際際滷shows by User: xathrya / http://www.slideshare.net/images/logo.gif 際際滷shows by User: xathrya / Sun, 05 Dec 2021 01:45:58 GMT 際際滷Share feed for 際際滷shows by User: xathrya Malware for Red Team /slideshow/malware-for-red-team/250783905 presentation-211205014558
Designing Malware for Modern Red Team and Adversary Tradecraft. Why using python for building malware? Lesson learn and consideration. as presented in PyCon ID 2021 (05/12/2021)]]>

Designing Malware for Modern Red Team and Adversary Tradecraft. Why using python for building malware? Lesson learn and consideration. as presented in PyCon ID 2021 (05/12/2021)]]>
Sun, 05 Dec 2021 01:45:58 GMT /slideshow/malware-for-red-team/250783905 xathrya@slideshare.net(xathrya) Malware for Red Team xathrya Designing Malware for Modern Red Team and Adversary Tradecraft. Why using python for building malware? Lesson learn and consideration. as presented in PyCon ID 2021 (05/12/2021) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-211205014558-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Designing Malware for Modern Red Team and Adversary Tradecraft. Why using python for building malware? Lesson learn and consideration. as presented in PyCon ID 2021 (05/12/2021)
Malware for Red Team from Satria Ady Pradana
]]>
178 0 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-211205014558-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Down The Rabbit Hole, From Networker to Security Professional /slideshow/down-the-rabbit-hole-from-networker-to-security-professional/238321436 presentation-200828123403
In my college day, i was a network guy. How computer network knowledge back in the day can be used in my current Cyber Security profession?]]>

In my college day, i was a network guy. How computer network knowledge back in the day can be used in my current Cyber Security profession?]]>
Fri, 28 Aug 2020 12:34:03 GMT /slideshow/down-the-rabbit-hole-from-networker-to-security-professional/238321436 xathrya@slideshare.net(xathrya) Down The Rabbit Hole, From Networker to Security Professional xathrya In my college day, i was a network guy. How computer network knowledge back in the day can be used in my current Cyber Security profession? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-200828123403-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In my college day, i was a network guy. How computer network knowledge back in the day can be used in my current Cyber Security profession?
Down The Rabbit Hole, From Networker to Security Professional from Satria Ady Pradana
]]>
158 0 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-200828123403-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
MITM: Tales of Trust and Betrayal /slideshow/mitm-tales-of-trust-and-betrayal/237236570 presentation-200725094531
Man in the Middle, classic but still relevant. What is MITM? How to achieve it? What impact it have? Find out MITM in this presentation (Jakarta, 25/07/2020)]]>

Man in the Middle, classic but still relevant. What is MITM? How to achieve it? What impact it have? Find out MITM in this presentation (Jakarta, 25/07/2020)]]>
Sat, 25 Jul 2020 09:45:31 GMT /slideshow/mitm-tales-of-trust-and-betrayal/237236570 xathrya@slideshare.net(xathrya) MITM: Tales of Trust and Betrayal xathrya Man in the Middle, classic but still relevant. What is MITM? How to achieve it? What impact it have? Find out MITM in this presentation (Jakarta, 25/07/2020) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-200725094531-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Man in the Middle, classic but still relevant. What is MITM? How to achieve it? What impact it have? Find out MITM in this presentation (Jakarta, 25/07/2020)
MITM: Tales of Trust and Betrayal from Satria Ady Pradana
]]>
275 0 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-200725094531-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Berkarir di Cyber Security /slideshow/berkarir-di-cyber-security-237236318/237236318 presentation-200725092923
Preparation, Activities, Challenges. Bagaimana memulai karir di bidang Cyber Security? Apa saja yang perlu dipersiapkan? Apa rutinitas dan aktivitas yang dilakukan? Ketahui lebih lanjut di presentasiku ini (Jakarta, 24/06/2020)]]>

