: Socket Programming Menggunakan Python
 - IoT: Membuat Apps Android dengan AppInventor
 - IoT: Internet of Things
 - IoT: Arduino
 - IoT: WeMOS
 
- IoT: Network Programming (en)
 - IoT: Socket Programming Using Python (en)
 - IoT: Creating Android Apps with AppInventor (en)
 - IoT: Internet of Things (en)
 - IoT: Arduino (en)
 - IoT: WeMOS (en)
 
INTRO HACKING
- HACKER: Hacker
 - HACKER: Dunia Bawah Tanah di Internet
 - HACKER: Etika Hacker
 - HACKER: Aturan Main Hacker
 - HACKER: Bagaimana Proses Hacking Dilakukan
 - HACKER: Memahami Karakteristisk Komunitas Hacker
 - HACKER: Beberapa Tip Hacking
 - HACKER: Ethical Hacking
 
- HACKER: Hacker (en)
 - HACKER: The Internet Underworld (en)
 - HACKER: Hacker Ethics (en)
 - HACKER: Hacker Rules of Engagement (en)
 - HACKER: How the Hacking Process is Conducted (en)
 - HACKER: Understanding Hacker Community Characteristics (en)
 - HACKER: Various Hacking Tips (en)
 - HACKER: Ethical Hacking (en)
 
HACKING PREPARATION
- HACKER: Siapkan Kali Linux
 - HACKER: telnet server
 - HACKER: Squirrelmail
 - HACKER: SAMBA
 - HACKER: SAMBA: menambahkan user
 - HACKER: DVWA
 - HACKER: DVWA: Instalasi
 - HACKER: MySQL: membuat vulnerable
 - HACKER: MySQL: membuka blok akses
 
- HACKER: Set Up Kali Linux (en)
 - HACKER: Telnet Server (en)
 - HACKER: Squirrelmail (en)
 - HACKER: SAMBA (en)
 - HACKER: SAMBA: Adding User (en)
 - HACKER: DVWA (en)
 - HACKER: DVWA: Installation (en)
 - HACKER: MySQL: Making Vulnerable (en)
 - HACKER: MySQL: Opening Access Block (en)
 
FOOT PRINTING (INTELLIGENCE)
- FOOT PRINTING: Perencanaan Pengujian Penetrasi Sasaran Jaringan
 - FOOT PRINTING: Workflow Pengintaian Serangan dari Hacker
 - FOOT PRINTING: nmap
 - FOOT PRINTING: Teknik Scan Sasaran Serangan menggunakan Unicornscan
 - FOOT PRINTING: whois
 - FOOT PRINTING: Scan Vulnerability menggunakan Grabber
 - FOOT PRINTING: Evaluasi Situs e-Banking Indonesia
 
- FOOT PRINTING: Planning Network Target Penetration Testing (en)
 - FOOT PRINTING: Hacker Attack Reconnaissance Workflow (en)
 - FOOT PRINTING: nmap (en)
 - FOOT PRINTING: Unicornscan: Scanning Attack Targets (en)
 - FOOT PRINTING: whois (en)
 - FOOT PRINTING: Grabber: Scanning Vulnerabilities (en)
 - FOOT PRINTING: Evaluating Indonesian e-Banking Sites (en)
 
SNIFFING
- SNIFFING: Wireshark
 - SNIFFING: tcpdump
 - SNIFFING: MITM: Konsep
 - SNIFFING: MITM: ARPSpoof
 - SNIFFING: MITM: Proxy
 
- SNIFFING: Wireshark (en)
 - SNIFFING: tcpdump (en)
 - SNIFFING: MITM: Concept (en)
 - SNIFFING: MITM: ARPSpoof (en)
 - SNIFFING: MITM: Proxy (en)
 
HACKING WIRELESS
- WIRELESS: Wajanbolid e-goen
 - WIRELESS: Wireless Internet berbasis WiFi
 - WIRELESS: Disain Jaringan WiFi
 - WIRELESS: Disain Jaringan Wireless Menggunakan Radio Mobile Wireless
 - WIRELESS: MESH menggunakan OLSR
 - WIRELESS: Wireless Hacking
 - WIRELESS: Scanning HotSpot
 - WIRELESS: Teknik Menjebol WEP
 - WIRELESS: Teknik Menjebol WPA
 - WIRELESS: Reaver: Penetrasi Keamanan Wireless
 - WIRELESS: Reaver: 5 Langkah Menjebol WPA
 - WIRELESS: Reaver: Tip dan Trick
 
