際際滷

際際滷Share a Scribd company logo
Mastering the Network HackingFU
     y3dips   {y3dips/at/echo/or/id}
Ada apa dengan TCP/IP

          Sudah Tua, kurang lebih 30 tahun.
          Dibuat tanpa memperhatikan
           keamanan
                   Contoh : Telnet, FTP, SMTP
          Celah sesungguhnya pada layer IP (v4)
                   Tidak ada metode verifikasi & enkripsi
                   Rentan terhadap IP spoofing dan MITM



Mastering the Network HackingFU  y3dips
Terkenal

          Tunneling
          Spoofing
          Sniffing
          ddos/botnet




Mastering the Network HackingFU  y3dips
Tunneling

   TOR油(the油Onion油Router)
          Emerge油tor油privoxy
          Konfigurasikan油untuk油jalan油berbarengan
               
                   Forward足socks4a油油油/油油油油油油油油油油油油油油油127.0.0.1:9050油.
   Node油TOR油bisa油dibuat油siapa油saja
          Gov,油Mil,油Mafia,油dan油siapa油saja
   Gunakan油enkripsi,油atau油prinsip油dual油tunnel
   https://www.torproject.org/
Tunneling


    SSH油Tunneling
           ssh油user@server油足D油port油

    Stunnel油足油stunnel.org

    Mengamankan油transaksi油melalui油protokol2油
     tanpa油enkripsi
          Tunneling油http,油smb油melalui油ssh/stunnel
Spoofing




Mastering the Network HackingFU  y3dips
Monkey In the middle attack




Mastering the Network HackingFU  y3dips
Bertahan dengan Unix

   Paper Baca di
           http://www.slideshare.net/y3dips/arpwall-protect-from-arp-spoofing/

   ARPWatch ,Swatch, PyGTK (alert.py)

  ARPWALL
     Arp s [ip] [mac]
  http://code.google.com/p/arpwall/ Wanna help ?




Mastering the Network HackingFU  y3dips
dDOS

   Untuk Dos, lihat
         http://www.slideshare.net/y3dips/denial-of-services/

   Deteksi Botnet via SNMP
             6666  7000 open
   Syn attack v.s Syn Cookies
   Teknik baru (sebenarnya lama)
             http://it.slashdot.org/article.pl?sid=08/10/01/0127245




Mastering the Network HackingFU  y3dips
Dunia Liar

          Tidak Standar (proprietary)
          Tertutup (closed source)
          Selamat tinggal anak-anak (kiddo)
          Kuat?




Mastering the Network HackingFU  y3dips
Dunia Liar

     Aplikasi scanner umumnya tak berdaya
       NMAP, Nessus, superscan
     Bekerja berdasarkan data yang di input
     Metode handshake berbeda




Mastering the Network HackingFU  y3dips
Perlengkapan

     Python [kemampuan programming]
     Scapy (pakcet Manipulating platform)
     Spoofing
     Sniffing (tcpdump only?)
     Some l33t tools (THCAmapcrap)




Mastering the Network HackingFU  y3dips
NMAP vs AMAP




Mastering the Network HackingFU  y3dips
Scapy




Mastering the Network HackingFU  y3dips
Aplikasi Pribadi

   Tidak kuat, bahkan relatif lebih lemah
       Hanya telnet secara multiple dan mereka mati
   Tcp/ip memang bercelah, Aplikasi yang
    berjalan diatasnya membawa dosa yang
    sama
        Tanpa metode verifikasi + enkripsi
   Tidak ada akses kontrol, otentikasi,
    session timeout, limitasi koneksi


Mastering the Network HackingFU  y3dips
Tips Info di Jaringan

          Snmp (default community strings)
          Smtp         ( vrfy dan expn verbs ; enumerate user)

          Ftp     (user enum)

          Pop3        (user enum)




Mastering the Network HackingFU  y3dips
Bertahan?

