Langsung ke konten utama

MATERI TRAINING ONLINE BELAJAR H4CK!NG

 I found this article in XCode forum when I googling how to learn to hack. 

this theory is step to step fundamental to learn hack. 

I saved this on my blog so that one day I can look at it and learn about it again.


Materi


Sesi 1
- Network Fundamental
- Dasar IP Address, Mac Address, pengenalan 7 layer osi, etc
- FTP, SSH, Telnet, DNS, DHCP, Web Server, MySQL Server, VNC, RDP
- Routing (NAT) & Port Forwarding
- Dasar Kriptopgrafi
- Mengenal encode / decode (base64)
- Mengenal salah satu enkripsi & dekripsinya pada kriptografi simetris
- Mengenal enkripsi & dekripsinya pada kriptografi asimetris (public key & private key)
- Mengenal fungsi hash
- Dasar firewall
- TOR Windows
- Command prompt
- Managemen user (Command prompt)

Sesi 2
- Mengenal Linux
- Shell bash (Perintah-perintah di linux)
- Repository
- Setting ip address di linux
- Managemen user dan group di linux
- SSH
- Apache Server
- Firewall UFW
- IDS (Intrusion detection system) dengan Snort

Sesi 3
- Ethical Hacking
- Scanning jaringan
- Scanning IP, port, service, OS yang digunakan, dll
- Dasar Hacking (Step by step)
- Hacking suatu Web Server dengan searchsploit / exploit-db (Step by step)
- Shell (eksploitasi di shell seperti copy data)
- Hacking suatu Web Server yang terinstall di Windows 7 (Step by step)
- Hacking suatu FTP Server yang terinstall di Windows 10 (Step by step)
- Hacking suatu router dengan routersploit
- Hacking suatu FTP Server dengan metasploit framework (Step by step)
- Perintah-perintah metasploit dasar dan contoh encode pada payload saat eksploitasi
- Backdoor pada target Windows (Tiap target masuk windows, attacker langsung mendapatkan akses)
- Scanning bug dengan Nessus dan contoh eksploitasinya dengan metasploit
- Hacking pada SMB Windows XP SP3 ber-firewall (Bypass firewall pada target Windows) (Step by step) untuk mendapatkan akses shell
- Perintah-perintah meterpreter dasar
- Hacking pada service SMB Windows Vista / Windows Server 2008 untuk mendapatkan akses shell
- Hacking pada service SMB Windows 7 Full Version / Windows 7 SP1 untuk mendapatkan akses shell

Sesi 4
- Hacking pada service SMB Windows 8.1 / 10 yang mengijinkan share folder tanpa password untuk mendapatkan akses shell (Bypass Windows Defender)
- Hacking pada service Samba Linux Ubuntu Server untuk mendapatkan akses shell
- Teknik untuk meminimalisir serangan ke server
- Teknik melakukan banned otomatis pada ip target yang melakukan scanning menggunakan NMAP dengan option seperti misal -sV dan -A
- Buffer Overflow
- Fuzzer Development (Membuat fuzzer sendiri dengan Python)
- EIP & SEH Handler
- Pattern create & pattern offset
- Cek proteksi SafeSEH & ASLR dan menghindarinya
- Uji coba perbedaan module yang terproteksi dan yang tidak terproteksi
- JMP ESP
- SEH & SafeSEH
- POP POP RETN (Bypass SEH)
- Mengenal Bad Character
- Eksploitasi

Sesi 5
- Denial of Service - Web Server (intranet & internet). Contoh pada apache server, web dari OS mikrotik x86 dan access point tp-link
- Denial of Service SMBv1 - (SMB Windows XP, SMB Windows Server 2003) (Blue Screen)
- Denial of Service SMBv2 - (SMB Windows Vista, SMB Windows Server 2008) (Blue Screen)
- Denial of Service RDP (RDP Windows 7) (Blue Screen)
- Denial of Service SMB Windows 8.1 / 10 dengan sharing folder tanpa password (Blue Screen)
- DHCP Flooding
- Netcut
- ARP Spoofing
- Wireshark
- Sniffing password dengan SSLStrip
- Eksploitasi heartbleed untuk membaca memory dari server yang diproteksi oleh OpenSSL (Bisa mengambil password pengguna pada web dan sebagainya)
Pengamanan
- Mengamankan Web Server dari serangan DoS tertentu (Pengujian sebelum diamankan pada serangan sebelumnya dan setelah diamankan) (Linux)