- WIRELESS: Wajanbolic e-goen (en)
 - WIRELESS: WiFi-based Wireless Internet (en)
 - WIRELESS: WiFi Network Design (en)
 - WIRELESS: Wireless Network Design Using Radio Mobile Wireless (en)
 - WIRELESS: MESH using OLSR (en)
 - WIRELESS: Wireless Hacking (en)
 - WIRELESS: Scanning HotSpot (en)
 - WIRELESS: Techniques for Cracking WEP (en)
 - WIRELESS: Techniques for Cracking WPA (en)
 - WIRELESS: Reaver: Wireless Security Penetration (en)
 - WIRELESS: Reaver: 5 Steps to Crack WPA (en)
 - WIRELESS: Reaver: Tips and Tricks (en)
 
ATTACK PASSWORD
- PASSWORD: Password Attack menggunakan Kali Linux
 - PASSWORD: Password Attack Menggunakan Hydra
 - PASSWORD: Teknik Menjebol Password Windows dengan JohnTheRipper
 - PASSWORD: Hack Password Online dengan Kali Linux
 - PASSWORD: Hack Password Offline dengan Kali Linux
 - PASSWORD: ophcrack - untuk menjebol password windows
 
- PASSWORD: Password Attack using Kali Linux (en)
 - PASSWORD: hydra: Password Attack (en)
 - PASSWORD: JohnTheRipper: Cracking Windows Passwords (en)
 - PASSWORD: Hack Online Passwords with Kali Linux (en)
 - PASSWORD: Hack Offline Passwords with Kali Linux (en)
 - PASSWORD: ophcrack: Cracking Windows Passwords (en)
 
ATTACK DATABASE SQL
- SQL: nmap: serang SQL
 - SQL: nmap: cek SQL Injection
 - SQL: nmap: hack password mysql
 - SQL: SQLMap
 - SQL: SQLMap: SQLInjection ke DVWA
 - SQL: SQLMap: contoh remote hack database
 
- SQL: nmap: SQL Attack (en)
 - SQL: nmap: Check SQL Injection (en)
 - SQL: nmap: Hack MySQL Password (en)
 - SQL: SQLMap (en)
 - SQL: SQLMap - SQL Injection to DVWA (en)
 - SQL: SQLMap - Example of Remote Database Hack (en)
 
DOMAIN NAME SYSTEM and DEFACE WEB
- APNIC
 - Internet Society
 - Internet Engineerig Task Force (IETF)
 - Internet Assigned Numbers Authority (IANA)
 
- DNS: Domain Name System
 - DNS: ICANN
 - DNS: PowerDNS
 - DNS: Konfigurasi DNS Menggunakan Webmin
 - HACKING: deface
 - HACKING: Web Deface
 - HACKING: 13 Langkah Deface Web
 - HACKING: Defacing Rooting untuk Pemula
 
- DNS: Domain Name System (en)
 - DNS: ICANN (en)
 - DNS: PowerDNS (en)
 - DNS: Webmin: DNS Configuration (en)
 - HACKING: deface (en)
 - HACKING: Web Deface (en)
 - HACKING: 13 Steps to Web Deface (en)
 - HACKING: Defacing Rooting for Beginners (en)
 
ATTACK FILE SHARING
- SHARING: Enumerasi SMB Share
 - SHARING: Brute Force Hack SMB Password
 - SHARING: Membobol File Sharing SAMBA
 - SHARING: Membobol Password File Sharing di Windows 7
 - SHARING: SAMBA membuat user untuk samba
 
- SHARING: SMB Share Enumeration (en)
 - SHARING: Brute Force Hack SMB Password (en)
 - SHARING: Cracking SAMBA File Sharing (en)
 - SHARING: Cracking File Sharing Passwords in Windows 7 (en)
 - SHARING: SAMBA Creating Users (en)
 
OVERVIEW CYBER SECURITY
- SECURITY: Keamanan Jaringan
 - SECURITY: Cyber Security Technology Map
 - SECURITY: Cyber Defence
 - SECURITY: 20 Linux Server Hardening Security Tips
 - SECURITY: Basic OS Security
 
- SECURITY: Network Security (en)
 - SECURITY: Cyber Security Technology Map (en)
 - SECURITY: Cyber Defence (en)
 - SECURITY: 20 Linux Server Hardening Security Tips (en)
 - SECURITY: Basic OS Security (en)
 