        IPV6
        Medukung Autentikasi , IP proteksi dan
         Trafik Kontrol
        Alasan politis dan bisnis maka belum
         populer.




Mastering the Network HackingFU  y3dips
Santai

  Tanya & Jawab
  Terima Kasih
   - Komite
   - himatif UPN
   - Kamu!, ya kamu yang mendukung acara
     ini.



Mastering the Network HackingFU  y3dips

Recommended

Tugas pti
Tugas pti
agusriyanto1990
Sistem deteksi intrusion berbasis jaringan
Sistem deteksi intrusion berbasis jaringan
Duwinowo NT
Powerpointku
Powerpointku
Euis Chealim
7 spread spectrum
7 spread spectrum
UNTUNGSG
Snort
Snort
Munir Putra
Keamanan jaringan
Keamanan jaringan
Shabrina Dewi
Firewall 2 nat
Firewall 2 nat
Fajar Rohmawan
backdooring workshop
backdooring workshop
Ammar WK
Web Hacking (basic)
Web Hacking (basic)
Ammar WK
password series
password series
Ammar WK
Linux Exploit Research
Linux Exploit Research
Dan H
Backtrack 5 - network pentest
Backtrack 5 - network pentest
Dan H
Backtrack 5 - web pentest
Backtrack 5 - web pentest
Dan H
Penetrasi Jaringan
Penetrasi Jaringan
Digital Echidna
Ethical hacking
Ethical hacking
Khairi Aiman
Advanced Exploit Development (Updated on 28 January, 2016)
Advanced Exploit Development (Updated on 28 January, 2016)
Dan H
Workshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment system
Dan H
Seminar Hacking & Security Analysis
Seminar Hacking & Security Analysis
Dan H
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
Ammar WK
Pentesting with linux
Pentesting with linux
Hammad Ahmed Khawaja
Debian Packaging tutorial
Debian Packaging tutorial
nussbauml
Had sec mikrotik administrator
Had sec mikrotik administrator
muhammad pailus
Connect your Javascript web app to ownCloud over the WebDAV interface
Connect your Javascript web app to ownCloud over the WebDAV interface
Ilian Sapundshiev
bluetooth [in]security
bluetooth [in]security
Ammar WK
webhacking
webhacking
Ammar WK
eMAPT
eMAPT
Andrii Holovchenko
Playin with Password
Playin with Password
Ammar WK
Exploit Development with Python
Exploit Development with Python
Thomas Gregory
Pertemuan 8
Pertemuan 8
Agung Mzl
Network security
Network security
mho3yank

More Related Content

Viewers also liked (20)

Web Hacking (basic)
Web Hacking (basic)
Ammar WK
password series
password series
Ammar WK
Linux Exploit Research
Linux Exploit Research
Dan H
Backtrack 5 - network pentest
Backtrack 5 - network pentest
Dan H
Backtrack 5 - web pentest
Backtrack 5 - web pentest
Dan H
Penetrasi Jaringan
Penetrasi Jaringan
Digital Echidna
Ethical hacking
Ethical hacking
Khairi Aiman
Advanced Exploit Development (Updated on 28 January, 2016)
Advanced Exploit Development (Updated on 28 January, 2016)
Dan H
Workshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment system
Dan H
Seminar Hacking & Security Analysis
Seminar Hacking & Security Analysis
Dan H
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
Ammar WK
Pentesting with linux
Pentesting with linux
Hammad Ahmed Khawaja
Debian Packaging tutorial
Debian Packaging tutorial
nussbauml
Had sec mikrotik administrator
Had sec mikrotik administrator
muhammad pailus
Connect your Javascript web app to ownCloud over the WebDAV interface
Connect your Javascript web app to ownCloud over the WebDAV interface
Ilian Sapundshiev
bluetooth [in]security
bluetooth [in]security
Ammar WK
webhacking
webhacking
Ammar WK
eMAPT
eMAPT
Andrii Holovchenko
Playin with Password
Playin with Password
Ammar WK
Exploit Development with Python
Exploit Development with Python
Thomas Gregory
Web Hacking (basic)
Web Hacking (basic)
Ammar WK
password series
password series
Ammar WK
Linux Exploit Research
Linux Exploit Research
Dan H
Backtrack 5 - network pentest
Backtrack 5 - network pentest
Dan H
Backtrack 5 - web pentest
Backtrack 5 - web pentest
Dan H
Ethical hacking
Ethical hacking
Khairi Aiman
Advanced Exploit Development (Updated on 28 January, 2016)
Advanced Exploit Development (Updated on 28 January, 2016)
Dan H
Workshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment system
Dan H
Seminar Hacking & Security Analysis
Seminar Hacking & Security Analysis
Dan H
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
Ammar WK
Debian Packaging tutorial
Debian Packaging tutorial
nussbauml
Had sec mikrotik administrator
Had sec mikrotik administrator
muhammad pailus
Connect your Javascript web app to ownCloud over the WebDAV interface
Connect your Javascript web app to ownCloud over the WebDAV interface
Ilian Sapundshiev
bluetooth [in]security
bluetooth [in]security
Ammar WK
webhacking
webhacking
Ammar WK
Playin with Password
Playin with Password
Ammar WK
Exploit Development with Python
Exploit Development with Python
Thomas Gregory

