User contributions
Jump to navigation
Jump to search
- 19:34, 20 October 2024 diff hist +3,939 N Hands-On: Attack SQL Injection (en) Created page with "This module will guide you in conducting forensic investigations on SQL injection attacks that occur on a Linux server. We will analyze system logs, particularly Apache and Sn..."
- 19:33, 20 October 2024 diff hist +3,429 N SQL Injection Attack (en) Created page with "SQL Injection is a cyber attack technique in which an attacker injects malicious SQL code into data input, which is then executed by the database. This allows the attacker to..." current
- 19:31, 20 October 2024 diff hist +3,159 N SQL Overview (en) Created page with "Sure! Here's the translation into English while retaining the wiki format: '''SQL (Structured Query Language)''' is the standard language used for managing and manipulating d..."
- 19:29, 20 October 2024 diff hist +3,436 N Mitigating eMail Attacks: GnuPG (en) Created page with "This module will guide you step by step in securing your email communications using GnuPG (GNU Privacy Guard) encryption in the Thunderbird email client. GnuPG is a powerful a..."
- 19:26, 20 October 2024 diff hist +4,072 N Hands-On: Spoofing Attack on SMTP Server & WebMail (en) Created page with "=Email Spoofing Attacks= Email spoofing attacks have become a serious threat, particularly for banking customers such as BCA. Cybercriminals often exploit this technique to s..."
- 19:23, 20 October 2024 diff hist +3,640 N SMTP, POP3, IMAP Protocols (en) Created page with "=Simple Explanation of How SMTP, POP3, and IMAP Protocols Work= ==Main Differences:== * '''SMTP:''' Used only for sending emails. * '''POP3:''' Downloads emails to a local d..." current
- 19:21, 20 October 2024 diff hist +4,888 N Intrusion Investigation (en) Created page with "'''Network Investigation''' is a systematic process of collecting, analyzing, and interpreting data from a computer network to identify, understand, and respond to cybersecuri..."
- 19:19, 20 October 2024 diff hist +3,900 N Tools and Techniques (en) Created page with "'''Network Investigation''' is the process of collecting, analyzing, and interpreting network data to identify, understand, and respond to cybersecurity incidents. In the cont..."
- 18:58, 20 October 2024 diff hist +4,384 N Basic Network Concepts (en) Created page with "'''Network investigation''' is a systematic process of collecting, analyzing, and interpreting data from a computer network for investigative purposes, particularly in cases o..." current
- 18:56, 20 October 2024 diff hist +4,712 N Mobile Operating System (en) Created page with "==Mobile Operating System Forensic Investigation== Forensic investigation on mobile operating systems is becoming increasingly crucial as society's dependence on mobile devic..." current
- 18:50, 20 October 2024 diff hist +4,385 N Linux Operating System (en) Created page with "==Operating System Linux in Digital Forensics== Linux, with its flexibility and open-source nature, is a primary target in various digital investigations. A deep understandin..."
- 18:14, 20 October 2024 diff hist +3,988 N Windows Operating System (en) Created page with "==Windows Operating System Investigation== A Windows operating system investigation involves the process of collecting, analyzing, and interpreting digital data stored within..." current
- 17:16, 20 October 2024 diff hist +4,173 N Trace Data Analysis (en) Created page with "'''Data analysis''' is the process of collecting, cleaning, transforming, and modeling data with the goal of discovering useful information, informing conclusions, and support..." current
- 17:14, 20 October 2024 diff hist +4,746 N Analysis Techniques (en) Created page with "'''File Carving, email Analysis, Web history analysis,''' and '''Registry analysis'''. These techniques are commonly used in digital forensic investigations to uncover hidden..."
- 17:09, 20 October 2024 diff hist +3,704 N Tools and Software (en) Created page with "'''Forensic data analysis''' is a scientific process of collecting, examining, and analyzing digital evidence found on electronic devices. This evidence can include files, ema..." current
- 17:01, 20 October 2024 diff hist +4,051 N Documentation and Chain of Custody (en) Created page with "'''Documentation''' is a written or visual record that captures every stage of a process, from start to finish. In various fields, especially those involving physical evidence..."
- 08:04, 20 October 2024 diff hist +4,231 N Acquisition Techniques (en) Created page with "Sure, let’s discuss in detail the three forensic data acquisition techniques you mentioned: '''disk imaging''', '''memory dump''', and '''network traffic capture'''. ==Disk..."
- 07:58, 20 October 2024 diff hist +3,401 N Basic Principles of Acquisition (en) Created page with "'''Data Acquisition''' is the process of collecting data from various sources for the purpose of analysis, storage, or further utilization. The basic principles of data acquis..." current
- 07:57, 20 October 2024 diff hist +3,832 N Law and Ethics (en) Created page with "'''IT Forensics''' is a branch of forensic science that focuses on the collection, analysis, and presentation of digital evidence within a legal context. In Indonesia, this ac..." current
- 07:56, 20 October 2024 diff hist +2 Objectives and Scope (en) →Interesting Links current
- 07:55, 20 October 2024 diff hist +2,946 N Objectives and Scope (en) Created page with "'''IT Forensics''' is a branch of science focused on the identification, collection, analysis, and presentation of digital evidence in a legal context. The primary goals of IT..."