Sesi 6
- DNS Spoofing (windows / linux)
- Membuat fake login sendiri
- Client side Attack ~ Browser IE atau firefox
- Eksploitasi celah remote pada Microsoft Word
- Msfvenom untuk backdoor Windows (Backdoor diinject kan ke file exe lain)
- Privilege escalation pada Windows Server 2008 / Windows 8.1 / Windows 10
- John the ripper pada Windows / linux
- Brute force attack
- Membangun wordlist dengan berbagai kriteria sendiri secara cepat (generate)
Pengamanan
- Teknik melakukan banned pada ip attacker secara otomatis yang melakukan serangan brute force pada SSH

Komentar

Postingan populer dari blog ini

How to Generate Google Ads Keywords Using Python

  How to Generate Google Ads Keywords Using Python By  Chris Kendall Paid Search ,  SEM Management I generated over a million unique Google Ads keywords — using just a few lines of code. If you want to learn how to save time generating keywords and building campaigns: programming is the answer. More specifically, the language Python. I’m going to show you how I used Python to increase my productivity and lighten my workload. If you are intimidated by the word “programming”, I’m here to change your mind — and show you why you should start using Python to streamline your digital marketing process today! Use Python to Generate Keywords for Google Ads Campaigns Let’s take a look at how to generate keywords for search campaigns. Python has many different applications for e-commerce (including data analysis), but for now we’re only going to cover two examples of how to generate Google Ads keywords: one beginner and one advanced. Generating Unlimited Exact Match and Broad Match ...

HOW TO FIX : ERROR:gpu_init.cc(426) Passthrough is not supported, GL is disabled in VS Code Python Selenium ChromeDriver Pytest

HOW TO FIX : ERROR:gpu_init.cc(426) Passthrough is not supported, GL is disabled in VS Code Python Selenium ChromeDriver Pytest have you ever experienced an error like the one below when using pytest, python selenium chromedriver? [14184:2436:0319/060520.198:ERROR:gpu_init.cc(440)] Passthrough is not supported, GL is disabled, ANGLE is [7108:12512:0319/060620.351:ERROR:device_event_log_impl.cc(214)] [06:06:20.350] USB: usb_device_handle_win.cc:1049 Failed to read descriptor from node connection: A device attached to the system is not functioning. (0x1F) [7108:12512:0319/060620.356:ERROR:device_event_log_impl.cc(214)] [06:06:20.356] USB: usb_device_handle_win.cc:1049 Failed to read descriptor from node connection: A device attached to the system is not functioning. (0x1F) [7108:12512:0319/060620.357:ERROR:device_event_log_impl.cc(214)] [06:06:20.357] USB: usb_device_handle_win.cc:1049 Failed to read descriptor from node connection: A device attached to the system is not functioning....

Python Essentials 1 - Module 1

  Python Essentials 1: Module 1 Introduction to Python and computer programming In this module, you will learn about: the fundamentals of computer programming, i.e., how the computer works, how the program is executed, how the programming language is defined and constructed; the difference between compilation and interpretation what Python is, how it is positioned among other programming languages, and what distinguishes the different versions of Python. How does a computer program work? This course aims to show you what the Python language is and what it is used for. Let's start from the absolute basics. A program makes a computer usable. Without a program, a computer, even the most powerful one, is nothing more than an object. Similarly, without a player, a piano is nothing more than a wooden box. Computers are able to perform very complex tasks, but this ability is not innate. A computer's nature is quite different. It can execute only extremely simple operations. For exampl...