Similar to Mastering Network HackingFU - idsecconf2008 (7)

Pertemuan 8
Pertemuan 8
Agung Mzl
Network security
Network security
mho3yank
Attacking The Lan
Attacking The Lan
phanleson
Bab i dasar dasar jaringan
Bab i dasar dasar jaringan
Candra Adi Putra
Tipe serangan pada website&webserver
Tipe serangan pada website&webserver
Maya Ayunanda
02 teknik penyerangan
02 teknik penyerangan
Setia Juli Irzal Ismail
04 sniffing
04 sniffing
Setia Juli Irzal Ismail

More from Ammar WK (20)

Vvdp-fgd-bssn
Vvdp-fgd-bssn
Ammar WK
Pen-testing is Dead?
Pen-testing is Dead?
Ammar WK
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
Ammar WK
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
Ammar WK
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
Ammar WK
Bugbounty vs-0day
Bugbounty vs-0day
Ammar WK
Advanced Persistent Threat
Advanced Persistent Threat
Ammar WK
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
Ammar WK
Hacker? : it's not about Black or White
Hacker? : it's not about Black or White
Ammar WK
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
Ammar WK
Burp suite
Burp suite
Ammar WK
Network Packet Analysis
Network Packet Analysis
Ammar WK
Packet analysis (Basic)
Packet analysis (Basic)
Ammar WK
Network security
Network security
Ammar WK
Penetration testing
Penetration testing
Ammar WK
Information Security Professional
Information Security Professional
Ammar WK
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
Ammar WK
How To Become A Hacker
How To Become A Hacker
Ammar WK
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 network
Ammar WK
Vvdp-fgd-bssn
Vvdp-fgd-bssn
Ammar WK
Pen-testing is Dead?
Pen-testing is Dead?
Ammar WK
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
Ammar WK
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
Ammar WK
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
Ammar WK
Bugbounty vs-0day
Bugbounty vs-0day
Ammar WK
Advanced Persistent Threat
Advanced Persistent Threat
Ammar WK
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
Ammar WK
Hacker? : it's not about Black or White
Hacker? : it's not about Black or White
Ammar WK
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
Ammar WK
Burp suite
Burp suite
Ammar WK
Network Packet Analysis
Network Packet Analysis
Ammar WK
Packet analysis (Basic)
Packet analysis (Basic)
Ammar WK
Network security
Network security
Ammar WK
Penetration testing
Penetration testing
Ammar WK
Information Security Professional
Information Security Professional
Ammar WK
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
Ammar WK
How To Become A Hacker
How To Become A Hacker
Ammar WK
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 network
Ammar WK

