User contributions
Jump to navigation
Jump to search
- 18:52, 21 October 2024 diff hist -13 Memahami Common Vulnerabilities (CVE) →Apakah CVE?
- 18:50, 21 October 2024 diff hist +29 Pengertian Eksploitasi →Contoh Eksploitasi current
- 18:48, 21 October 2024 diff hist -2 Pengertian Eksploitasi →Bagaimana Eksploitasi Berfungsi?
- 18:24, 21 October 2024 diff hist +386 Enumeration Services: SMB, SNMP, FTP, HTTP current
- 18:10, 21 October 2024 diff hist +1 Enumeration Services: SMB, SNMP, FTP, HTTP →SMB (Server Message Block)
- 17:46, 21 October 2024 diff hist +60 N Kali Linux: Attack Active Directory Created page with " LDAPDomainDump https://github.com/dirkjanm/ldapdomaindump" current
- 17:46, 21 October 2024 diff hist +41 Kali Linux →Windows
- 17:41, 21 October 2024 diff hist +113 Enumeration Services: SMB, SNMP, FTP, HTTP →SMB (Server Message Block)
- 17:28, 21 October 2024 diff hist +88 Hands-on: Identifikasi Port, Services, dan Vulnerability Target →Nikto: Web Server Vulnerability Scanner current
- 10:26, 21 October 2024 diff hist +39 N Forensic: msfvenom attack Redirected page to Forenisc: msfvenom attack current Tag: New redirect
- 10:25, 21 October 2024 diff hist 0 Forensic: IT →PERTEMUAN: Misc Attack & Forensic
- 07:52, 21 October 2024 diff hist -53 Mitigasi eMail attack: GnuPG →Instalasi GnuPG dan Thunderbird current
- 07:51, 21 October 2024 diff hist -71 Mitigating eMail Attacks: GnuPG (en) →Installing GnuPG and Thunderbird current
- 05:41, 21 October 2024 diff hist +3,776 N Forensic Report: Findings (en) Created page with "==6. Examination Results== This section is the core of an investigation or audit. Here, all the evidence and data collected during the examination process will be presented,..." current
- 05:40, 21 October 2024 diff hist -178 Laporan Forensic: Hasil Temuan current
- 05:36, 21 October 2024 diff hist -78 Forensic Report: Examination Procedures (en) current
- 05:36, 21 October 2024 diff hist +3,797 N Forensic Report: Examination Procedures (en) Created page with "Sure! Here's the translated text in English while retaining the wiki format: ==5. Digital Forensic Examination Procedures== '''Digital forensic examination procedures''' are..."
- 05:35, 21 October 2024 diff hist -298 Laporan Forensic: Prosedur Pemeriksaan current
- 05:31, 21 October 2024 diff hist +3,270 N Forensic Report: Outline (en) Created page with "=Outline of IT Forensic Report= ==1. Title Page== * Title of the Report (clear and specific) * Name of the Report Author * Position or Affiliation * Date of Report Preparatio..." current
- 05:30, 21 October 2024 diff hist -244 Laporan Forensic: Outline current
- 05:24, 21 October 2024 diff hist -130 Hands-on Android Forensics using ADB for analyzing SMS, calls, contacts, WhatsApp, Location Data (en) current
- 05:23, 21 October 2024 diff hist +3,876 N Hands-on Android Forensics using ADB for analyzing SMS, calls, contacts, WhatsApp, Location Data (en) Created page with "Sure! Here’s the translated text in English, retaining the wiki format: ==Android Forensics on Ubuntu Using ADB== '''What is Android Forensics?''' Android forensics is a..."
- 05:22, 21 October 2024 diff hist -154 Hands-on Forensic Android menggunakan ADB untuk analisa SMS, panggilan, kontak, Whatsapp, Data Lokasi
- 05:18, 21 October 2024 diff hist +4,767 N Hands-on Android Forensics using ADB (en) Created page with "Here’s the translation while retaining the wiki format: ==Android Forensic Techniques on Ubuntu Using ADB== '''What is ADB?''' Android Debug Bridge (ADB) is a powerful co..."
- 05:16, 21 October 2024 diff hist -373 Hands-on Forensic Android menggunakan ADB
- 05:09, 21 October 2024 diff hist -184 Android Rooting Techniques if Necessary (en) current
- 05:08, 21 October 2024 diff hist -552 Teknik Rooting Android jika diperlukan current
- 05:08, 21 October 2024 diff hist +3,889 N Android Rooting Techniques if Necessary (en) Created page with "==Apa itu Rooting?== Rooting adalah proses mendapatkan akses root (administrasi penuh) pada sistem operasi Android. Dengan root, Anda bisa melakukan kustomisasi mendalam pada..."
