Ethical Hacking : Target Discovery

After we gather data about our target. We can search and find our target. Here, the tools we use will be dnstrails.com, robtex.com and also crimeflare.org

  1. dnstrails.com

dnstrails.com is a website used to find out and data regarding about our target’s website.

in the example above, we can search and see everything about our target’s website (In this case pentest.id). We can see their IP4 Address (A), IP6 Address (AAAA), Mail Services (MX), Name Server (NS), Start of Authority (SOA), and also Text file (TXT).

We an also see the history of the target’s website. Their website history could tell us a lot of things regarding about their website and probably their company.

We can also search about the website registrant’s name here. This could important because we can know about the registrant data.

2.  robtex.com

robtex.com is another website used to find user’s data from their website

Here, we can see about some analysis of the website, info about the website, records, SEO and many more about our target’s website.

We can see here that those website are using cloudfare servers. Cloudflare, Inc. is a U.S. company that provides a content delivery network, DDoS mitigation, Internet security services and distributed domain name server services, sitting between the visitor and the Cloudflare user’s hosting provider, acting as a reverse proxy for websites.

Reverse proxy for websites means that a website have 2 IPs. One is their real IP and another one is an IP that’s covered by cloudflare. Which means, if we don’t know their real IP. We couldn’t launch an attack to our target website.

One of the tools used to know one’s real IPs is by using crimeflare.org. crimeflare.org is used to know one’s real IP behind their covered IP.

Another way is by looking at their website history. This is where the historic data of a website become important. Since cloudflare is only covering the real IP, It’s possible that that the IP for the website is still the same as the one used to. It just they used cloudflare services to do reverse proxy and make their real IP’s covered

 

Posted in Uncategorized | Leave a comment

Ethical Hacking: Utilizing Search Engine

There are many tools installed inside Kali Linux to help you do your hacking, the one we will talk about are theharvester, maltego, and google dorks.

  1. Theharvester

Theharvester is a tool to collect information from any sources such as google, bing, linkedn and many more.

On the example above, I try to collect any information available on google about pentest.com. And the above is the result of doing harvester. In this example i’m gathering data from pentest.id from all search engine as many as 10000 data.

2. Maltego

Maltego is an open source intelligence and forensic app that shows how information is connected one to another. There are some benefits on using Maltego. Such as give a better picture on how they are linked to other. Also give us any infrastructure, DNS names and other things.

we start by creating a new graph

we then take a website pentest.id to have info gathering about the website

right click, and then click transform all. And maltego will automatically create a graph about the website (in this case pentest.id)

we can search more about the website until we can get the data we want. In this case, we can search for the location and registrant name

3. Google Dorks

Google Dorks is a way to search files using google.

In this case, i would explain to you using Google search engine

Here, you can see i search intitle “index of” password. This query is for searching any password data.

index of /go.id is to search any website that have an index of .go.id

we can also search for files using google dorks. In this case, we can search for mp3 using query above.

There are also other way to search files and data using google and different query. We can use google dorks website to help us creating the query we would like to use.

Posted in Uncategorized | Leave a comment

Ethical Hacking: Target Scooping and Information Gathering

Before we do our “hacking”, first we must know the type of target that we want to hack. This is called Target Scooping. Target Scooping starts by gathering client requirements, preparing test plan, profiling test boundaries, defining the goal from bussiness objectives and project management & scheduling

After we done with all of the things above. We start by collecting customer information. By customer information, it means all about the customer. Company name, address, website, details, e-mail address, event phone number. After we finish with it, we then create the objectives and type of penetration testing and also details about devices, os, and network to be tested.

The reason we need all about the customer is because it could be useful to us. There are many tools on internet that we can use to help our hacking. This activity is called Competitive Intelligence which means to gather data and information using technology. Even google.com can be used to help our “hacking”.

Here in the example above, we can see that by using “inurl”, we can search any website that have the url of “what you searched”. We can also used filetype, “intitle”, and many more.

There are also many website outside that can help us to find data about our target. One of the example is whois.net that can help us find IP and Domain address

And also robtext.com that gives us detailed data and analysis about the target

Posted in Uncategorized | Leave a comment

Ethical Hacking: Introduction

In this blog, we will cover some definitions inside ethical hacking, what role does an ethical hacker takes and what can and cannot be done as an ethical hacker.

Let’s start off with what is ethical hacker. Ethical hacker is basically someone who was hired by company to LEGALLY perform penetration testing. Penetration testing means a legal attempt to break into the company’s network and find their weakest link and to report the findings. Sometimes company ask also to do security testing. Which is penetration testing, but they will also ask for solutions to protect or secure the network.

There are many type of “hackers” out there. First, the hacker. Hacker is someone who break into a network or computer system. One who did without permission can go to jail. Next, the cracker. Cracker is the one who breaks into system and steals or destroys data.

Usually, every hackers have some tools call “The Tiger Box”. This is a collection of tools and OS that help hacker to do penetration testing and security testing to search for vulnerabilities on a system.

There are 3 type of Penetration Testing Methodologies. The White box, Black box and Grey box.

