SlideShare a Scribd company logo
1 of 28
Download to read offline
Copyleft !(c)2005 y3dips.echo.or.id
Password Series
(y3dips)




A. Pengantar
1. Sekapur sirih
Kisah ini membagi kepada kita semua tentang beberapa cara untuk
menyerang proses otentikasi dari suatu sistem. Salah satu bagian
terpenting dari proses otentikasi adalah penggunaan username dan
password, di chapter berikut ini aku akan mendiskusikan beberapa
cara untuk mendapatkan user dan password dari suatu sistem.

2. Aplikasi yang digunakan
   •   Explore2fs
       http://uranus.it.swin.edu.au/~jn/linux/ext2ifs.htm
   •   Pwdump2
   •   Samdump2
   •   Bkhive
   •   Ethereal
   •   John The Ripper




                                        Copyleft !(c)2005 y3dips.echo.or.id
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi
Mendapatkan Password Tanpa Aksi

More Related Content

Viewers also liked

Linux Exploit Research
Linux Exploit ResearchLinux Exploit Research
Linux Exploit ResearchDan H
 
Workshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment systemWorkshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment systemDan H
 
Backtrack 5 - web pentest
Backtrack 5 - web pentestBacktrack 5 - web pentest
Backtrack 5 - web pentestDan H
 
Backtrack 5 - network pentest
Backtrack 5 - network pentestBacktrack 5 - network pentest
Backtrack 5 - network pentestDan H
 
Seminar Hacking & Security Analysis
Seminar Hacking & Security AnalysisSeminar Hacking & Security Analysis
Seminar Hacking & Security AnalysisDan H
 
Connect your Javascript web app to ownCloud over the WebDAV interface
Connect your Javascript web app to ownCloud over the WebDAV interface Connect your Javascript web app to ownCloud over the WebDAV interface
Connect your Javascript web app to ownCloud over the WebDAV interface Ilian Sapundshiev
 
bluetooth [in]security
bluetooth [in]securitybluetooth [in]security
bluetooth [in]securityAmmar WK
 
Debian Cloud - building the Debian AMIs
Debian Cloud - building the Debian AMIsDebian Cloud - building the Debian AMIs
Debian Cloud - building the Debian AMIsJames Bromberger
 
PyCoRAM (高位合成友の会@ドワンゴ, 2015年1月16日)
PyCoRAM (高位合成友の会@ドワンゴ, 2015年1月16日)PyCoRAM (高位合成友の会@ドワンゴ, 2015年1月16日)
PyCoRAM (高位合成友の会@ドワンゴ, 2015年1月16日)Shinya Takamaeda-Y
 
Alur attacking web (sisi client)
Alur attacking web (sisi client)Alur attacking web (sisi client)
Alur attacking web (sisi client)Chandra Zeattacker
 
A CGRA-based Approach for Accelerating Convolutional Neural Networks
A CGRA-based Approachfor Accelerating Convolutional Neural NetworksA CGRA-based Approachfor Accelerating Convolutional Neural Networks
A CGRA-based Approach for Accelerating Convolutional Neural NetworksShinya Takamaeda-Y
 
Hardware Hacking
Hardware HackingHardware Hacking
Hardware Hackingrngtng
 
Tutorial server ubuntu
Tutorial server ubuntuTutorial server ubuntu
Tutorial server ubuntuJisim Kuring
 
Course lecture - An introduction to the Return Oriented Programming
Course lecture - An introduction to the Return Oriented ProgrammingCourse lecture - An introduction to the Return Oriented Programming
Course lecture - An introduction to the Return Oriented ProgrammingJonathan Salwan
 
Exactly, ownCloud, Archivematica, Arkivum
Exactly, ownCloud, Archivematica, ArkivumExactly, ownCloud, Archivematica, Arkivum
Exactly, ownCloud, Archivematica, ArkivumJisc RDM
 
Advanced Exploit Development (Updated on 28 January, 2016)
Advanced Exploit Development (Updated on 28 January, 2016)Advanced Exploit Development (Updated on 28 January, 2016)
Advanced Exploit Development (Updated on 28 January, 2016)Dan H
 

