The Experts below are selected from a list of 39 Experts worldwide ranked by ideXlab platform
Alwafi Fariz - One of the best experts on this subject based on the ideXlab platform.
-
ANALISIS DAN IMPLEMENTASI KEAMANAN JARINGAN PADA PT. DAE MYUNG HIGHNESS INDONESIA
Universitas Islam 45 Bekasi, 2018Co-Authors: Alwafi FarizAbstract:ABSTRACT VPN security with an attack (attacking) the method of Denial of Service (DOS) m Man-in-the-Middle (MITM) with ettercap and hacking with Backtrack Linux applications. The experimental results of testing connectivity to the conclusion that the bandwidth is a major factor merits network connectivity between offices. In experiments testing the VPN security, attack (hacking) to Denial of Service (DoS) was successfully shut down service or service on the VPN server. Security of data in a computer network is very important, especially confidential data. Currently there are several alternative methods for data security on the network, for example to encrypt the data before it is sent, install a firewall so that no external intruders who can get into the internal computer network and others. To overcome the problem of security in data communications on public networks. In general, the VPN is a local communication network connected via the public network, public infrastructure is the most widely used Internet network. Inside there is a combination of technology VPN tunneling and encryption to create a VPN into a reliable technology to solve security problems on the network. VPN itself is highly dependent on the stability of the Internet both in the server and the user, it is necessary to be equipped with the best ISP that provides Internet access speed and security are qualified to anticipate the attack to the VPN server. Keyword: VPN, connectivity, security, attacking. ABSTRAK Keamanan VPN dengan melakukan serangan (attacking) dengan metode Denial of Service (DOS) Man-in-the-Middle (MITM) dengan ettercap dan hacking dengan aplikasi Linux Backtrack. Hasil eksperimen pengujian konektivitas memberikan kesimpulan bahwa bandwidth merupakan faktor utama baik-buruknya konektivitas jaringan antar kantor. Pada eksperimen pengujian keamanan VPN, serangan (attacking) dengan Denial of Service (DoS) ternyata berkasil mematikan service atau layanan pada server VPN. Keamanan data pada sebuah jaringan komputer sangatlah penting, terutama data yang bersifat rahasia. Saat ini terdapat beberapa alternatif metode untuk keamanan data pada jaringan, misalnya dengan engenkripsi data sebelum dikirimkan, memasang firewall sehingga tidak ada penyusup dari luar yang dapat masuk ke jaringan komputer internal dan lain-lain. Untuk mengatasi masalah keamanan dalam komunikasi data pada jaringan umum. Secara umum VPN merupakan suatu jaringan komunikasi lokal yang terhubung melalui media jaringan publik, infrastruktur publik yang paling banyak digunakan adalah jaringan internet. Didalam VPN terdapat perpaduan teknologi tunneling dan enkripsi yang membuat VPN menjadi teknologi yang handal untuk mengatasi permasalahan keamanan didalam jaringan. VPN sendiri sangat tergantung pada kestabilan jaringan internet baik dari sisi Server maupun User, untuk itu perlu dibekali dengan ISP yang terbaik yang menyediakan kecepatan akses internet dan keamanan yang mumpuni guna mengantisipasi serangan kepada VPN Server. Kata Kunci : VPN, konektivitas, keamanan, attacking
Patrick Engebretson - One of the best experts on this subject based on the ideXlab platform.
-
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
2011Co-Authors: Patrick EngebretsonAbstract:The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you? to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate. Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases. Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University. Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test. Table of Contents Chapter 1. What is Penetration Testing? Chapter 2. Reconnaissance Chapter 3. Scanning Chapter 4. Exploitation Chapter 5. Web Based Exploitation Chapter 6. Maintaining Access with Backdoors and Rootkits Chapter 7. Trapping Up the Penetration Test
Engebretson Patrick - One of the best experts on this subject based on the ideXlab platform.
-
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
'Elsevier BV', 2011Co-Authors: Engebretson PatrickAbstract:The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and top
Fariz Alwafi - One of the best experts on this subject based on the ideXlab platform.
-
Analisis dan Implementasi Keamanan Jaringan pada PT. Dae Myung Highness Indonesia
2015Co-Authors: Fariz AlwafiAbstract:n VPNn securityn withn ann attackn (attacking)n then methodn ofn Denialn ofn Servicen (DOS)n mn Man-in-the-Middle (MITM) with ettercap and hacking with Backtrack Linux applications. The experimental results of testing connectivity to the conclusion that the bandwidth is a major factor merits network connectivity between offices.n Inn experimentsn testingn then VPNn security,n attackn (hacking)n ton Denialn ofn Servicen (DoS)n was successfullyn shut downn servicen orn servicen on the VPN server.n Security of data in a computer network is veryn important,n especiallyn confidentialn data.n Currentlyn theren aren severaln alternativen methodsn forn data securityn onn then network,n forn examplen ton encryptn then datan beforen itn isn sent,n installn an firewalln so thatn no external intrudersn who cann get inton the internaln computern networkn and others.n Ton overcome the problem ofn securityn in data communicationsn on public networks.n In general,n the VPNn is an localn communication network connected via the public network, public infrastructure isn the most widely used Internet network. Insiden there is a combination of technology VPN tunneling and encryption to create a VPN into a reliable technologyn to solven securityn problemsn on the network.n VPNn itselfn is highly dependentn on then stability of the Internet both in the server and the user, it is necessary to be equipped with the best ISP that provides Internet access speed and security are qualified to anticipate the attack to the VPN server. n Keyword: VPN, connectivity, security, attacking. n n
Rafay Baloch - One of the best experts on this subject based on the ideXlab platform.
-
Ethical Hacking and Penetration Testing Guide
2014Co-Authors: Rafay BalochAbstract:Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but dont know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.