Mastering Network HackingFU - idsecconf2008

  • 1. Mastering the Network HackingFU y3dips {y3dips/at/echo/or/id}
  • 2. Ada apa dengan TCP/IP Sudah Tua, kurang lebih 30 tahun. Dibuat tanpa memperhatikan keamanan Contoh : Telnet, FTP, SMTP Celah sesungguhnya pada layer IP (v4) Tidak ada metode verifikasi & enkripsi Rentan terhadap IP spoofing dan MITM Mastering the Network HackingFU y3dips
  • 3. Terkenal Tunneling Spoofing Sniffing ddos/botnet Mastering the Network HackingFU y3dips
  • 4. Tunneling TOR油(the油Onion油Router) Emerge油tor油privoxy Konfigurasikan油untuk油jalan油berbarengan Forward足socks4a油油油/油油油油油油油油油油油油油油油127.0.0.1:9050油. Node油TOR油bisa油dibuat油siapa油saja Gov,油Mil,油Mafia,油dan油siapa油saja Gunakan油enkripsi,油atau油prinsip油dual油tunnel https://www.torproject.org/
  • 5. Tunneling SSH油Tunneling ssh油user@server油足D油port油 Stunnel油足油stunnel.org Mengamankan油transaksi油melalui油protokol2油 tanpa油enkripsi Tunneling油http,油smb油melalui油ssh/stunnel
  • 7. Monkey In the middle attack Mastering the Network HackingFU y3dips
  • 8. Bertahan dengan Unix Paper Baca di http://www.slideshare.net/y3dips/arpwall-protect-from-arp-spoofing/ ARPWatch ,Swatch, PyGTK (alert.py) ARPWALL Arp s [ip] [mac] http://code.google.com/p/arpwall/ Wanna help ? Mastering the Network HackingFU y3dips
  • 9. dDOS Untuk Dos, lihat http://www.slideshare.net/y3dips/denial-of-services/ Deteksi Botnet via SNMP 6666 7000 open Syn attack v.s Syn Cookies Teknik baru (sebenarnya lama) http://it.slashdot.org/article.pl?sid=08/10/01/0127245 Mastering the Network HackingFU y3dips
  • 10. Dunia Liar Tidak Standar (proprietary) Tertutup (closed source) Selamat tinggal anak-anak (kiddo) Kuat? Mastering the Network HackingFU y3dips
  • 11. Dunia Liar Aplikasi scanner umumnya tak berdaya NMAP, Nessus, superscan Bekerja berdasarkan data yang di input Metode handshake berbeda Mastering the Network HackingFU y3dips
  • 12. Perlengkapan Python [kemampuan programming] Scapy (pakcet Manipulating platform) Spoofing Sniffing (tcpdump only?) Some l33t tools (THCAmapcrap) Mastering the Network HackingFU y3dips
  • 13. NMAP vs AMAP Mastering the Network HackingFU y3dips
  • 14. Scapy Mastering the Network HackingFU y3dips
  • 15. Aplikasi Pribadi Tidak kuat, bahkan relatif lebih lemah Hanya telnet secara multiple dan mereka mati Tcp/ip memang bercelah, Aplikasi yang berjalan diatasnya membawa dosa yang sama Tanpa metode verifikasi + enkripsi Tidak ada akses kontrol, otentikasi, session timeout, limitasi koneksi Mastering the Network HackingFU y3dips
  • 16. Tips Info di Jaringan Snmp (default community strings) Smtp ( vrfy dan expn verbs ; enumerate user) Ftp (user enum) Pop3 (user enum) Mastering the Network HackingFU y3dips
  • 17. Bertahan? IPV6 Medukung Autentikasi , IP proteksi dan Trafik Kontrol Alasan politis dan bisnis maka belum populer. Mastering the Network HackingFU y3dips
  • 18. Santai Tanya & Jawab Terima Kasih - Komite - himatif UPN - Kamu!, ya kamu yang mendukung acara ini. Mastering the Network HackingFU y3dips