Langsung ke konten utama

MATERI TRAINING ONLINE BELAJAR H4CK!NG

 I found this article in XCode forum when I googling how to learn to hack. 

this theory is step to step fundamental to learn hack. 

I saved this on my blog so that one day I can look at it and learn about it again.


Materi


Sesi 1
- Network Fundamental
- Dasar IP Address, Mac Address, pengenalan 7 layer osi, etc
- FTP, SSH, Telnet, DNS, DHCP, Web Server, MySQL Server, VNC, RDP
- Routing (NAT) & Port Forwarding
- Dasar Kriptopgrafi
- Mengenal encode / decode (base64)
- Mengenal salah satu enkripsi & dekripsinya pada kriptografi simetris
- Mengenal enkripsi & dekripsinya pada kriptografi asimetris (public key & private key)
- Mengenal fungsi hash
- Dasar firewall
- TOR Windows
- Command prompt
- Managemen user (Command prompt)

Sesi 2
- Mengenal Linux
- Shell bash (Perintah-perintah di linux)
- Repository
- Setting ip address di linux
- Managemen user dan group di linux
- SSH
- Apache Server
- Firewall UFW
- IDS (Intrusion detection system) dengan Snort

Sesi 3
- Ethical Hacking
- Scanning jaringan
- Scanning IP, port, service, OS yang digunakan, dll
- Dasar Hacking (Step by step)
- Hacking suatu Web Server dengan searchsploit / exploit-db (Step by step)
- Shell (eksploitasi di shell seperti copy data)
- Hacking suatu Web Server yang terinstall di Windows 7 (Step by step)
- Hacking suatu FTP Server yang terinstall di Windows 10 (Step by step)
- Hacking suatu router dengan routersploit
- Hacking suatu FTP Server dengan metasploit framework (Step by step)
- Perintah-perintah metasploit dasar dan contoh encode pada payload saat eksploitasi
- Backdoor pada target Windows (Tiap target masuk windows, attacker langsung mendapatkan akses)
- Scanning bug dengan Nessus dan contoh eksploitasinya dengan metasploit
- Hacking pada SMB Windows XP SP3 ber-firewall (Bypass firewall pada target Windows) (Step by step) untuk mendapatkan akses shell
- Perintah-perintah meterpreter dasar
- Hacking pada service SMB Windows Vista / Windows Server 2008 untuk mendapatkan akses shell
- Hacking pada service SMB Windows 7 Full Version / Windows 7 SP1 untuk mendapatkan akses shell

Sesi 4
- Hacking pada service SMB Windows 8.1 / 10 yang mengijinkan share folder tanpa password untuk mendapatkan akses shell (Bypass Windows Defender)
- Hacking pada service Samba Linux Ubuntu Server untuk mendapatkan akses shell
- Teknik untuk meminimalisir serangan ke server
- Teknik melakukan banned otomatis pada ip target yang melakukan scanning menggunakan NMAP dengan option seperti misal -sV dan -A
- Buffer Overflow
- Fuzzer Development (Membuat fuzzer sendiri dengan Python)
- EIP & SEH Handler
- Pattern create & pattern offset
- Cek proteksi SafeSEH & ASLR dan menghindarinya
- Uji coba perbedaan module yang terproteksi dan yang tidak terproteksi
- JMP ESP
- SEH & SafeSEH
- POP POP RETN (Bypass SEH)
- Mengenal Bad Character
- Eksploitasi

Sesi 5
- Denial of Service - Web Server (intranet & internet). Contoh pada apache server, web dari OS mikrotik x86 dan access point tp-link
- Denial of Service SMBv1 - (SMB Windows XP, SMB Windows Server 2003) (Blue Screen)
- Denial of Service SMBv2 - (SMB Windows Vista, SMB Windows Server 2008) (Blue Screen)
- Denial of Service RDP (RDP Windows 7) (Blue Screen)
- Denial of Service SMB Windows 8.1 / 10 dengan sharing folder tanpa password (Blue Screen)
- DHCP Flooding
- Netcut
- ARP Spoofing
- Wireshark
- Sniffing password dengan SSLStrip
- Eksploitasi heartbleed untuk membaca memory dari server yang diproteksi oleh OpenSSL (Bisa mengambil password pengguna pada web dan sebagainya)
Pengamanan
- Mengamankan Web Server dari serangan DoS tertentu (Pengujian sebelum diamankan pada serangan sebelumnya dan setelah diamankan) (Linux)