Viewers also liked (19)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Penetrasi Jaringan
Penetrasi JaringanPenetrasi Jaringan
Penetrasi Jaringan
 
Linux Exploit Research
Linux Exploit ResearchLinux Exploit Research
Linux Exploit Research
 
Workshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment systemWorkshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment system
 
Backtrack 5 - web pentest
Backtrack 5 - web pentestBacktrack 5 - web pentest
Backtrack 5 - web pentest
 
Backtrack 5 - network pentest
Backtrack 5 - network pentestBacktrack 5 - network pentest
Backtrack 5 - network pentest
 
Seminar Hacking & Security Analysis
Seminar Hacking & Security AnalysisSeminar Hacking & Security Analysis
Seminar Hacking & Security Analysis
 
Connect your Javascript web app to ownCloud over the WebDAV interface
Connect your Javascript web app to ownCloud over the WebDAV interface Connect your Javascript web app to ownCloud over the WebDAV interface
Connect your Javascript web app to ownCloud over the WebDAV interface
 
bluetooth [in]security
bluetooth [in]securitybluetooth [in]security
bluetooth [in]security
 
Debian Cloud - building the Debian AMIs
Debian Cloud - building the Debian AMIsDebian Cloud - building the Debian AMIs
Debian Cloud - building the Debian AMIs
 
PyCoRAM (高位合成友の会@ドワンゴ, 2015年1月16日)
PyCoRAM (高位合成友の会@ドワンゴ, 2015年1月16日)PyCoRAM (高位合成友の会@ドワンゴ, 2015年1月16日)
PyCoRAM (高位合成友の会@ドワンゴ, 2015年1月16日)
 
Alur attacking web (sisi client)
Alur attacking web (sisi client)Alur attacking web (sisi client)
Alur attacking web (sisi client)
 
A CGRA-based Approach for Accelerating Convolutional Neural Networks
A CGRA-based Approachfor Accelerating Convolutional Neural NetworksA CGRA-based Approachfor Accelerating Convolutional Neural Networks
A CGRA-based Approach for Accelerating Convolutional Neural Networks
 
Hardware Hacking
Hardware HackingHardware Hacking
Hardware Hacking
 
Tutorial server ubuntu
Tutorial server ubuntuTutorial server ubuntu
Tutorial server ubuntu
 
Uji performa kontroler on Semnasteknomedia Amikom 2015
Uji performa kontroler on Semnasteknomedia Amikom 2015Uji performa kontroler on Semnasteknomedia Amikom 2015
Uji performa kontroler on Semnasteknomedia Amikom 2015
 
Course lecture - An introduction to the Return Oriented Programming
Course lecture - An introduction to the Return Oriented ProgrammingCourse lecture - An introduction to the Return Oriented Programming
Course lecture - An introduction to the Return Oriented Programming
 
Exactly, ownCloud, Archivematica, Arkivum
Exactly, ownCloud, Archivematica, ArkivumExactly, ownCloud, Archivematica, Arkivum
Exactly, ownCloud, Archivematica, Arkivum
 
Advanced Exploit Development (Updated on 28 January, 2016)
Advanced Exploit Development (Updated on 28 January, 2016)Advanced Exploit Development (Updated on 28 January, 2016)
Advanced Exploit Development (Updated on 28 January, 2016)
 

Similar to Mendapatkan Password Tanpa Aksi

Sim,pert 10 , yasmin navisa, hapzi ali, keamanan sistem informasi,universitas...
Sim,pert 10 , yasmin navisa, hapzi ali, keamanan sistem informasi,universitas...Sim,pert 10 , yasmin navisa, hapzi ali, keamanan sistem informasi,universitas...
Sim,pert 10 , yasmin navisa, hapzi ali, keamanan sistem informasi,universitas...yasminnavisa
 
2. security system attack
2. security system attack2. security system attack
2. security system attackimam damo
 
Hacker dan cracker new
Hacker dan cracker newHacker dan cracker new
Hacker dan cracker newsiswabsi
 