- 05:04, 21 October 2024 diff hist +4,379 N Acquisition Techniques: Physical Extraction vs. Logical Extraction (en) Created page with "Here's the translated text while retaining the wiki format: == Acquisition Techniques in Mobile Forensics == Acquisition techniques are a crucial initial step in the mobile..." current
- 05:02, 21 October 2024 diff hist -1 Teknik Akuisisi Physical extraction vs. Logical extraction →Logical Extraction Menggunakan Ubuntu current
- 05:02, 21 October 2024 diff hist +5 Teknik Akuisisi Physical extraction vs. Logical extraction →Logical Extraction Menggunakan Ubuntu
- 05:02, 21 October 2024 diff hist +2 Teknik Akuisisi Physical extraction vs. Logical extraction →Physical Extraction
- 05:01, 21 October 2024 diff hist +4 Teknik Akuisisi Physical extraction vs. Logical extraction →Physical Extraction
- 05:01, 21 October 2024 diff hist -326 Teknik Akuisisi Physical extraction vs. Logical extraction
- 04:54, 21 October 2024 diff hist +2,958 N Characteristics of Mobile Devices: Mobile Operating Systems, Third-Party Applications, Cloud Storage (en) Created page with "'''Mobile Devices''' are computing devices designed for portability and ease of use. Some key characteristics of mobile devices include: ==Mobile Operating Systems== Mobile o..." current
- 04:51, 21 October 2024 diff hist -279 Karakteristik Perangkat Mobile: Sistem operasi mobile, Aplikasi pihak ketiga, Cloud storage current
- 04:48, 21 October 2024 diff hist +2,960 N Mitigation to secure files and file systems (en) Created page with "==General Mitigations:== * '''Update the System Regularly:''' ** Install system updates regularly to fix known security vulnerabilities. Use the command `sudo apt update &&..."
- 04:46, 21 October 2024 diff hist +2,565 N Hands-on File Forensics using dd, ntfsundelete, ext3undelete, and extundelete (en) Created page with "==Disclaimer:== * '''Always create a copy (image) of the disk or partition to be examined.''' Directly examining the original disk may damage the data under investigation. * '..."
- 04:44, 21 October 2024 diff hist +3,072 N Overview of dd, ntfsundelete, ext3undelete, and extundelete (en) Created page with "==What is a Data Recovery Tool?== A data recovery tool is a program designed to recover files that were accidentally deleted from a hard drive, flash drive, or other storage..."
- 04:43, 21 October 2024 diff hist +3,508 N Mitigation of backdoor in Ubuntu (en) Created page with "==What is a Backdoor?== Before we dive into mitigation steps, it’s important to understand what a backdoor is. A backdoor is a hidden entry point into a computer system tha..."
- 04:39, 21 October 2024 diff hist +3,440 N Forensic backdoor in Ubuntu (en) Created page with "'''This information is for educational and research purposes only.''' Using this information for illegal or unlawful activities is strictly prohibited. '''I strongly advise ag..." current
- 04:33, 21 October 2024 diff hist +2,622 N Hands-on mkfifo attack backdoor in DVWA via Command Injection (en) Created page with "'''mkfifo''' stands for '''make first-in-first-out'''. It is a command in Unix-based operating systems like Ubuntu that is used to create a *named pipe*. A pipe is an inter-pr..."
- 04:30, 21 October 2024 diff hist +2,622 N Mkfifo: how it works (en) Created page with "'''mkfifo''' stands for '''make first-in-first-out'''. It is a command in Unix-based operating systems like Ubuntu that is used to create a *named pipe*. A pipe is an inter-pr..." current
- 04:08, 21 October 2024 diff hist +2,725 N TCP port communication via nc (en) Created page with "Netcat (nc) is a highly versatile networking utility in Linux. Often referred to as the "Swiss Army Knife" of networking, netcat (nc) can be used for various tasks, from creat..." current
- 04:03, 21 October 2024 diff hist +3,395 N Mitigation of Command Injection Attack (en) Created page with "Command injection is a type of security attack where the attacker injects malicious commands into user input, which are then executed by the operating system. This allows the..." current
- 04:01, 21 October 2024 diff hist +3,668 N Forensic Command Injection Attack (en) Created page with "'''Command Injection''' is a type of security vulnerability where attackers can inject malicious commands into user input, which are then executed by the server. DVWA (Damn Vu..." current
- 19:42, 20 October 2024 diff hist +2,016 N Hands-on Command Injection Attack (en) Created page with "==Setting Up the Environment:== ===Install DVWA:=== * Download the DVWA ZIP file from [https://github.com/digininja/DVWA](https://github.com/digininja/DVWA). * Extract it to..." current
- 19:39, 20 October 2024 diff hist +3,290 N Command Line on a Linux Server (en) Created page with "CLI is a text-based user interface that allows users to interact directly with the operating system. In Linux, the CLI is very powerful and flexible, enabling users to execute..." current
- 19:38, 20 October 2024 diff hist +3,891 N Mitigation: Snort IPS (en) Created page with "'''SQL Injection''' is a cyber attack technique in which an attacker injects malicious SQL code into input data that is then executed by the database. The aim can be to steal..." current
- 19:36, 20 October 2024 diff hist +5,261 N Mitigation: SQL Injection (en) Created page with "SQL injection attacks are one of the biggest security threats to web applications. This attack allows attackers to inject malicious SQL code into user input, thereby manipulat..."