- SECURITY: Linux Security Howto (en)
 - SECURITY: BSSN: Security Report
 - SECURITY: Apps Security Principle
 - SECURITY: PHP Security Best Practice
 - YOUTUBE: Cyber Security
 
VULNERABILITY ANALYSIS
- VULNERABILITY: Network Target Penetration Testing Planning
 - VULNERABILITY: Web Directory Traversal Vulnerability
 - VULNERABILITY: nikto: Search Web Vulnerability
 - VULNERABILITY: nikto: Check DVWA
 - VULNERABILITY: Grabber: Scan Vulnerability
 - VULNERABILITY: w3af
 - VULNERABILITY: OpenVAS Installation
 - VULNERABILITY: Legion
 
- VULNERABILITY: Network Target Penetration Testing Planning (en)
 - VULNERABILITY: Web Directory Traversal Vulnerability (en)
 - VULNERABILITY: nikto: Search Web Vulnerability (en)
 - VULNERABILITY: nikto: Check DVWA (en)
 - VULNERABILITY: Grabber: Scan Vulnerability (en)
 - VULNERABILITY: w3af (en)
 - VULNERABILITY: OpenVAS: Installation (en)
 - VULNERABILITY: Legion (en)
 
BASIC SERVER SECURITY
- SERVER: 20 Linux Server Hardening Security Tips
 - SERVER: Postfix
 - SERVER: Squirrelmail
 - SERVER: List SMTP Servers various ISP
 - SERVER: POP3
 - SERVER: IMAP
 - SERVER: SMTP
 - SERVER: MailScanner Installation
 
- SERVER: 20 Linux Server Hardening Security Tips (en)
 - SERVER: Postfix (en)
 - SERVER: Squirrelmail (en)
 - SERVER: List SMTP Servers various ISP (en)
 - SERVER: POP3 (en)
 - SERVER: IMAP (en)
 - SERVER: SMTP (en)
 - SERVER: MailScanner: Installation (en)
 
FIREWALL
- FIREWALL: Firewall
 - FIREWALL: iptables
 - FIREWALL: iptables: Mini howto
 - FIREWALL: iptables: Create NAT
 - FIREWALL: iptables: Create DMZ
 - FIREWALL: iptables: Setup Default
 
- FIREWALL: Firewall (en)
 - FIREWALL: iptables (en)
 - FIREWALL: iptables: Mini howto (en)
 - FIREWALL: iptables: Create NAT (en)
 - FIREWALL: iptables: Create DMZ (en)
 - FIREWALL: iptables: Setup Default (en)
 
SECURE SHELL & SECURE COPY
- ssh
 - ssh: automatic login
 - ssh: remote execute
 - ssh: remote display X forwarding
 - ssh: security
 - ssh: reverse ssh
 - scp
 - scp: example
 - rsync
 
- ssh (en)
 - ssh: automatic login (en)
 - ssh: remote execute (en)
 - ssh: remote display X forwarding (en)
 - ssh: security (en)
 - ssh: reverse ssh (en)
 - scp (en)
 - scp: example (en)
 - rsync (en)
 
VIRTUAL PRIVATE NETWORK (VPN)
- VPN: Virtual Private Network
 - VPN: PPTP Installation
 - VPN: OpenVPN Installation
 - OpenVPN
 - OpenVPN: Ubuntu 16.04 Installation
 - OpenVPN: Ubuntu 18.04 Installation
 - OpenVPN: IPv4 /32 single client
 - OpenVPN: IPv4 /32 multi-client
 - OpenVPN: IPv4 routed LAN
 - OpenVPN: IPv4 routed 2 LAN
 - OpenVPN: IPv6 /128 single client
 - OpenVPN: IPv6 routed LAN
 - OpenVPN: IPv6 routed 2 LAN
 
- VPN: Virtual Private Network (en)
 - VPN: PPTP Installation (en)
 - VPN: OpenVPN Installation (en)
 - OpenVPN (en)
 - OpenVPN: Ubuntu 16.04 Installation (en)
 - OpenVPN: Ubuntu 18.04 Installation (en)
 - OpenVPN: IPv4 /32 single client (en)
 - OpenVPN: IPv4 /32 multi-client (en)
 - OpenVPN: IPv4 routed LAN (en)
 - OpenVPN: IPv4 routed 2 LAN (en)
 - OpenVPN: IPv6 /128 single client (en)
 - OpenVPN: IPv6 routed LAN (en)
 - OpenVPN: IPv6 routed 2 LAN (en)
 