Modul 5 - Keamanan Jaringan Komputer
Modul 5 - Keamanan Jaringan KomputerModul 5 - Keamanan Jaringan Komputer
Modul 5 - Keamanan Jaringan Komputerjagoanilmu
 
Belajar hacking-website-d
Belajar hacking-website-dBelajar hacking-website-d
Belajar hacking-website-dAde Tamin
 
MK Keamanan Komputer - Sesi 3 & 4 : Lapisan Keamanan & Desktop Security
MK Keamanan Komputer - Sesi 3 & 4 : Lapisan Keamanan & Desktop SecurityMK Keamanan Komputer - Sesi 3 & 4 : Lapisan Keamanan & Desktop Security
MK Keamanan Komputer - Sesi 3 & 4 : Lapisan Keamanan & Desktop SecurityBambang
 
Sim, citra ariesta dharma, forum 10, Hapzi Ali, S1 Akuntansi, Universitas Mer...
Sim, citra ariesta dharma, forum 10, Hapzi Ali, S1 Akuntansi, Universitas Mer...Sim, citra ariesta dharma, forum 10, Hapzi Ali, S1 Akuntansi, Universitas Mer...
Sim, citra ariesta dharma, forum 10, Hapzi Ali, S1 Akuntansi, Universitas Mer...Citra Ariesta
 
Bab 14 Pengantar Teknologi Informasi Keamanan Jaringan
Bab 14 Pengantar Teknologi Informasi Keamanan JaringanBab 14 Pengantar Teknologi Informasi Keamanan Jaringan
Bab 14 Pengantar Teknologi Informasi Keamanan JaringanStephen Setiawan
 
Belajar hacking website
Belajar hacking websiteBelajar hacking website
Belajar hacking websiteKamar Tidur
 
pembahasan kemanan komputer
pembahasan kemanan komputerpembahasan kemanan komputer
pembahasan kemanan komputerGisnu Gintara
 
Digital Forensik dalam keseharian by relawan tik sukabumi
Digital Forensik dalam keseharian by relawan tik sukabumiDigital Forensik dalam keseharian by relawan tik sukabumi
Digital Forensik dalam keseharian by relawan tik sukabumiGeri Sugiran Abdul Sukur
 
Workshop web hacking 9 februari 2014
Workshop web hacking 9 februari 2014Workshop web hacking 9 februari 2014
Workshop web hacking 9 februari 2014Muhammad Romadhon
 
Troubleshooting dengan Deep Packet Inspection
Troubleshooting dengan Deep Packet InspectionTroubleshooting dengan Deep Packet Inspection
Troubleshooting dengan Deep Packet InspectionPT. Siwali Swantika
 
Network security
Network securityNetwork security
Network securityeno caknow
 
Network security
Network securityNetwork security
Network securityEno Caknow
 

Similar to Mendapatkan Password Tanpa Aksi (20)

Makalah persentasi
Makalah persentasiMakalah persentasi
Makalah persentasi
 
Keamanan s&i
Keamanan s&iKeamanan s&i
Keamanan s&i
 
Sim,pert 10 , yasmin navisa, hapzi ali, keamanan sistem informasi,universitas...
Sim,pert 10 , yasmin navisa, hapzi ali, keamanan sistem informasi,universitas...Sim,pert 10 , yasmin navisa, hapzi ali, keamanan sistem informasi,universitas...
Sim,pert 10 , yasmin navisa, hapzi ali, keamanan sistem informasi,universitas...
 
