3.ethical Hacking Part Lanjutan

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

ETHICAL

HACKING
Tahap-tahap PenTest
Presentation title 2

SETTING HACKING LAB


1. Install Virtual Box
2. Install Virtual Machine
3. Kali Linux
4. Metasploitable
5. Network Setting
Presentation title 3

DASAR-DASAR
LINUX
• System navigation
• File & Dir Management
• File System
• Sudo Privilege
TAHAP-TAHAP
PENTESTING
1. Reconnaissane (Inormation Gathering)
• Mengidentiikasikan IP address, physical
address, email address, username dll.
• Tool: Whois, Whatsweb, theHarvester,
Hunter.io, Sherlock
• Membuat tool sendiri di Phyton
2. Scanning (information gathering-private)
• TCP & UDP
• Port Scanning
• Port Service Version Scanning
• Operating System Scanning
• Firewall/IDS
• Bypassing firewalls
- Decoys & packet fragmentation
- Security evasion
• Tools: Netdiscover, Nmap
• Membuat tools port scanner sendiri dengan phyton
3. Vulnerability Analysis
• Menganalisa dari sebuah system
• Tools:
- Nmaps Scripts
- Searchsploit
- Nessus
- dll
4. Exploitation (Target System)
• Pengenalan Reverse Shell dan bind shell
- Telnet Exploit
- Samba Exploitation
- Vstpd 2.3.4 Exploitation
- SSH – Bruteforce Attack
- Eternal Blue Attack
- Double Pulsar Attack
- BlueKeep Attack
- Routersploit
• Tools: Metasploit framework
5. Post Exploitation
• Msvenom: membuat payload, virus, trojan
• Mendalami meterpreter
- Windows control dengan privilege penuh
- Membuat keylogger (apasaja yg diketik oleh user bisa
di simpan)
- Mengambil screenshot
- Menjalankan screen recorder
- Mengakses kamera
- Mengakses Audio
- Menginstall program
- Menghapus Program
- Membuat,Menghapus, Mengupload, mendownload file
• Membuat script backdoor dengan bahasa phyton
WEB HACKING
Presentation title 9

• HTTP request & response


• Dirb Tool
• Burpsuite Coniguration
• Shellshock Exploitation
• Command Injection Exploitation
• Relected XSS & Cookie Stealing
• HTML Injection
• SQL Injection
• CSR Vulnerability
• Hydra Bruteorce Attack
• Burpsuite Intruder
Presentation title 10

MAN IN THE MIDDLE (MITM)


• Spy aktivitas user di internet
Contoh: situs apa yang ia kunjungi, apa yang user ketik saat login di sebuah akun.
• Tools: Bettercap ARP Spoofing, Ettercap Password Snifing, Scapy.
Presentation title 11

WIRELESS ACCESS POINT WAP


• Aircrack Password Cracking
CRACKING
• Hashcat password Cracking
Presentation title 12

ANDROID HACKING
• Menginstall Kali Linux di Android
• Hack Android dengan Metasploit
• Mengakses android dengan android meterpreter
• Evil Droid
• Lemon
• Memasukkan malware ke apk
• Ghost ramework
• Ngrok
THANK YOU

You might also like