In the beginning … Was the command line

About twenty years ago Jobs and Wozniak, the founders of Apple, came up with the very strange idea of selling information processing machines for use in the home. The business too. About twenty years ago Jobs and Wozniak, the founders of Apple, came up with the very strange idea of selling information processing machines for […]

Penetration Testing Process

Setelah mendapatkan izin dari pemilik sistem dan scope pengujian disepakati, maka kegiatan penetration testing secara umum dibagi menjadi tiga process, yaitu: pengumpulan informasi (reconnaissance, scanning, enumeration), exploitasi (gain access) dan post-exploitasi (privilege escalation, maintaining access dan clean up) serta diakhiri dengan laporan akhir yang berisi rekomendasi untuk mengelola resiko. Ketiga proses tersebut dijelaskan lebih detail […]