- 07:48, 20 October 2024 diff hist +3,052 N Definition and Basic Concepts (en) Created page with "'''IT Forensics''' is a branch of science that combines principles of computer science and law to collect, preserve, and analyze digital evidence. This digital evidence can be..." current
- 07:46, 20 October 2024 diff hist +1,604 Forensic: IT
- 07:40, 20 October 2024 diff hist +432 Forensic: IT
- 06:59, 20 October 2024 diff hist 0 Bingung Menulis Mulai Dari Mana current
- 06:59, 20 October 2024 diff hist +231 Bingung Menulis Mulai Dari Mana
- 06:57, 20 October 2024 diff hist 0 N File:How-to-read-a-book.jpeg current
- 05:35, 20 October 2024 diff hist +2,970 N Example of attackes dan forensic using Metasploitable (en) Created page with "'''IT Forensics''' is a branch of computer science that focuses on the collection, preservation, and analysis of digital data for investigative purposes. In the context of att..." current
- 05:35, 20 October 2024 diff hist -5 Forensic: IT →PERTEMUAN: Misc Attack & Forensic
- 05:32, 20 October 2024 diff hist +2,571 N Forenisc: msfvenom attack (en) Created page with "== Trojan Attacks on Android == A '''Trojan''' is a type of malware that disguises itself as a legitimate application or program to trick users into installing it. On Android..." current
- 05:32, 20 October 2024 diff hist +2,601 Forenisc: msfvenom attack current
- 05:26, 20 October 2024 diff hist +3,874 N Forensic: msfconsole use auxiliary/scanner/smb/smb enumshares attack (en) Created page with "==What is `msfconsole use auxiliary/scanner/smb/smb_enumshares`?== This command is one of the modules in the Metasploit Framework used for enumeration or reconnaissance of th..." current
- 05:23, 20 October 2024 diff hist -166 Forensic: msfconsole use auxiliary/scanner/smb/smb enumshares attack current
- 05:20, 20 October 2024 diff hist +4,252 Forensic: msfconsole use auxiliary/scanner/smb/smb enumshares attack
- 19:00, 19 October 2024 diff hist 0 USB OFFLINE: Ubuntu 24.04 Install KIWIX →Script start-kiwix.sh current
- 19:00, 19 October 2024 diff hist 0 USB OFFLINE: Ubuntu 24.04 Install KIWIX →Run
- 19:00, 19 October 2024 diff hist 0 USB OFFLINE: Ubuntu 24.04 Install KIWIX →Download zim backup wikipedia dan wikitionary
- 18:58, 19 October 2024 diff hist 0 USB OFFLINE: Ubuntu 24.04 Install KIWIX →Script start-kiwix.sh
- 18:58, 19 October 2024 diff hist 0 USB OFFLINE: Ubuntu 24.04 Install KIWIX →Run
- 18:52, 19 October 2024 diff hist -14 USB OFFLINE: Ubuntu 24.04 Install Moodle, Apache2, MariaDB, PHP 8 →Install Moodle current
- 18:49, 19 October 2024 diff hist -7 USB OFFLINE: Ubuntu 24.04 Install Moodle, Apache2, MariaDB, PHP 8 →Install Moodle
- 18:48, 19 October 2024 diff hist 0 USB OFFLINE: Ubuntu 24.04 Install Moodle, Apache2, MariaDB, PHP 8 →Siapkan folder /var/moodledata/
- 13:48, 19 October 2024 diff hist +23 Internet OFFLINE: Harddisk Siap Pakai PETUNJUK PEMAKAIAN →Langkah yang perlu dilakukan current
- 13:48, 19 October 2024 diff hist +41 Internet OFFLINE: Harddisk Siap Pakai PETUNJUK PEMAKAIAN →Akses Web Lokal
- 13:47, 19 October 2024 diff hist +32 USB OFFLINE: Ubuntu 24.04 Webmin current
- 13:45, 19 October 2024 diff hist +29 USB OFFLINE: Ubuntu 24.04 Webmin
- 13:38, 19 October 2024 diff hist +164 USB OFFLINE: Ubuntu 24.04 Webmin
- 13:34, 19 October 2024 diff hist +56 N USB OFFLINE: Ubuntu 24.04 Webmin Created page with " apt update apt -y install webmin --install-recommends"
- 13:33, 19 October 2024 diff hist +39 Internet offline →Ubuntu 24.04 current
- 10:25, 19 October 2024 diff hist +3,884 N Forensic: msfconsole use auxiliary/scanner/smb/smb login attack (en) Created page with "==What is `smb_login` Attack?== The `smb_login` attack is a module in Metasploit used for enumerating and authenticating against the Server Message Block (SMB) service. SMB i..." current