Seminar Keamanan Informasi Yogyakarta, 10 Maret 2015
Size: 13.09 MB
Language: en
Added: Mar 11, 2015
Slides: 67 pages
Slide Content
Hack World
Underground’s
Playground
by:
Raditya Iryandi
Disclaimer
Disclaimer
This presentation is intended to
demonstrate the inherent security,
design and configuration flaws in
publicly accessible satellite
communication networks and
promote the use of safer Information
Technology systems. Viewers and
readers are responsible for their own
actions and strongly encourage to
behave themselves.
Who
the
hack is
Radit?
http://google.com/search?
q=raditya+iryandi
Who the Hack is Radit?
Who the Hack is Radit?
SPOKEN
AT
WORLDWIDE
INFORMATION
SECURITY
CONFERENCES
Who the Hack is Radit?
INDONESIA,
MALAYSIA, SOUTH
KOREA, ETC
Who the Hack is Radit?
INDONESIA,
MALAYSIA, SOUTH
KOREA, ETC
SPOKEN
AT
WORLDWIDE
INFORMATION
SECURITY
CONFERENCES
Who the Hack is Radit?
INDONESIA,
MALAYSIA, SOUTH
KOREA, ETC
SPOKEN
AT
WORLDWIDE
INFORMATION
SECURITY
CONFERENCES
ON THE
SATELLITE
RESEARCH
LANDSCAPE
Who the Hack is Radit?
Cybercrime
Trends
Cybercrime TRENDS
1. KEPO
Information
Gathering
Cybercrime TRENDS
Personal
Information via
direct contact and
social media
Cybercrime TRENDS
Habit, habit and
habit
Cybercrime TRENDS
[DEMO]
Cybercrime TRENDS
2. Vulnerability
Scan
Cybercrime TRENDS
Hack Technique
3. Password
Cracking
Cybercrime TRENDS
name, date of birth,
kids name
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
#selfie
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
iCloud Nude Leaks: 26 Celebrities
Affected In The Nude Photo
Scandal
Cybercrime TRENDS
4. Packet
Sniffer
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Cybercrime TRENDS
Perdaganan user/pass social media
Cybercrime TRENDS
5. Packet
Sniffer (RFID)
Cybercrime TRENDS
Hack Technique
6. Replay
Attack
Hack Technique
ATM Replay
Attack
Hack Technique
Hack Technique
Hack Technique
Satellite Replay
Attack
Hack Technique
7. Vulnerability
Exploit
Hack Technique
Hack Technique
8. Trojan
Exploit
Hack Technique
Hack Technique
9.Key loggers
Hack Technique
Hack Technique
Hack Technique
10.DOS
Hack Technique
3.Wireless
Network
Ninja
What Have I Done?
What’s Wrong
with Wireless?
Wireless Network Ninja
What’s Wrong
with Wireless?
What Have I Done?
What’s Wrong
with Wireless?
INSECURE (Clear Text)
INSECURE (WEP)
WPA Encrypted (WPA / WPA2)
Total Unique Wireless : 11.068
What Have I Done?
What’s Wrong
with Wireless?
What Have I Done?
What’s Wrong
with Wireless?
What Have I Done?
Wireless
Network
PRIMBON
Wireless Network Ninja
+ Beacon / Heartbeat
+ K . a . r . m . a
+ MITM ( Man in the Middle Attack)
+ ARPSpoffing + DNS Poisoning
Wireless Network Ninja
+ Beacon / Heartbeat
Wireless Network Ninja
+ K . A . R . M . A
Radit’s AP
Wireless Network Ninja
+ K . A . R . M . A
Wireless Network Ninja
+ Man in the Middle Attack
[ Demo ]
+ Hack dengan REDIRECT
+ Mencuri password
+ SSLStrip
+ ARP Spoofing + DNS Poisioning