Preparation, Activities, Challenges. Bagaimana memulai karir di bidang Cyber Security? Apa saja yang perlu dipersiapkan? Apa rutinitas dan aktivitas yang dilakukan? Ketahui lebih lanjut di presentasiku ini (Jakarta, 24/06/2020)]]>
Sat, 25 Jul 2020 09:29:23 GMT /slideshow/berkarir-di-cyber-security-237236318/237236318 xathrya@slideshare.net(xathrya) Berkarir di Cyber Security xathrya Preparation, Activities, Challenges. Bagaimana memulai karir di bidang Cyber Security? Apa saja yang perlu dipersiapkan? Apa rutinitas dan aktivitas yang dilakukan? Ketahui lebih lanjut di presentasiku ini (Jakarta, 24/06/2020) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-200725092923-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Preparation, Activities, Challenges. Bagaimana memulai karir di bidang Cyber Security? Apa saja yang perlu dipersiapkan? Apa rutinitas dan aktivitas yang dilakukan? Ketahui lebih lanjut di presentasiku ini (Jakarta, 24/06/2020)
Berkarir di Cyber Security from Satria Ady Pradana
]]>
174 0 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-200725092923-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IOT Security FUN-damental /slideshow/iot-security-fundamental/231983325 presentation-200414155621
small talk about IOT security especially IOT pentesting for beginner. What exactly IOT and how we test it? Live on Ethical Hacker Indonesia April 14th 2020]]>

small talk about IOT security especially IOT pentesting for beginner. What exactly IOT and how we test it? Live on Ethical Hacker Indonesia April 14th 2020]]>
Tue, 14 Apr 2020 15:56:21 GMT /slideshow/iot-security-fundamental/231983325 xathrya@slideshare.net(xathrya) IOT Security FUN-damental xathrya small talk about IOT security especially IOT pentesting for beginner. What exactly IOT and how we test it? Live on Ethical Hacker Indonesia April 14th 2020 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-200414155621-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> small talk about IOT security especially IOT pentesting for beginner. What exactly IOT and how we test it? Live on Ethical Hacker Indonesia April 14th 2020
IOT Security FUN-damental from Satria Ady Pradana
]]>
412 0 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-200414155621-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Python-Assisted Red-Teaming Operation /slideshow/pythonassisted-redteaming-operation/196852687 presentation-191123093318
際際滷 yang kupresentasikan di PyCon 2019 (Surabaya, 23/11/2019) Red-Teaming is a simulation of real world hacking against organization. It has little to no limit of time, location, and method to attack. Only results matter. This talk gives insight about how hacker works and how python can be used for sophisticated series of attack.]]>

際際滷 yang kupresentasikan di PyCon 2019 (Surabaya, 23/11/2019) Red-Teaming is a simulation of real world hacking against organization. It has little to no limit of time, location, and method to attack. Only results matter. This talk gives insight about how hacker works and how python can be used for sophisticated series of attack.]]>
Sat, 23 Nov 2019 09:33:18 GMT /slideshow/pythonassisted-redteaming-operation/196852687 xathrya@slideshare.net(xathrya) Python-Assisted Red-Teaming Operation xathrya 際際滷 yang kupresentasikan di PyCon 2019 (Surabaya, 23/11/2019) Red-Teaming is a simulation of real world hacking against organization. It has little to no limit of time, location, and method to attack. Only results matter. This talk gives insight about how hacker works and how python can be used for sophisticated series of attack. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-191123093318-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 際際滷 yang kupresentasikan di PyCon 2019 (Surabaya, 23/11/2019) Red-Teaming is a simulation of real world hacking against organization. It has little to no limit of time, location, and method to attack. Only results matter. This talk gives insight about how hacker works and how python can be used for sophisticated series of attack.
Python-Assisted Red-Teaming Operation from Satria Ady Pradana
]]>
1127 0 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-191123093318-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IoT Security - Preparing for the Worst /slideshow/iot-security-preparing-for-the-worst/188467478 securingiot-2-191030042608
際際滷 yang kupresentasikan di MII-Intel Seminar (Jakarta, 30/10/2019) IoT is the Future. Or even, IoT is widely adopted now. Are you sure you are prepared enough for it? Are confident that your IoT solution is secure?]]>

