Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Hackology - exhilarate way to hack

Hackology - exhilarate way to hack

This slide originally created by Yahya F. Al Fatih in term to educate people about the fun way of hacking. This slide is specially for event InfoVest 2018, speaker did not responsible for any misuse technique or tools in this slide.

Yahya Fadhlulloh Al-Fatih

October 01, 2018
Tweet

More Decks by Yahya Fadhlulloh Al-Fatih

Other Decks in Technology

Transcript

  1. Hackology Exhillarate way to //.hack This slide originally created by

    Yahya F. Al Fatih in term to educate people about the fun way of hacking. This slide is specially for event InfoVest 2018, speaker did not responsible for any misuse technique or tools in this slide. #
  2. # Yahya F. Al Fatih CTO of Crowde an abnormal

    tech savy. love to penetrate your apps. no DOTA no LYFE. 15 years experience in IT security 10 years as web developer 4 years in startup Wawadukan community WWWID writer
  3. # Who tf is hacker ? STEP 1 Learn the

    hacker mind STEP 2 your apps is suck! STEP 3 Find the way! STEP 4 Test who you are STEP 5 Untuk memahami seberapa fun nya hacking, lebih baik jika menggunakan beberapa langkah yang sudah ditulis, dimulai dari Who tf is hacker ?, Learn the hacker mind, your apps is suck!, dilanjut dengan membuat praktek dimana dikenalkan penggunaan tools dan untuk apa lalu di lanjut dengan hacking test. Do you know the way ?
  4. dirsearch & OpenDoor cek folder yang terdaftar CainAbel & Wireshark

    Baca data Python 2.7 & 3.6 Basic Package Tolong install semua aplikasi berikut The artifact of the way! nmap & sublist3r Advance Footprinting SQLmap & havij Sqlmap Expert WAScan & AVS Automated Vulnerability Scanner #
  5. 7

  6. 8

  7. 1001 alasan mereka melakukan hacking 9 - Sebuah tantangan -

    Forge Knowledge - Server Baru - Showoff (?) - Diputusin mantan - Kepo mantan - Dendam sama dosen - Pengen internet gratis - Greedy cryptocurrency - miner - Bitcoin - dsb
  8. 10

  9. Hack JS - BeeF JS - Keylogger JS - Coinhive

    JS - Rowhammer JS - LOIC JS - XSS’OR JS 11
  10. 17

  11. “ Most of your Apps Vulnerabilities Come from npm 23

    > 375,000 packages > 70,000 publisher > ~14% of npm packages carry known vulnerabilities
  12. “ Do you have any solution ? :( 25 >

    Dependencies Vulnerability scanner > re-check for every new feature is pushed > Manually Check Exploit database > patch~ > update~
  13. 27 A1 - Injection SQL Injection Injection Flaw, yang berasal

    pada umumnya di SQL, OS, LDAP muncul disaat data serangan yang dikirimkan adalah data yang valid sebagai command. Penyerang mampu mengeksekusi “tricky query/ command” yang dapat disalahgunakan oleh penyerang untuk mendapatkan data apapun tanpa perlu autorisasi.
  14. Definisi > Spesifik fungsi dengan kebutuhan informasi/ data berasal dari

    input user, informasi/ data tersebut bersifat "tidak aman" secara default 28
  15. 30 A2 - Broken Authentication Terkadang fungsi aplikasi tidak terimplementasi

    dengan baik pada bagian otentikasi yang berisko terhadap identitas user digunakan oleh orang lain. Penyerang mampu melakukan fungsi pada user aktif tersebut dan melakukan manipulasi data atau melakukan “breach” data pada user tersebut.
  16. 35 A1 - Injection Cross-site Scripting Pengiriman data tanpa validasi

    yang dikirimkan ke web browser client, dimana penyerang mampu mengeksekusi custom scripting ke browser client.
  17. 40 A3 - Sensitive Data Exposure Pengiriman data tanpa validasi

    yang dikirimkan ke web browser client, dimana penyerang mampu mengeksekusi custom scripting ke browser client.
  18. “ 42 What should I do with my code ?

    :( > Security Guide for Developer https://github.com/k1m0ch1/secguide
  19. 6 reason password rules are bullshit - can’t remember -

    Special F#C@ING char - Special word - Too long - Expired password - CAN’T REMEMBER 44
  20. - Do not set arbitary length limit (NIST standar is

    256 character) - Never prohibit any special character - Allow paste and password manager - Always [salted] hash. Never store password using 2 way encryption - Offer two-factor authentication Handling Password 46
  21. “ People cannot create strong, unique password accross all their

    service using only their brain to remember 47
  22. - Jangan menggunakan password yang kadaluarsa - Jangan pake rule

    aneh aneh - Jangan pake password hint New NIST Recommendation 48
  23. 53

  24. 54

  25. 55

  26. 56

  27. 57

  28. 58

  29. 59

  30. 60

  31. 62 What we need in cyber security is not a

    firewall, not a motte and palisade to keep our bailey inviolate, but an immune system
  32. 65

  33. Rules of play Time 45 minutes Build party or solo

    no DDoS #f9ba48 #ffffff https://ctf.wawadukan.id
  34. Now the world is yours. The Challenge is hacker is

    not only you, there is a 1001 type of hacker in the world, now go on young padawan, Explore the World and become the best of the best, always remember, Keep Trying and There is no 100% secure in the world # The World is yours