Sesi 6
- DNS Spoofing (windows / linux)
- Membuat fake login sendiri
- Client side Attack ~ Browser IE atau firefox
- Eksploitasi celah remote pada Microsoft Word
- Msfvenom untuk backdoor Windows (Backdoor diinject kan ke file exe lain)
- Privilege escalation pada Windows Server 2008 / Windows 8.1 / Windows 10
- John the ripper pada Windows / linux
- Brute force attack
- Membangun wordlist dengan berbagai kriteria sendiri secara cepat (generate)
Pengamanan
- Teknik melakukan banned pada ip attacker secara otomatis yang melakukan serangan brute force pada SSH

Komentar

Postingan populer dari blog ini

HOW TO FIX : ERROR:gpu_init.cc(426) Passthrough is not supported, GL is disabled in VS Code Python Selenium ChromeDriver Pytest

HOW TO FIX : ERROR:gpu_init.cc(426) Passthrough is not supported, GL is disabled in VS Code Python Selenium ChromeDriver Pytest have you ever experienced an error like the one below when using pytest, python selenium chromedriver? [14184:2436:0319/060520.198:ERROR:gpu_init.cc(440)] Passthrough is not supported, GL is disabled, ANGLE is [7108:12512:0319/060620.351:ERROR:device_event_log_impl.cc(214)] [06:06:20.350] USB: usb_device_handle_win.cc:1049 Failed to read descriptor from node connection: A device attached to the system is not functioning. (0x1F) [7108:12512:0319/060620.356:ERROR:device_event_log_impl.cc(214)] [06:06:20.356] USB: usb_device_handle_win.cc:1049 Failed to read descriptor from node connection: A device attached to the system is not functioning. (0x1F) [7108:12512:0319/060620.357:ERROR:device_event_log_impl.cc(214)] [06:06:20.357] USB: usb_device_handle_win.cc:1049 Failed to read descriptor from node connection: A device attached to the system is not functioning....

How to Generate Google Ads Keywords Using Python

  How to Generate Google Ads Keywords Using Python By  Chris Kendall Paid Search ,  SEM Management I generated over a million unique Google Ads keywords — using just a few lines of code. If you want to learn how to save time generating keywords and building campaigns: programming is the answer. More specifically, the language Python. I’m going to show you how I used Python to increase my productivity and lighten my workload. If you are intimidated by the word “programming”, I’m here to change your mind — and show you why you should start using Python to streamline your digital marketing process today! Use Python to Generate Keywords for Google Ads Campaigns Let’s take a look at how to generate keywords for search campaigns. Python has many different applications for e-commerce (including data analysis), but for now we’re only going to cover two examples of how to generate Google Ads keywords: one beginner and one advanced. Generating Unlimited Exact Match and Broad Match ...

Day 1 learning Google Cybersecurity at Coursera

This is my study notes. just for my personal notes and learn.  Program Overview - Core security concepts - Security domains - Network Security - Computing basics - Assets, threats, and vulnerability - Incident detection and response - Python - Find and apply for jobs By completing the eight courses in this certificate program,  you'll prepare for entry-level jobs in cybersecurity ,  such as cybersecurity analyst, security analyst,  and security operations center (SOC) analyst.  No prior experience in cybersecurity is required to complete this program. Throughout the program, you will have multiple opportunities to develop your cybersecurity knowledge and skills . You will explore concepts and scenarios to learn what an entry-level cybersecurity analyst must know and be able to do to thrive in the cybersecurity profession .  Google Cybersecurity Certificate courses The Google Cybersecurity Certificate has eight courses that focus and build upon core concepts...