際際滷 yang kupresentasikan di MII-Intel Seminar (Jakarta, 30/10/2019) IoT is the Future. Or even, IoT is widely adopted now. Are you sure you are prepared enough for it? Are confident that your IoT solution is secure?]]>
Wed, 30 Oct 2019 04:26:08 GMT /slideshow/iot-security-preparing-for-the-worst/188467478 xathrya@slideshare.net(xathrya) IoT Security - Preparing for the Worst xathrya 際際滷 yang kupresentasikan di MII-Intel Seminar (Jakarta, 30/10/2019) IoT is the Future. Or even, IoT is widely adopted now. Are you sure you are prepared enough for it? Are confident that your IoT solution is secure? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securingiot-2-191030042608-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 際際滷 yang kupresentasikan di MII-Intel Seminar (Jakarta, 30/10/2019) IoT is the Future. Or even, IoT is widely adopted now. Are you sure you are prepared enough for it? Are confident that your IoT solution is secure?
IoT Security - Preparing for the Worst from Satria Ady Pradana
]]>
303 1 https://cdn.slidesharecdn.com/ss_thumbnails/securingiot-2-191030042608-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Silabus Training Reverse Engineering /slideshow/silabus-training-reverse-engineering/186308165 silabustrainingreverseengineering-signed-191024154301
Training Reverse Engineering Dasar. Full-Frontal, Hands-on.]]>

Training Reverse Engineering Dasar. Full-Frontal, Hands-on.]]>
Thu, 24 Oct 2019 15:43:01 GMT /slideshow/silabus-training-reverse-engineering/186308165 xathrya@slideshare.net(xathrya) Silabus Training Reverse Engineering xathrya Training Reverse Engineering Dasar. Full-Frontal, Hands-on. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/silabustrainingreverseengineering-signed-191024154301-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Training Reverse Engineering Dasar. Full-Frontal, Hands-on.
Silabus Training Reverse Engineering from Satria Ady Pradana
]]>
87 1 https://cdn.slidesharecdn.com/ss_thumbnails/silabustrainingreverseengineering-signed-191024154301-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Practical Security - Modern Day Software /slideshow/practical-security-modern-day-software/186306588 presentation-191024153902
際際滷 yang kupresentasikan di Facebook Dev Circle Bandung (24/04/2018)]]>

際際滷 yang kupresentasikan di Facebook Dev Circle Bandung (24/04/2018)]]>
Thu, 24 Oct 2019 15:39:02 GMT /slideshow/practical-security-modern-day-software/186306588 xathrya@slideshare.net(xathrya) Practical Security - Modern Day Software xathrya 際際滷 yang kupresentasikan di Facebook Dev Circle Bandung (24/04/2018) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-191024153902-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 際際滷 yang kupresentasikan di Facebook Dev Circle Bandung (24/04/2018)
Practical Security - Modern Day Software from Satria Ady Pradana
]]>
41 0 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-191024153902-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Firmware Reverse Engineering /slideshow/firmware-reverse-engineering/86418236 presentation-180119184203
Presentation for Roadshow of Cyber Security Marathon 2018 Mozilla Community Space Jakarta, 2018-01-20 How many of you know firmware? Then how many of you know that firmware can be reversed? Let's see how can we do that.]]>

Presentation for Roadshow of Cyber Security Marathon 2018 Mozilla Community Space Jakarta, 2018-01-20 How many of you know firmware? Then how many of you know that firmware can be reversed? Let's see how can we do that.]]>
Fri, 19 Jan 2018 18:42:03 GMT /slideshow/firmware-reverse-engineering/86418236 xathrya@slideshare.net(xathrya) Firmware Reverse Engineering xathrya Presentation for Roadshow of Cyber Security Marathon 2018 Mozilla Community Space Jakarta, 2018-01-20 How many of you know firmware? Then how many of you know that firmware can be reversed? Let's see how can we do that. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-180119184203-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation for Roadshow of Cyber Security Marathon 2018 Mozilla Community Space Jakarta, 2018-01-20 How many of you know firmware? Then how many of you know that firmware can be reversed? Let&#39;s see how can we do that.
Firmware Reverse Engineering from Satria Ady Pradana
]]>
410 1 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-180119184203-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Reverse Engineering: The Crash Course /slideshow/reverse-engineering-the-crash-course/86418134 presentation-180119183916
Presentation for Roadshow of Cyber Security Marathon 2018 Universitas Trilogi Jakarta, 2018-01-13 ]]>