2. security system attack
2. security system attack2. security system attack
2. security system attack
 
Hacker dan cracker new
Hacker dan cracker newHacker dan cracker new
Hacker dan cracker new
 
Materi Pelatihan analisa malware
Materi Pelatihan analisa malwareMateri Pelatihan analisa malware
Materi Pelatihan analisa malware
 
Modul 5 - Keamanan Jaringan Komputer
Modul 5 - Keamanan Jaringan KomputerModul 5 - Keamanan Jaringan Komputer
Modul 5 - Keamanan Jaringan Komputer
 
Belajar hacking-website-d
Belajar hacking-website-dBelajar hacking-website-d
Belajar hacking-website-d
 
MK Keamanan Komputer - Sesi 3 & 4 : Lapisan Keamanan & Desktop Security
MK Keamanan Komputer - Sesi 3 & 4 : Lapisan Keamanan & Desktop SecurityMK Keamanan Komputer - Sesi 3 & 4 : Lapisan Keamanan & Desktop Security
MK Keamanan Komputer - Sesi 3 & 4 : Lapisan Keamanan & Desktop Security
 
Sim, citra ariesta dharma, forum 10, Hapzi Ali, S1 Akuntansi, Universitas Mer...
Sim, citra ariesta dharma, forum 10, Hapzi Ali, S1 Akuntansi, Universitas Mer...Sim, citra ariesta dharma, forum 10, Hapzi Ali, S1 Akuntansi, Universitas Mer...
Sim, citra ariesta dharma, forum 10, Hapzi Ali, S1 Akuntansi, Universitas Mer...
 
Bab 14 Pengantar Teknologi Informasi Keamanan Jaringan
Bab 14 Pengantar Teknologi Informasi Keamanan JaringanBab 14 Pengantar Teknologi Informasi Keamanan Jaringan
Bab 14 Pengantar Teknologi Informasi Keamanan Jaringan
 
Belajar hacking website
Belajar hacking websiteBelajar hacking website
Belajar hacking website
 
pembahasan kemanan komputer
pembahasan kemanan komputerpembahasan kemanan komputer
pembahasan kemanan komputer
 
Digital Forensik dalam keseharian by relawan tik sukabumi
Digital Forensik dalam keseharian by relawan tik sukabumiDigital Forensik dalam keseharian by relawan tik sukabumi
Digital Forensik dalam keseharian by relawan tik sukabumi
 
Workshop web hacking 9 februari 2014
Workshop web hacking 9 februari 2014Workshop web hacking 9 februari 2014
Workshop web hacking 9 februari 2014
 
Troubleshooting dengan Deep Packet Inspection
Troubleshooting dengan Deep Packet InspectionTroubleshooting dengan Deep Packet Inspection
Troubleshooting dengan Deep Packet Inspection
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Basic Metasploit
Basic MetasploitBasic Metasploit
Basic Metasploit
 
Tugas jarkom
Tugas jarkomTugas jarkom
Tugas jarkom
 

More from Ammar WK

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssnAmmar WK
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?Ammar WK
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsAmmar WK
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!Ammar WK
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryAmmar WK
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0dayAmmar WK
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent ThreatAmmar WK
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareAmmar WK
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteAmmar WK
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingAmmar WK
 
Burp suite
Burp suiteBurp suite
Burp suiteAmmar WK
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet AnalysisAmmar WK
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)Ammar WK
 
Network security
Network securityNetwork security
Network securityAmmar WK
 
Penetration testing
Penetration testingPenetration testing
Penetration testingAmmar WK
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security ProfessionalAmmar WK
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsAmmar WK
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A HackerAmmar WK
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?Ammar WK
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkAmmar WK
 

More from Ammar WK (20)

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssn
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0day
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or White
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet Analysis
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)
 
Network security
Network securityNetwork security
Network security
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security Professional
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A Hacker
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 network
 

Mendapatkan Password Tanpa Aksi

  • 2. Password Series (y3dips) A. Pengantar 1. Sekapur sirih Kisah ini membagi kepada kita semua tentang beberapa cara untuk menyerang proses otentikasi dari suatu sistem. Salah satu bagian terpenting dari proses otentikasi adalah penggunaan username dan password, di chapter berikut ini aku akan mendiskusikan beberapa cara untuk mendapatkan user dan password dari suatu sistem. 2. Aplikasi yang digunakan • Explore2fs http://uranus.it.swin.edu.au/~jn/linux/ext2ifs.htm • Pwdump2 • Samdump2 • Bkhive • Ethereal • John The Ripper Copyleft !(c)2005 y3dips.echo.or.id