SlideShare a Scribd company logo
NovizulEvendi
FO Techno-OS/T’Lab
a branch of computer technology known as information
security as applied to computers and networks
 Security by design
 Security architecture
 Hardware mechanisms that protect computers and data
 Secure operating systems
 Secure coding
 Capabilities and access control lists
computing
 Hacker (computersecurity) or cracker, who accesses a
computersystem by circumventing its security system
 Hacker (programmer subculture), who shares an anti-
authoritarian approach to software development now
associatedwith the free software movemen
 Hacker (hobbyist), who makes innovative customizations
or combinations of retail electronic and computer
equipment
 Skills
 Style
 Attitude
 Status
 Ethics
 Learn how to program
 Get one of the open-source Unixes and learn to use and
run it
 Learn how to use the World Wide Web
 If you don't have functional English, learn it!!
 The world is full of fascinating problems waiting to be
solved.
 No problem should ever have to be solved twice.
 Boredom and drudgery are evil.
 Freedom is good.
 Attitudeis no substitutefor competence.
 Write open-sourcesoftware
 Help test and debug open-source software
 Publish useful information
 Help keep the infrastructure working
 Serve the hacker culture itself
Virtualisasi Hacking
 Reconnaissance
hackersfirst perform routine and detailed reconnaissance.
Methods of reconnaissance include Dumpster Diving, Social
Engineering, Google Searching & Google Hacking, and work
their way up to more insidious methods such as infiltrating
youremployees environmentsfrom coffee shops to simply
walking in and setting up in a cubicle and asking a lot of
questions.
 Scanning
can reveal vulnerabilities that create a hit list, or triage
list, for hackers to work through.
Typically, hackers perform port scans and port mapping,
while attempting to discover what services and versions of
services are actively available on any open or available ports.
 Gaining Access
Open ports can lead to a hacker gaining direct access to
services and possibly to internal network connections.
Whether the hacker is successful attacking an internal
system has much to do with how vulnerable the specific
system is, which is related to system configurations and
architecture.
 Maintain Access
Hackers may choose to continue attacking and exploiting
the target system, or to explore deeper into the target
network and look for more systems and services
Hackers can continue to sniff your network looking for more
information to use againstyou.
 Covering Tracks
 Most hackers will attempt to cover their footprints and
tracks as carefully as possible.
Gaining root level access and administrative access is a big
part of covering one’s tracks as the hacker can remove log
entries and do so as a privileged administrator as opposed
to an unknown hacker.
Virtualisasi Hacking
 Attacking
 Sniffing
 Arp Spoofing
 DNS Spoofing
 Man In The Middle Attack
 Defend
 Tunelling
 Arp Static
Packet sniffer comes in two categories:
Active sniffers
Passive sniffers.
 Alice sends a message to Bob, which is intercepted by
Mallory:
Alice "Hi Bob, it's Alice. Give me your key"--> Mallory Bob
 Mallory relays this message to Bob; Bob cannot tell it is not
really from Alice:
Alice Mallory "Hi Bob, it's Alice. Give me your key"--> Bob
 Bob responds with his encryption key:
Alice Mallory <--[Bob's_key] Bob
 Mallory replaces Bob's key with her own, and relays this to
Alice, claiming that it is Bob's key:
Alice <--[Mallory's_key] Mallory Bob
 Alice encrypts a message with what she believes to be Bob's
key, thinking that only Bob can read it:
Alice "Meet me at the bus stop!"[encryptedwith Mallory's key]-->
Mallory Bob
Alive Bob
Mallory
 Attacking
 DDOS (Distributed Denial of Service Attacks)
 Defend
 Firewall/IDS
 Disableservices by default.
LOGICAL VIEW OF ATTACK NET
Attacker
Master
Victim
Slave SlaveSlave SlaveSlave
ControlTraffic
Attack Traffic
 Attacking
 Vulnerability
 Exploit
 Defend
 Firewall
 Path Software
 Close Service/Port If Not Use
 Attacking
 ByPass Pasword login
 Defend
 Lock Bios
 Disable other Bootable
 Attacking
 Session Hijacking
 Session Sidejacking
 Defend
 Don’t Use “Remeber me” While Login
 Tunelling (https/ssh)
TCP session hijackingis when
a hacker takes over a TCP
session between two
machines
 VirtualBOX
 Virtual Network
Only 2 Method for Configuration Netwroking Virtual
 Bridge
 Host-Only Adapter
N
Na
b
b
a
b
b
A = Real
B = Virtual
N = LAN
 Virtual OS for Attacker
 Attack From Linux OS
 Attack From Windows OS
Web : www.tlab.co.id
Mail: karuwak@tlab.co.id
Web : www.techno-os.net
Mail: karuwak@techno-os.net
Company
Community
karuwak@gmail.com
Virtualisasi Hacking