Presentation for Roadshow of Cyber Security Marathon 2018 Universitas Trilogi Jakarta, 2018-01-13 ]]>
Fri, 19 Jan 2018 18:39:16 GMT /slideshow/reverse-engineering-the-crash-course/86418134 xathrya@slideshare.net(xathrya) Reverse Engineering: The Crash Course xathrya Presentation for Roadshow of Cyber Security Marathon 2018 Universitas Trilogi Jakarta, 2018-01-13 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-180119183916-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation for Roadshow of Cyber Security Marathon 2018 Universitas Trilogi Jakarta, 2018-01-13
Reverse Engineering: The Crash Course from Satria Ady Pradana
]]>
264 3 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-180119183916-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Offensive Python: Practical Python for Penetration Testing /slideshow/the-offensive-python-practical-python-for-penetration-testing-86418060/86418060 presentation-180119183643
Presentation for Roadshow of Cyber Security Marathon 2018 Code Margonda Depok, 2018-01-11 So you got python? How far can you push your python? Why would hackers love python? It's not hard to know that python is amazing language. But how amazing it could be for cyber security? Let's see by getting our hands dirty, from simple tasks to more challenging action ]]>

Presentation for Roadshow of Cyber Security Marathon 2018 Code Margonda Depok, 2018-01-11 So you got python? How far can you push your python? Why would hackers love python? It's not hard to know that python is amazing language. But how amazing it could be for cyber security? Let's see by getting our hands dirty, from simple tasks to more challenging action ]]>
Fri, 19 Jan 2018 18:36:43 GMT /slideshow/the-offensive-python-practical-python-for-penetration-testing-86418060/86418060 xathrya@slideshare.net(xathrya) The Offensive Python: Practical Python for Penetration Testing xathrya Presentation for Roadshow of Cyber Security Marathon 2018 Code Margonda Depok, 2018-01-11 So you got python? How far can you push your python? Why would hackers love python? It's not hard to know that python is amazing language. But how amazing it could be for cyber security? Let's see by getting our hands dirty, from simple tasks to more challenging action <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-180119183643-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation for Roadshow of Cyber Security Marathon 2018 Code Margonda Depok, 2018-01-11 So you got python? How far can you push your python? Why would hackers love python? It&#39;s not hard to know that python is amazing language. But how amazing it could be for cyber security? Let&#39;s see by getting our hands dirty, from simple tasks to more challenging action
The Offensive Python: Practical Python for Penetration Testing from Satria Ady Pradana
]]>
184 3 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-180119183643-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
From Reversing to Exploitation: Android Application Security in Essence /slideshow/from-reversing-to-exploitation-android-application-security-in-essence/86417900 presentation-180119183139
Seminar on Explicit's Art of Hacking Telkom University Bandung Bandung, 2017-11-04 Android security mostly seen as only "exploiting the device with RAT" and some of it. Here, I want to show that there are more than that. ]]>

