anatomy of hack
TRANSCRIPT
![Page 1: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/1.jpg)
Keamanan Jaringan Kuliah 3
Anatomy of Hack
Helmy Faisal M
![Page 2: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/2.jpg)
Hacker Evolution
![Page 3: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/3.jpg)
“ thieves have no honor. if you want to do computer security
research, do it wisely on your own system or on someone systems
who pays you as a security professional.. “
Pesan Moral
![Page 4: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/4.jpg)
Anatomy of Hack
• Reconnaissance = pengintaian
• Mapping Targets = Pemetaan Target
• System / Network Penetration = Penetrasi sistem / jaringan
![Page 5: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/5.jpg)
Anatomy of Hack
• Denial of Service
• Consolidation = konsolidasi / penggabungan
• Security = keamanan
![Page 6: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/6.jpg)
Reconnaissance
• Mekanisme yang digunakan untuk mengumpulkan informasi tentang sistem, server, atau jaringan.
• Social engineering, Site Reconnaissance.
• Account/Password information, phone number.
![Page 7: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/7.jpg)
Reconnaissance #2
• Network: IP Address, DNS, Proxy, Router, Server.
• Tools : nslookup, dig, whois, host, domtools, adig, axfr, etc..
![Page 8: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/8.jpg)
Mapping Targets
• Mendokumentasikan peta sistem target, jaringan, dan layanan pada sistem.
• War Dialing mengumpulkan hasil pengintaian yang potensi untuk diserang (poorly secured).
![Page 9: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/9.jpg)
Mapping Targets #2
• ICMP and TCP stack fingerprinting untuk memetakan IP dan layanan pada sistem.
• Tools : network discovery tools, traceroute, TCP/UDP scanner, port and vulnerabilities scanner, etherape, etc..
![Page 10: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/10.jpg)
System/Network Penetration
• Menakisme penyerangan terhadap aplikasi, layanan dan protokol jaringan komputer.
• Buffer overflow, account cracking, spoofing, exploit, hijacking, sniffing, etc..
• Tools: nessus, nikto, metasploit, satan, vlad, ettercap, chain and able, etc..
![Page 11: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/11.jpg)
Denial of Service (DoS)
• Mekanisme serangan yang dilakukan secara paralel terhadap aset, layanan, jaringan penetrasi untuk menghabiskan sumber daya pada sistem komputer. Sehingga sistem komputer tidak dapat menjalankan fungsinya dengan benar.
• Traffic Flooding, Request Flooding, SYN flooding, etc..
![Page 12: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/12.jpg)
Distribute DoS
![Page 13: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/13.jpg)
Distribute DoS
![Page 14: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/14.jpg)
Consolidation
• Mekanisme untuk menggabungkan keuntungan sistem dan jaringan yang telah diserang.
• Menghindari kontrol keamanan.
• Menghindari deteksi penyusupan.
• Menghapus jejak.
![Page 15: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/15.jpg)
Anatomy of Hack Overview
![Page 16: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/16.jpg)
Security
• Mekanisme pertahanan untuk melindungi diri dari serangan.
![Page 17: Anatomy of hack](https://reader038.vdocuments.us/reader038/viewer/2022102722/55618577d8b42a91778b458b/html5/thumbnails/17.jpg)
Referensi
• The Hacker’s Hand Book – Susan Young & Dave Aitel.