Backtrack Linux

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 39 Experts worldwide ranked by ideXlab platform

Alwafi Fariz - One of the best experts on this subject based on the ideXlab platform.

  • ANALISIS DAN IMPLEMENTASI KEAMANAN JARINGAN PADA PT. DAE MYUNG HIGHNESS INDONESIA
    Universitas Islam 45 Bekasi, 2018
    Co-Authors: Alwafi Fariz
    Abstract:

    ABSTRACT   VPN  security  with  an  attack  (attacking)  the  method  of  Denial  of  Service  (DOS)  m  Man-in-the-Middle (MITM) with ettercap and hacking with Backtrack Linux applications. The experimental results of testing connectivity to the conclusion that the bandwidth is a major factor merits network connectivity between offices.  In  experiments  testing  the  VPN  security,  attack  (hacking)  to  Denial  of  Service  (DoS)  was successfully  shut down  service  or  service  on the VPN server.  Security of data in a computer network is very  important,  especially  confidential  data.  Currently  there  are  several  alternative  methods  for  data security  on  the  network,  for  example  to  encrypt  the  data  before  it  is  sent,  install  a  firewall  so that  no external intruders  who can  get into  the internal  computer  network  and others.  To  overcome the problem of  security  in data communications  on public networks.  In general,  the VPN  is a  local  communication network connected via the public network, public infrastructure is  the most widely used Internet network. Inside  there is a combination of technology VPN tunneling and encryption to create a VPN into a reliable technology  to solve  security  problems  on the network.  VPN  itself  is highly dependent  on the  stability of the Internet both in the server and the user, it is necessary to be equipped with the best ISP that provides Internet access speed and security are qualified to anticipate the attack to the VPN server.   Keyword: VPN, connectivity, security, attacking.     ABSTRAK   Keamanan  VPN  dengan  melakukan  serangan  (attacking)  dengan   metode  Denial  of  Service  (DOS) Man-in-the-Middle  (MITM)  dengan  ettercap  dan  hacking  dengan  aplikasi  Linux  Backtrack.  Hasil eksperimen  pengujian konektivitas  memberikan  kesimpulan bahwa  bandwidth  merupakan  faktor utama baik-buruknya konektivitas jaringan antar kantor. Pada eksperimen pengujian keamanan VPN, serangan (attacking) dengan Denial of Service (DoS) ternyata berkasil mematikan service atau layanan pada server VPN.  Keamanan  data  pada  sebuah  jaringan  komputer  sangatlah  penting,  terutama  data  yang  bersifat rahasia. Saat ini terdapat beberapa alternatif metode untuk keamanan data pada jaringan, misalnya dengan engenkripsi data sebelum dikirimkan, memasang firewall sehingga tidak ada penyusup dari luar yang dapat  masuk  ke  jaringan  komputer  internal  dan  lain-lain.  Untuk  mengatasi  masalah  keamanan  dalam komunikasi data  pada jaringan umum. Secara umum VPN  merupakan  suatu  jaringan  komunikasi lokal yang terhubung melalui media jaringan publik, infrastruktur publik yang paling banyak digunakan adalah jaringan internet. Didalam VPN terdapat perpaduan teknologi tunneling dan enkripsi yang membuat VPN menjadi teknologi yang handal untuk mengatasi permasalahan keamanan didalam jaringan. VPN sendiri sangat  tergantung  pada  kestabilan  jaringan  internet  baik  dari  sisi  Server  maupun  User,  untuk  itu  perlu dibekali  dengan  ISP  yang  terbaik  yang  menyediakan  kecepatan  akses  internet  dan  keamanan  yang mumpuni guna mengantisipasi serangan kepada VPN Server.   Kata Kunci : VPN, konektivitas, keamanan, attacking

Patrick Engebretson - One of the best experts on this subject based on the ideXlab platform.

  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
    2011
    Co-Authors: Patrick Engebretson
    Abstract:

    The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you? to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate. Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases. Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University. Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test. Table of Contents Chapter 1. What is Penetration Testing? Chapter 2. Reconnaissance Chapter 3. Scanning Chapter 4. Exploitation Chapter 5. Web Based Exploitation Chapter 6. Maintaining Access with Backdoors and Rootkits Chapter 7. Trapping Up the Penetration Test

Engebretson Patrick - One of the best experts on this subject based on the ideXlab platform.

  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
    'Elsevier BV', 2011
    Co-Authors: Engebretson Patrick
    Abstract:

    The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and top

Fariz Alwafi - One of the best experts on this subject based on the ideXlab platform.

  • Analisis dan Implementasi Keamanan Jaringan pada PT. Dae Myung Highness Indonesia
    2015
    Co-Authors: Fariz Alwafi
    Abstract:

    n VPNn securityn withn ann attackn (attacking)n then methodn ofn Denialn ofn Servicen (DOS)n mn Man-in-the-Middle (MITM) with ettercap and hacking with Backtrack Linux applications. The experimental results of testing connectivity to the conclusion that the bandwidth is a major factor merits network connectivity between offices.n Inn experimentsn testingn then VPNn security,n attackn (hacking)n ton Denialn ofn Servicen (DoS)n was successfullyn shut downn servicen orn servicen on the VPN server.n Security of data in a computer network is veryn important,n especiallyn confidentialn data.n Currentlyn theren aren severaln alternativen methodsn forn data securityn onn then network,n forn examplen ton encryptn then datan beforen itn isn sent,n installn an firewalln so thatn no external intrudersn who cann get inton the internaln computern networkn and others.n Ton overcome the problem ofn securityn in data communicationsn on public networks.n In general,n the VPNn is an localn communication network connected via the public network, public infrastructure isn the most widely used Internet network. Insiden there is a combination of technology VPN tunneling and encryption to create a VPN into a reliable technologyn to solven securityn problemsn on the network.n VPNn itselfn is highly dependentn on then stability of the Internet both in the server and the user, it is necessary to be equipped with the best ISP that provides Internet access speed and security are qualified to anticipate the attack to the VPN server. n Keyword: VPN, connectivity, security, attacking. n n

Rafay Baloch - One of the best experts on this subject based on the ideXlab platform.

  • Ethical Hacking and Penetration Testing Guide
    2014
    Co-Authors: Rafay Baloch
    Abstract:

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but dont know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.