Seminar on Explicit's Art of Hacking Telkom University Bandung Bandung, 2017-11-04 Android security mostly seen as only "exploiting the device with RAT" and some of it. Here, I want to show that there are more than that. ]]>
Fri, 19 Jan 2018 18:31:39 GMT /slideshow/from-reversing-to-exploitation-android-application-security-in-essence/86417900 xathrya@slideshare.net(xathrya) From Reversing to Exploitation: Android Application Security in Essence xathrya Seminar on Explicit's Art of Hacking Telkom University Bandung Bandung, 2017-11-04 Android security mostly seen as only "exploiting the device with RAT" and some of it. Here, I want to show that there are more than that. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-180119183139-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Seminar on Explicit&#39;s Art of Hacking Telkom University Bandung Bandung, 2017-11-04 Android security mostly seen as only &quot;exploiting the device with RAT&quot; and some of it. Here, I want to show that there are more than that.
From Reversing to Exploitation: Android Application Security in Essence from Satria Ady Pradana
]]>
87 2 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-180119183139-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Android Security: Art of Exploitation /slideshow/android-security-art-of-exploitation-86417836/86417836 presentation-180119182939
Presentation on Technostar 2017 STMIK Jakarta STI&K Jakarta, 2017-10-10 General overview of android security from hacker's perspective. Android security mostly seen as only "exploiting the device with RAT" and some of it. Here, I want to show that there are more than that. ]]>

Presentation on Technostar 2017 STMIK Jakarta STI&K Jakarta, 2017-10-10 General overview of android security from hacker's perspective. Android security mostly seen as only "exploiting the device with RAT" and some of it. Here, I want to show that there are more than that. ]]>
Fri, 19 Jan 2018 18:29:39 GMT /slideshow/android-security-art-of-exploitation-86417836/86417836 xathrya@slideshare.net(xathrya) Android Security: Art of Exploitation xathrya Presentation on Technostar 2017 STMIK Jakarta STI&K Jakarta, 2017-10-10 General overview of android security from hacker's perspective. Android security mostly seen as only "exploiting the device with RAT" and some of it. Here, I want to show that there are more than that. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-180119182939-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation on Technostar 2017 STMIK Jakarta STI&amp;K Jakarta, 2017-10-10 General overview of android security from hacker&#39;s perspective. Android security mostly seen as only &quot;exploiting the device with RAT&quot; and some of it. Here, I want to show that there are more than that.
Android Security: Art of Exploitation from Satria Ady Pradana
]]>
138 1 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-180119182939-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bypass Security Checking with Frida /slideshow/bypass-security-checking-with-frida-86417770/86417770 presentation-180119182746
Small discussion on Echo's Hack In The Zoo (HITZ) 2017 Ragunan Zoo Jakarta Jakarta, 2017-09-09 Frida? It's a Dynamic Binary Instrumentation. DBI. Let's see what frida can do for us, reverse engineer.]]>

Small discussion on Echo's Hack In The Zoo (HITZ) 2017 Ragunan Zoo Jakarta Jakarta, 2017-09-09 Frida? It's a Dynamic Binary Instrumentation. DBI. Let's see what frida can do for us, reverse engineer.]]>
Fri, 19 Jan 2018 18:27:46 GMT /slideshow/bypass-security-checking-with-frida-86417770/86417770 xathrya@slideshare.net(xathrya) Bypass Security Checking with Frida xathrya Small discussion on Echo's Hack In The Zoo (HITZ) 2017 Ragunan Zoo Jakarta Jakarta, 2017-09-09 Frida? It's a Dynamic Binary Instrumentation. DBI. Let's see what frida can do for us, reverse engineer. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-180119182746-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Small discussion on Echo&#39;s Hack In The Zoo (HITZ) 2017 Ragunan Zoo Jakarta Jakarta, 2017-09-09 Frida? It&#39;s a Dynamic Binary Instrumentation. DBI. Let&#39;s see what frida can do for us, reverse engineer.
Bypass Security Checking with Frida from Satria Ady Pradana
]]>
532 1 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-180119182746-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Malware: To The Realm of Malicious Code (Training) /slideshow/malware-to-the-realm-of-malicious-code-training/86417325 presentation-malware-180119181156
2017-07-16 A training for learning the internal of malware. This version is the compressed version of Malware Engineering & Crafting. We talk about malware as well as crafting the simple working malware. The goal of this session is to understand malware internal so one can have tactics to combat it.]]>

