1.Footprinting
2.System Hacking
3.Trojan dan Virus (Malicious Code)
4.Sniffer dan Social Engineering
5.DoS dan DDoS
Footprinting
• Mencari info resmi dari target;
– Website, info domain, alamat dan range ip, info domain,
arsip web, subdomain,email, lokasi, email dan
aktivitasnya, sampai mengenali korban.
• Scanning
– Port scanning, network scanning, vulnerabilities scanning,
port open, war dialing, identifikasi services, proxy dst.
• Enumeration
– Null sesion, enumerasi SNMP dan active directroty
System Hacking
• Password Cracking
– Active online attack, passive online attack, offline attack, dan
non electronic attack
• Escalating Priviledges
– Menaikkan hak akses user to admin
• Executing Application, Keylogger dan Spyware
• Hidden File and Folder
– Berlindung dibalik atribut, file, folder, rootkit dan steganograpy
• Covering Tracks
Trojan dan Virus
• Trojan
• Virus
• Worm
– Apa?
– Bagaimana?
– Antisipasi?
– Pencegahan?
Sniffer dan Social Engineering
• Sniffer
– Spoofing
– DNS Poisoning
• Social Engineering
– Apa?
– Kategori?
– Serangan dari dalam?
– Media?
– Pencegahan?
• Identity Theft
• Phising
DoS dan DDoS
• Dos dan ddos
– Apa?
– Bagaimana?
– Teknik?
– Tools?
– Deteksi?
– Pencegahan?
• Session Hijacking
Kesimpulan