Pengantar Awareness ISMS_Raditya Iryandi

ditkaminfo 779 views 67 slides Mar 11, 2015
Slide 1
Slide 1 of 67
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67

About This Presentation

Seminar Keamanan Informasi Yogyakarta, 10 Maret 2015


Slide Content

Hack World
Underground’s
Playground
by:
Raditya Iryandi

Disclaimer
Disclaimer
This presentation is intended to
demonstrate the inherent security,
design and configuration flaws in
publicly accessible satellite
communication networks and
promote the use of safer Information
Technology systems. Viewers and
readers are responsible for their own
actions and strongly encourage to
behave themselves.

Who
the
hack is
Radit?

http://google.com/search?
q=raditya+iryandi
Who the Hack is Radit?

Who the Hack is Radit?

SPOKEN
AT
WORLDWIDE
INFORMATION
SECURITY
CONFERENCES
Who the Hack is Radit?
INDONESIA,
MALAYSIA, SOUTH
KOREA, ETC

Who the Hack is Radit?
INDONESIA,
MALAYSIA, SOUTH
KOREA, ETC
SPOKEN
AT
WORLDWIDE
INFORMATION
SECURITY
CONFERENCES

Who the Hack is Radit?
INDONESIA,
MALAYSIA, SOUTH
KOREA, ETC
SPOKEN
AT
WORLDWIDE
INFORMATION
SECURITY
CONFERENCES

ON THE
SATELLITE
RESEARCH
LANDSCAPE
Who the Hack is Radit?

Cybercrime
Trends

Cybercrime TRENDS
1. KEPO
Information
Gathering

Cybercrime TRENDS
Personal
Information via
direct contact and
social media

Cybercrime TRENDS
Habit, habit and
habit

Cybercrime TRENDS
[DEMO]

Cybercrime TRENDS
2. Vulnerability
Scan

Cybercrime TRENDS

Hack Technique
3. Password
Cracking

Cybercrime TRENDS
name, date of birth,
kids name

Cybercrime TRENDS

Cybercrime TRENDS

Cybercrime TRENDS

Cybercrime TRENDS
#selfie

Cybercrime TRENDS

Cybercrime TRENDS

Cybercrime TRENDS

Cybercrime TRENDS

Cybercrime TRENDS

Cybercrime TRENDS
iCloud Nude Leaks: 26 Celebrities
Affected In The Nude Photo
Scandal

Cybercrime TRENDS
4. Packet
Sniffer

Cybercrime TRENDS

Cybercrime TRENDS

Cybercrime TRENDS

Cybercrime TRENDS

Cybercrime TRENDS

Cybercrime TRENDS

Cybercrime TRENDS
Perdaganan user/pass social media

Cybercrime TRENDS
5. Packet
Sniffer (RFID)

Cybercrime TRENDS

Hack Technique
6. Replay
Attack

Hack Technique
ATM Replay
Attack

Hack Technique

Hack Technique

Hack Technique
Satellite Replay
Attack

Hack Technique
7. Vulnerability
Exploit

Hack Technique

Hack Technique
8. Trojan
Exploit

Hack Technique

Hack Technique
9.Key loggers

Hack Technique

Hack Technique

Hack Technique
10.DOS

Hack Technique

3.Wireless
Network
Ninja
What Have I Done?

What’s Wrong
with Wireless?
Wireless Network Ninja

What’s Wrong
with Wireless?
What Have I Done?

What’s Wrong
with Wireless?
INSECURE (Clear Text)
INSECURE (WEP)
WPA Encrypted (WPA / WPA2)
Total Unique Wireless : 11.068
What Have I Done?

What’s Wrong
with Wireless?
What Have I Done?

What’s Wrong
with Wireless?

What Have I Done?

Wireless
Network
PRIMBON
Wireless Network Ninja
+ Beacon / Heartbeat
+ K . a . r . m . a
+ MITM ( Man in the Middle Attack)
+ ARPSpoffing + DNS Poisoning

Wireless Network Ninja
+ Beacon / Heartbeat

Wireless Network Ninja
+ K . A . R . M . A
Radit’s AP

Wireless Network Ninja
+ K . A . R . M . A

Wireless Network Ninja
+ Man in the Middle Attack
[ Demo ]
+ Hack dengan REDIRECT
+ Mencuri password
+ SSLStrip
+ ARP Spoofing + DNS Poisioning

Wireless Network Primbon
+ Gmail
+ Yahoo
+ Twitter
+ Youtube
+ Facebook
+ klikbca
+ mandiri
+ paypal
HACKED !!

Wireless Network Ninja
+ K . A . R . M . A
[ Demo ]

ARP Spoffing + DNS Poisoning

Q:
[email protected]
Thanks!
Tags