WEB APPLICATION FIREWALL
- WAF: Web Application Firewall
 - WAF: ModSecurity
 - WAF: ModSecurity: Installation
 - WAF: ModSecurity: Installation and ModEvasive
 - WAF: ModSecurity: Tools
 
- WAF: Web Application Firewall (en)
 - WAF: ModSecurity (en)
 - WAF: ModSecurity: Installation (en)
 - WAF: ModSecurity: Installation and ModEvasive (en)
 - WAF: ModSecurity: Tools (en)
 
HOST DEFENCE
- HIDS: Tripwire
 - HIDS: dd - partition copy
 - HIDS: netstat
 - HIDS: lynis
 - HIDS: rkhunter
 - HIDS: OSSEC
 - HIDS: chkrootkit
 - HIDS: chown
 - HIDS: chmod
 - HIDS: find
 
- HIDS: Tripwire (en)
 - HIDS: dd - partition copy (en)
 - HIDS: netstat (en)
 - HIDS: lynis (en)
 - HIDS: rkhunter (en)
 - HIDS: OSSEC (en)
 - HIDS: chkrootkit (en)
 - HIDS: chown (en)
 - HIDS: chmod (en)
 - HIDS: find (en)
 
INTRUSION DETECTION SYSTEM (IDS)
- IDS: Intrusion Detection System
 - IDS: snort
 - IDS: snort: Ubuntu 18.04 Installation
 - IDS: snort: snort.log file howto read
 - IDS: snort: write rules for beginner
 - IDS: suricata
 - IDS: suricata: Ubuntu 18.04 Installation
 - IDS: suricata: Ubuntu 18.04 minimal configuration
 - IDS: suricata: DDoS Attack test
 - IDS: OSSEC HIDS
 - IDS: OSSEC HIDS: Ubuntu 18.04 installation
 
- IDS: Intrusion Detection System (en)
 - IDS: snort (en)
 - IDS: snort: Ubuntu 18.04 Installation (en)
 - IDS: snort: snort.log file howto read
 - IDS: snort: write rules for beginner
 - IDS: suricata (en)
 - IDS: suricata: Ubuntu 18.04 Installation (en)
 - IDS: suricata: Ubuntu 18.04 minimal configuration (en)
 - IDS: suricata: DDoS Attack test
 - IDS: OSSEC HIDS (en)
 - IDS: OSSEC HIDS: Ubuntu 18.04 installation (en)
 
BASIC DATA SECURITY
- GnuPG: GNU Privacy Guard
 - GnuPG: Howto
 - GnuPG: mini howto
 - GnuPG: Privacy Handbook
 - OpenSSL
 - OpenSSL: Mengevaluasi Situs e-Banking
 - OpenSSL: Simple Tutorial
 - OpenSSL: encrypt decrypt file
 - OpenSSL: set SSL untuk https di Ubuntu
 - OpenSSL: Membuat RootCA
 
- GnuPG: GNU Privacy Guard (en)
 - GnuPG: Howto (en)
 - GnuPG: Mini Howto (en)
 - GnuPG: Privacy Handbook (en)
 - OpenSSL (en)
 - OpenSSL: Evaluating e-Banking Sites (en)
 - OpenSSL: Simple Tutorial (en)
 - OpenSSL: Encrypt Decrypt File (en)
 - OpenSSL: Setting SSL for HTTPS in Ubuntu (en)
 - OpenSSL: Creating RootCA (en)
 
- YOUTUBE: Konsep Public Key Infrastructure & Certificate Authority
 - YOUTUBE: Konsep PKI & CA di UU ITE
 - YOUTUBE: Public Key Infrastructure & Certificate Authority
 - YOUTUBE: Experimen dengan GnuPG
 - YOUTUBE: Penggunakan Enigmail di Thunderbird
 
FORENSIK
INFORMATION SECURITY MANAGEMENT SYSTEM
- Keamanan Informasi
 - Keamanan Informasi: Framework
 - Keamanan Informasi: Incident Management
 - Keamanan Informasi: Manajemen Resiko IT
 
- Information Security (en)
 - Information Security: Framework (en)
 - Information Security: Incident Management (en)
 - Information Security: IT Risk Management