2017-07-16 A training for learning the internal of malware. This version is the compressed version of Malware Engineering & Crafting. We talk about malware as well as crafting the simple working malware. The goal of this session is to understand malware internal so one can have tactics to combat it.]]>
Fri, 19 Jan 2018 18:11:56 GMT /slideshow/malware-to-the-realm-of-malicious-code-training/86417325 xathrya@slideshare.net(xathrya) Malware: To The Realm of Malicious Code (Training) xathrya 2017-07-16 A training for learning the internal of malware. This version is the compressed version of Malware Engineering & Crafting. We talk about malware as well as crafting the simple working malware. The goal of this session is to understand malware internal so one can have tactics to combat it. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-malware-180119181156-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2017-07-16 A training for learning the internal of malware. This version is the compressed version of Malware Engineering &amp; Crafting. We talk about malware as well as crafting the simple working malware. The goal of this session is to understand malware internal so one can have tactics to combat it.
Malware: To The Realm of Malicious Code (Training) from Satria Ady Pradana
]]>
172 3 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-malware-180119181156-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Reverse Engineering: Protecting and Breaking the Software (Workshop) /slideshow/reverse-engineering-protecting-and-breaking-the-software-workshop/86417230 workshop-180119180830
Workshop on Let's Secure Your Code Universitas Muhammadiyah Surakarta Surakarta, 2017-05-02 This workshop is a small introductory to Reverse Engineering, with C# and CIL as focus. The crackme: https://pastebin.com/AS8NEtLc The challenge: https://pastebin.com/Tb0MutfK ]]>

Workshop on Let's Secure Your Code Universitas Muhammadiyah Surakarta Surakarta, 2017-05-02 This workshop is a small introductory to Reverse Engineering, with C# and CIL as focus. The crackme: https://pastebin.com/AS8NEtLc The challenge: https://pastebin.com/Tb0MutfK ]]>
Fri, 19 Jan 2018 18:08:30 GMT /slideshow/reverse-engineering-protecting-and-breaking-the-software-workshop/86417230 xathrya@slideshare.net(xathrya) Reverse Engineering: Protecting and Breaking the Software (Workshop) xathrya Workshop on Let's Secure Your Code Universitas Muhammadiyah Surakarta Surakarta, 2017-05-02 This workshop is a small introductory to Reverse Engineering, with C# and CIL as focus. The crackme: https://pastebin.com/AS8NEtLc The challenge: https://pastebin.com/Tb0MutfK <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/workshop-180119180830-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Workshop on Let&#39;s Secure Your Code Universitas Muhammadiyah Surakarta Surakarta, 2017-05-02 This workshop is a small introductory to Reverse Engineering, with C# and CIL as focus. The crackme: https://pastebin.com/AS8NEtLc The challenge: https://pastebin.com/Tb0MutfK
Reverse Engineering: Protecting and Breaking the Software (Workshop) from Satria Ady Pradana
]]>
110 2 https://cdn.slidesharecdn.com/ss_thumbnails/workshop-180119180830-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Reverse Engineering: Protecting and Breaking the Software /slideshow/reverse-engineering-protecting-and-breaking-the-software-86417126/86417126 seminar-180119180449
Presentation on Let's Secure Your Code Universitas Muhammadiyah Surakarta Surakarta, 2017-05-01 Introduction to Reverse Engineering. This presentation is focusing on software or code, emphasizing on common practice in reverse engineering of software.]]>