More Related Content

PPTX
Password cracking and brute force
PPTX
Password Attack
PPTX
password cracking and Key logger
PPTX
Password Cracking
PPTX
Hacking intro
DOCX
Password hacking
PPTX
Ethical hacking
PPTX
Learn awesome hacking tricks
Password cracking and brute force
Password Attack
password cracking and Key logger
Password Cracking
Hacking intro
Password hacking
Ethical hacking
Learn awesome hacking tricks

What's hot (20)

PPTX
Brute force-attack presentation
PPT
Computer Systems Security
PPT
Keyloggers
PPT
Keyloggers and Spywares
PPTX
Computer Ethics
PPTX
What is IT security[1]
PPT
Bruteforce basic presentation_file - linx
PPTX
PDF
[Computer] hacking for dummies how to learn to hack in easy steps
PPTX
Seminar On Trojan Horse
PDF
What is a Hacker (part 2): How data is stolen
PPTX
Hardware key logger
PDF
Understanding Keylogger
PDF
How to Keep Yourself secure while browsing internet pre null meet kolkata
PPTX
ETHICAL HACKING
ODP
Password Attack
PPT
Spywares & Keyloggers
PDF
Understanding CryptoLocker (Ransomware) with a Case Study
PPTX
BackDoors Seminar
PPT
Backdoor
Brute force-attack presentation
Computer Systems Security
Keyloggers
Keyloggers and Spywares
Computer Ethics
What is IT security[1]
Bruteforce basic presentation_file - linx
[Computer] hacking for dummies how to learn to hack in easy steps
Seminar On Trojan Horse
What is a Hacker (part 2): How data is stolen
Hardware key logger
Understanding Keylogger
How to Keep Yourself secure while browsing internet pre null meet kolkata
ETHICAL HACKING
Password Attack
Spywares & Keyloggers
Understanding CryptoLocker (Ransomware) with a Case Study
BackDoors Seminar
Backdoor

Viewers also liked (20)

ODP
Linux & Open Source
PPTX
virtualisasi
PPT
Tk2273 -teknologi_virtualisasi Cloud Computing
PDF
Cloud Computing Services
PDF
Dialog Technoprener
PDF
PDF
Wireless Hacking Fast Track
PDF
E-commerce
PDF
Information System Security
PDF
Outline course Backtrak Pentest
PPT
Small servers
PDF
Hacking Is Not Always a Crime
PDF
Hacking Backtrak Mobile
PDF
Feed machinery catalogue
PDF
Data vs info
PDF
Honeycomb work samples
DOC
Modul praktikum hardware dan software
PDF
Sales Development: Necessities of Selling in the Cloud
PPTX
Selling the Cloud to Your C-Suite
POT
Selling the Cloud
Linux & Open Source
virtualisasi
Tk2273 -teknologi_virtualisasi Cloud Computing
Cloud Computing Services
Dialog Technoprener
Wireless Hacking Fast Track
E-commerce
Information System Security
Outline course Backtrak Pentest
Small servers
Hacking Is Not Always a Crime
Hacking Backtrak Mobile
Feed machinery catalogue
Data vs info
Honeycomb work samples
Modul praktikum hardware dan software
Sales Development: Necessities of Selling in the Cloud
Selling the Cloud to Your C-Suite
Selling the Cloud

Similar to Virtualisasi Hacking (20)

PPT
PPT
Hackers Cracker Network Intruder
PPT
How to become Hackers .
PPT
Hacking and its Defence
PPT
All about Hacking
PPT
Network security
PPTX
Ethical hacking
PPT
Introduction to hackers
PPT
Network security
PPT
Network Security Attacks, and Solutions.
PPT
Network Security. Different aspects of Network Security.
PPT
PPT
Hackers
PPT
Hackers
PDF
Real life hacking101
PPTX
Hacking presentation
PPT
ETHICAL HACKING
PPT
Ethical Hacking
PPT
Meletis Belsis - Introduction to information security
PDF
Introduction of hacking and cracking
Hackers Cracker Network Intruder
How to become Hackers .
Hacking and its Defence
All about Hacking
Network security
Ethical hacking
Introduction to hackers
Network security
Network Security Attacks, and Solutions.
Network Security. Different aspects of Network Security.
Hackers
Hackers
Real life hacking101
Hacking presentation
ETHICAL HACKING
Ethical Hacking
Meletis Belsis - Introduction to information security
Introduction of hacking and cracking

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Spectroscopy.pptx food analysis technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
cuic standard and advanced reporting.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Machine learning based COVID-19 study performance prediction
NewMind AI Weekly Chronicles - August'25 Week I
Spectroscopy.pptx food analysis technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
“AI and Expert System Decision Support & Business Intelligence Systems”
cuic standard and advanced reporting.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Chapter 3 Spatial Domain Image Processing.pdf
Programs and apps: productivity, graphics, security and other tools
Spectral efficient network and resource selection model in 5G networks
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Reach Out and Touch Someone: Haptics and Empathic Computing
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction

Virtualisasi Hacking

  • 2. a branch of computer technology known as information security as applied to computers and networks  Security by design  Security architecture  Hardware mechanisms that protect computers and data  Secure operating systems  Secure coding  Capabilities and access control lists
  • 3. computing  Hacker (computersecurity) or cracker, who accesses a computersystem by circumventing its security system  Hacker (programmer subculture), who shares an anti- authoritarian approach to software development now associatedwith the free software movemen  Hacker (hobbyist), who makes innovative customizations or combinations of retail electronic and computer equipment
  • 4.  Skills  Style  Attitude  Status  Ethics
  • 5.  Learn how to program  Get one of the open-source Unixes and learn to use and run it  Learn how to use the World Wide Web  If you don't have functional English, learn it!!
  • 6.  The world is full of fascinating problems waiting to be solved.  No problem should ever have to be solved twice.  Boredom and drudgery are evil.  Freedom is good.  Attitudeis no substitutefor competence.
  • 7.  Write open-sourcesoftware  Help test and debug open-source software  Publish useful information  Help keep the infrastructure working  Serve the hacker culture itself
  • 9.  Reconnaissance hackersfirst perform routine and detailed reconnaissance. Methods of reconnaissance include Dumpster Diving, Social Engineering, Google Searching & Google Hacking, and work their way up to more insidious methods such as infiltrating youremployees environmentsfrom coffee shops to simply walking in and setting up in a cubicle and asking a lot of questions.
  • 10.  Scanning can reveal vulnerabilities that create a hit list, or triage list, for hackers to work through. Typically, hackers perform port scans and port mapping, while attempting to discover what services and versions of services are actively available on any open or available ports.
  • 11.  Gaining Access Open ports can lead to a hacker gaining direct access to services and possibly to internal network connections. Whether the hacker is successful attacking an internal system has much to do with how vulnerable the specific system is, which is related to system configurations and architecture.
  • 12.  Maintain Access Hackers may choose to continue attacking and exploiting the target system, or to explore deeper into the target network and look for more systems and services Hackers can continue to sniff your network looking for more information to use againstyou.
  • 13.  Covering Tracks  Most hackers will attempt to cover their footprints and tracks as carefully as possible. Gaining root level access and administrative access is a big part of covering one’s tracks as the hacker can remove log entries and do so as a privileged administrator as opposed to an unknown hacker.
  • 15.  Attacking  Sniffing  Arp Spoofing  DNS Spoofing  Man In The Middle Attack  Defend  Tunelling  Arp Static Packet sniffer comes in two categories: Active sniffers Passive sniffers.
  • 16.  Alice sends a message to Bob, which is intercepted by Mallory: Alice "Hi Bob, it's Alice. Give me your key"--> Mallory Bob  Mallory relays this message to Bob; Bob cannot tell it is not really from Alice: Alice Mallory "Hi Bob, it's Alice. Give me your key"--> Bob  Bob responds with his encryption key: Alice Mallory <--[Bob's_key] Bob  Mallory replaces Bob's key with her own, and relays this to Alice, claiming that it is Bob's key: Alice <--[Mallory's_key] Mallory Bob  Alice encrypts a message with what she believes to be Bob's key, thinking that only Bob can read it: Alice "Meet me at the bus stop!"[encryptedwith Mallory's key]--> Mallory Bob Alive Bob Mallory
  • 17.  Attacking  DDOS (Distributed Denial of Service Attacks)  Defend  Firewall/IDS  Disableservices by default.
  • 18. LOGICAL VIEW OF ATTACK NET Attacker Master Victim Slave SlaveSlave SlaveSlave ControlTraffic Attack Traffic
  • 19.  Attacking  Vulnerability  Exploit  Defend  Firewall  Path Software  Close Service/Port If Not Use
  • 20.  Attacking  ByPass Pasword login  Defend  Lock Bios  Disable other Bootable
  • 21.  Attacking  Session Hijacking  Session Sidejacking  Defend  Don’t Use “Remeber me” While Login  Tunelling (https/ssh) TCP session hijackingis when a hacker takes over a TCP session between two machines
  • 23.  Virtual Network Only 2 Method for Configuration Netwroking Virtual  Bridge  Host-Only Adapter N Na b b a b b A = Real B = Virtual N = LAN
  • 24.  Virtual OS for Attacker  Attack From Linux OS  Attack From Windows OS
  • 25. Web : www.tlab.co.id Mail: karuwak@tlab.co.id Web : www.techno-os.net Mail: karuwak@techno-os.net Company Community karuwak@gmail.com