Proses Serangan terhadap Jaringan Komputer

Slides:



Advertisements
Presentasi serupa
FootPrinting & Scanning Target
Advertisements

Muhammad Anshari Administrasi & Design Jaringan IP Addressing I.
Basic Issue In System Administration. Bassic Issue In System Administration Creating and managing accounts Performing administrative task Access control.
Pemrograman Jaringan Socket Programming Aurelio Rahmadian.
Zaini, PhD Jurusan Teknik Elektro Universitas Andalas 2012
Pemrograman Internet Mobile 7 PHP: Hypertext Preprocessors.
Konfigurasi Wireless Network Dg Windows XP Fitri Setyorini.
INTERNETWORKING PROTOCOL
Slide 8 – Global System for Mobile Communication (GSM)
Network Layer : Addressing
Lecture 5 Nonblocking I/O and Multiplexing Erick Pranata © Sekolah Tinggi Teknik Surabaya 1.
1 Pertemuan 1 Introduction Matakuliah: sistem Operasi Tahun: 2010.
Edi Rosadi, SKom Perancangan Intranet dan Internet.
Pertemuan 2 Socket Introduction
4/19/20151 Chapter 3 Oktober /19/20152 Objectives Mendefinisikan lapisan Aplikasi sebagai sumber dan tujuan dari data untuk komunikasi melalui.
Linux Networking Tools. ICMP Internet Control Message Protocol ICMP Message  Echo & Echo Reply  Destination Unreachable  Redirect  Traceroute.
Eksplotasi Keamanan.
1 Pertemuan 1 Pendahuluan Matakuliah: H0483 – Network Programming Tahun: 2005 Versi: 1.0.
Transport Layer Protocol
OSI LAYER.
PENGENALAN JARINGAN (Network Fundamental)
DoS Attack.
BASIC CISCO. Memakai Cisco Cisco dapat dikonfigurasi melalui 3 cara : Console : menggunakan cable console yang dihubungkan melalui serial port dan menggunakan.
1 Pertemuan 09 Kebutuhan Sistem Matakuliah: T0234 / Sistem Informasi Geografis Tahun: 2005 Versi: 01/revisi 1.
Oleh Agus Prihanto, ST, M.Kom
Simple Object Access Protocol
1 Pertemuan 12 Pengkodean & Implementasi Matakuliah: T0234 / Sistem Informasi Geografis Tahun: 2005 Versi: 01/revisi 1.
Electronic Engineering Polytechnic Institut of Surabaya – ITS Kampus ITS Sukolilo Surabaya Portsentry.
1 Eksplotasi Keamanan. 2 Tujuan Setelah perkuliahan ini mahasiswa dapat menjelaskan :  cara intruder mengekploitasi lubang-lubang keamanan  hack anatomi.
Telnet + SSH + RDC.
1 Pertemuan 7 Name and Address Conversion Matakuliah: H0483 / Network Programming Tahun: 2005 Versi: 1.0.
PROTOKOL LAPISAN APLIKASI
Layer Data Link Pertemuan 13 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Verb Tense Tense denotes the time of the action indicated by a verb. The time is not always the same as that indicated by the name of the tense.
F ORM Bayu Priyambadha, S.Kom. F ORM Form is the interface (user interface) for users to communicate with the application system. Each posted data from.
IP Addressing Laboratorium Teknik Informatika Universitas Gunadarma Stefanus Vlado Adi Kristanto Version 1.4.
Penutup MS.ExcelProfilKesimpulan KELOMPOK 8 KA 11.2A.04 BINA SARANA INFORMATIKA JL.Cut Mutia No.88 Bekasi STATISTIKA DESKRIPTIF.
KELOMPOK 1 : Agung Gunawan Anggota : Agung Gunawan Dedi Mulya Dinata Dedi Mulya Dinata Nani Susilawati Nani Susilawati Yudi Irawan Yuli Yuliawati.
Network address translation (nat)
Eksploitasi Keamanan Pertemuan XIII.
AJAX (Asynchronous Javascript And XML)
Serangan Lapis Jaringan
CARA KERJA WEB Rofilde Hasudungan.
Domain Name System (for Linux)
AJAX Teguh S.
Materi 6 Lapis Transport
TCP & UDP.
SERVERS , OPERATING SYSTEMS
Website WEB World Wide Web www W3 A set of interconnected webpages, usually including a homepage, generally located on the same server, and prepared.
VLAN Virtual LAN.
Eksplotasi Keamanan.
PERTEMUAN KETUJUH Referensi Model DoD.
Secure Analysis & Testing (Hacking Technique)
Database User Account.
1 © 2004, Cisco Systems, Inc. All rights reserved. Module 2 Single-Area OSPF.
OSI LAYER.
INTERNETWORKING Didi Juardi,ST.,M.Kom.
KONSEP PROTOKOL OSI & TCP/IP Telekomunikasi Indonesia APRIL 2006.
How to Set Up AT&T on MS Outlook ATT is a multinational company headquartered in Texas. ATT services are used by many people widely across.
© Mark E. Damon - All Rights Reserved Another Presentation © All rights Reserved
Keamanan Informasi dan Administrasi Jaringan
Jaringan Komputer.
V ERIZON SETTINGS FOR I P HONE, A NDROID, O UTLOOK, AND W INDOWS P HONE.
HughesNet was founded in 1971 and it is headquartered in Germantown, Maryland. It is a provider of satellite-based communications services. Hughesnet.
Kasus DDNS Dynamic Domain Name Server
Here you'll find the complete solution about how to set up Roadrunner settings for iPhone, Android, Windows Phone and Outlook. Unable to set up Roadrunner.
Do you want to check your Zoho mail incoming or outgoing logs and unable to check, go through with this article and access Zoho mail incoming or outgoing.
 Zoho Mail offers easy options to migrate data from G Suite or Gmail accounts. All s, contacts, and calendar or other important data can be imported.
BY : LUTFIANI RATNA DEWANTI LILIS SINARSIH Action Research.
Media Pembelajaran PATHWAY TO ENGLISH Kelompok Peminatan Untuk SMA/MA Kelas X.
Transcript presentasi:

Proses Serangan terhadap Jaringan Komputer

Reconnaissance dan footprinting Scanning Enumerasi Mendapatkan Akses Eskalasi Membuat Backdoor dan menyembunyikan jejak

Reconnaissance Fase persiapan awal Mencari informasi sebanyak-banyaknya mengenai target/korban sebelum melakukan serangan Informasi bisa didapat dari target/korban maupun tempat lain yg terkait dengan terkait/korban

footprinting Cetak biru dari profile korban/target Fase ini memakan waktu 90% dari attacker dalam melakukan aksinya (10% untuk menyerang target) Foot-printing perlu dibuat secara sistematik untuk memastikan semua informasi yg terkumpul dan akan digunakan terkait dengan target

KOMPAS.COM Registrant: PT Kompas Media Nusantara Jalan Palmerah Selatan 26-28 Jakarta, Jakarta 10270 ID Domain name: KOMPAS.COM Administrative Contact: Division, Internet admin@vic.com 1(888)811-8681 Technical Contact: Administration, VIC DNS hostmaster@vic.com P.O. Box 31571 Knoxville, TN 37930 US 865 470 7851 Fax: 865 470 7369 Registration Service Provider: Virtual Interactive Center, admin@vic.com 865 524 8888 865 524 0740 (fax) Please contact us for domain login/passwords, DNS/Nameserver changes, and general domain support questions. Registrar of Record: TUCOWS, INC. Record last updated on 09-Dec-2004. Record expires on 17-Dec-2006. Record created on 18-Dec-1995. Domain servers in listed order: NS.VIC.COM 64.203.64.10 NS2.VIC.COM 64.203.64.11 Domain status: ACTIVE

Scanning Scanning can be compared to a thief checking all the doors and windows of a house he wants to break into. Scanning- The art of detecting which systems are alive and reachable via the internet and what services they offer, using techniques such as ping sweeps, port scans and operating system identification, is called scanning. The kind of information collected here has to do with the following: 1) TCP/UDP services running on each system identified. 2) System architecture (Sparc, Alpha, x86) 3) Specific IP address of systems reachable via the internet. 4) Operating System type.

PING SWEEPS ICMP SWEEPS ICMP ECHO request ICMP ECHO reply Intruder Target alive Querying multiple hosts – Ping sweep is fairly slow Examples UNIX – fping and gping WINDOWS - Pinger

Broadcast ICMP Intruder Network ICMP ECHO reply ICMP ECHO request ICMP ECHO reply ICMP ECHO reply Can Distinguish between UNIX and WINDOWS machine UNIX machine answers to requests directed to the network address. WINDOWS machine will ignore it.

PING SWEEPS NON – ECHO ICMP Example ICMP Type 13 – (Time Stamp) Originate Time Stamp - The time the sender last touched the message before sending Receive Time Stamp - The echoer first touched it on receipt. Transmit Time Stamp - The echoer last touched on sending it.

PING Sweeps TCP Sweeps Client Server When will a RESET be sent? C(SYN:PortNo & ISN) S (SYN & ISN) + ACK[ C (SYN+!) ] RESET (not active) Client Server S(ISN+1) When will a RESET be sent? When RFC does not appear correct while appearing. RFC = (Destination (IP + port number) & Source( IP & port number))

Port Scanning Types TCP Connect() Scan SYN packet SYN/ACK listening RST/ACK (port not listening) SYN/ACK A connection is terminated after the full length connection establishment process has been completed

Enumeration Enumeration extracts information about: Resources or shares on the network User names or groups assigned on the network Last time user logged on User’s password Before enumeration, you use Port scanning and footprinting To Determine OS being used Intrusive process