Presentation on Let's Secure Your Code Universitas Muhammadiyah Surakarta Surakarta, 2017-05-01 Introduction to Reverse Engineering. This presentation is focusing on software or code, emphasizing on common practice in reverse engineering of software.]]>
Fri, 19 Jan 2018 18:04:49 GMT /slideshow/reverse-engineering-protecting-and-breaking-the-software-86417126/86417126 xathrya@slideshare.net(xathrya) Reverse Engineering: Protecting and Breaking the Software xathrya Presentation on Let's Secure Your Code Universitas Muhammadiyah Surakarta Surakarta, 2017-05-01 Introduction to Reverse Engineering. This presentation is focusing on software or code, emphasizing on common practice in reverse engineering of software. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/seminar-180119180449-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation on Let&#39;s Secure Your Code Universitas Muhammadiyah Surakarta Surakarta, 2017-05-01 Introduction to Reverse Engineering. This presentation is focusing on software or code, emphasizing on common practice in reverse engineering of software.
Reverse Engineering: Protecting and Breaking the Software from Satria Ady Pradana
]]>
134 3 https://cdn.slidesharecdn.com/ss_thumbnails/seminar-180119180449-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Memory Forensic: Investigating Memory Artefact (Workshop) /slideshow/memory-forensic-investigating-memory-artefact-workshop/86417094 workshop-180119180313
Workshop of memory forensic Atmajaya University Yogyakarta, 2017-04-29 What is memory forensic? How could it be important? How can we use memory forensic in certain case? Should we do memory forensic? This is the workshop side with hands-on material.]]>

Workshop of memory forensic Atmajaya University Yogyakarta, 2017-04-29 What is memory forensic? How could it be important? How can we use memory forensic in certain case? Should we do memory forensic? This is the workshop side with hands-on material.]]>
Fri, 19 Jan 2018 18:03:13 GMT /slideshow/memory-forensic-investigating-memory-artefact-workshop/86417094 xathrya@slideshare.net(xathrya) Memory Forensic: Investigating Memory Artefact (Workshop) xathrya Workshop of memory forensic Atmajaya University Yogyakarta, 2017-04-29 What is memory forensic? How could it be important? How can we use memory forensic in certain case? Should we do memory forensic? This is the workshop side with hands-on material. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/workshop-180119180313-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Workshop of memory forensic Atmajaya University Yogyakarta, 2017-04-29 What is memory forensic? How could it be important? How can we use memory forensic in certain case? Should we do memory forensic? This is the workshop side with hands-on material.
Memory Forensic: Investigating Memory Artefact (Workshop) from Satria Ady Pradana
]]>
90 1 https://cdn.slidesharecdn.com/ss_thumbnails/workshop-180119180313-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Memory Forensic: Investigating Memory Artefact /slideshow/memory-forensic-investigating-memory-artefact-86417018/86417018 seminar-180119180047
Presentation of memory forensic Atmajaya University Yogyakarta, 2017-04-29 What is memory forensic? How could it be important? How can we use memory forensic in certain case? Should we do memory forensic?]]>

Presentation of memory forensic Atmajaya University Yogyakarta, 2017-04-29 What is memory forensic? How could it be important? How can we use memory forensic in certain case? Should we do memory forensic?]]>
Fri, 19 Jan 2018 18:00:47 GMT /slideshow/memory-forensic-investigating-memory-artefact-86417018/86417018 xathrya@slideshare.net(xathrya) Memory Forensic: Investigating Memory Artefact xathrya Presentation of memory forensic Atmajaya University Yogyakarta, 2017-04-29 What is memory forensic? How could it be important? How can we use memory forensic in certain case? Should we do memory forensic? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/seminar-180119180047-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation of memory forensic Atmajaya University Yogyakarta, 2017-04-29 What is memory forensic? How could it be important? How can we use memory forensic in certain case? Should we do memory forensic?
Memory Forensic: Investigating Memory Artefact from Satria Ady Pradana
]]>
105 1 https://cdn.slidesharecdn.com/ss_thumbnails/seminar-180119180047-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-xathrya-48x48.jpg?cb=1689085062 blog.xathrya.id/ https://cdn.slidesharecdn.com/ss_thumbnails/presentation-211205014558-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/malware-for-red-team/250783905 Malware for Red Team https://cdn.slidesharecdn.com/ss_thumbnails/presentation-200828123403-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/down-the-rabbit-hole-from-networker-to-security-professional/238321436 Down The Rabbit Hole, ... https://cdn.slidesharecdn.com/ss_thumbnails/presentation-200725094531-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/mitm-tales-of-trust-and-betrayal/237236570 MITM: Tales of Trust a...