About twenty years ago Jobs and Wozniak, the founders of Apple, came up with the very strange idea of selling information processing machines for use in the home. The business too. About twenty years ago Jobs and Wozniak, the founders of Apple, came up with the very strange idea of selling information processing machines for […]
Day: February 23, 2016
Penetration Testing Process
Setelah mendapatkan izin dari pemilik sistem dan scope pengujian disepakati, maka kegiatan penetration testing secara umum dibagi menjadi tiga process, yaitu: pengumpulan informasi (reconnaissance, scanning, enumeration), exploitasi (gain access) dan post-exploitasi (privilege escalation, maintaining access dan clean up) serta diakhiri dengan laporan akhir yang berisi rekomendasi untuk mengelola resiko. Ketiga proses tersebut dijelaskan lebih detail […]