  1. White Box Methodologies

This method is where the tester is told everything about the network typologies and  technology. And they also allowed to interview the workers of the company which makes the job more easier. This is usually did to find the vulnerabilities inside the company

2. Black Box Methodologies

This method is where the tester is not told anything about the target. Usually, only the IP Address of the target. In this case, the target’s workers also doesn’t know about the testing. This methodologies is did to see if the target’s workers ready or not if an attack happens to their system.

3. Grey Box Mathodologies

This is a mixing of white and grey methodologies. Where testers are given partial information about the company.

Before doing any penetration testing. Both the tester and the client must define the scope of the test. How long it will be, What will be tested, From where and by whom it will be tested. All should be clear before doing any testing. And then the testing starts.

There are some common techniques when doing penetration testing

  1. Passive Researching -> gathering information about the network system of a company
  2. Open source monitoring -> to ensure confidentiality and integrity
  3. Network mapping and OS fingerprinting
  4. Spoofing
  5. Network sniffing
  6. Trojan attacks with malicious codes
  7. Brute-force attack, usually done by password cracking
  8. Vulnerability scanning
  9. Scenario analysis, creating scenarios about what and how the system could be broke.
Posted in Uncategorized | Leave a comment

“The Adventure of Timmy the Baby” – Final Project Multimedia and Human Computer Interaction (COMP6341) – L3BC-LEC – Final Report

CREATED BY:

Reinaldy Edbert Fargo (2001594573)

R. Aditya Pribadi K.

Background

We are asked to create a game for a kindergarten students for the final projects. So, we created a game called “The Adventure of Timmy”. “Adventure of Timmy” is actually called a journey-type of game rather than a usual game. Since kindergarten students are just not really learning and just want to playing games. We created the games into a journey to safe animals and pets. It’s basically because it’s actually a mixture of 4 game created for kindergarten students that help them improving their skills which are math, shapes knowledge, words and also a fun maze in order to make kindergarten students feel happy to play.

Description

We created 4 games to create a journey inside the games or kindergarten students. Each games is started by a video of the maps to help the player to remember which stage they already in and what type of interface they will have. The games is also started an ended with a  dialog by Timmy to help the player’s to understand the task and also to make the game to be a unity and a journey. Each games is also have the help button to help the player to understand the way to play the game.

1st game

Before “Timmy” is getting out saving his pets. He must pack his stuff first. In this games, children will learn about shapes. They must find things that have similar shapes as the shadows shown on the game. In this game, there will be a help button to help the player understand the game.

To be more specific, the things are scattered around the room and that is the player’s job to find the object and to drag it to the right place according to the shadow’s shape. Here, the player’s way to play is by dragging the things inside the room. After the player already did the job, they are ready to start their adventure.

2nd game

Now, Timmy is on a journey. He sees Mr. Monkey on the tree. Timmy then asked Mr. Monkey if he knows where his pets are. Mr. Monkey said that they have been captured by the hunters and knows where his pets are. But before that, Mr. Monkey ask Timmy to help him counting the amount of apples.

The player will be shown a math question and 3 answers. The question will be all addition question. The question and answers numbers are shown as apples. Since it’s better for them to understand and count via picture. The player’s way is to click on the right answer. Then they will be given 2 more question to answer. Total will be 3 questions with different level. They will be shown if they haven’t choose the answer or pick the wrong answer. The player’s control will be by using left arrow and right arrow, also left click to choose the answer.

After they answer the 3rd question. They will be shown the monkey and will be told that the pets are caged and then Timmy continue his adventure.

3rd game

Timmy then sees his pets inside the cage. He must save his pets by putting the animals according to their living places. He then found out that Mr. Bird is not inside the cage. He then told that Mr. Bird is inside the maze. Timmy then go to the maze.

The player’s control will be the same as the 1st game where the player must dragged the animal according to the animal shape and their usual living place. It’s intentional not to put the bird, because in the next game they have to save the bird from the cage and later will put the bird back to it’s place

4th game

Timmy is already in front of the maze. He sees Mr. Bird inside a cage. But, before he could save Mr.Bird, he must collect 3 keys to open the cage. After he collect the 3 keys, the cage will be opened and the player must go to the bird to save the bird.

The player’s control will be only the arrows button. Meaning they only need to use the left, right, up and down button to play the game which is similar to a RPG type of game.

After Timmy save the bird, they will back to the 3rd game where he need to put the bird to it’s place.

5th game (4.5th game)

Timmy already save Mr. Bird, he then comes back to the 3rd game to put the bird back to the nest. Mission complete.

The player’s way to put the bird back to it’s place is to drag the bird to it’s place, which is the nest. After the player put the bird back to it’s nest. The player will tell that the mission is a success and say Thank you. Then they will back to the start page

-The game end-

Credits:

Kids : https://forums.rpgmakerweb.com/index.php?threads/base-sprites-emotes-and-animations.56332/

Picture sunrise: http://pictures-and-images.net/single/67_wallpapers-others-create_3.html

Room: https://yuzikoi.deviantart.com/art/Kids-room-background-213138025

Ball: http://clipart-library.com/vector-soccer-ball.html

Sandwich: https://es.vecteezy.com/imagenes-vectoriales-comida/94117-vector-de-club-sandwich

Ruler: https://www.123rf.com/photo_53409373_stock-vector-ruler-flat-icon-vector-illustration-ruler-icon-school-icon-symbol-ruler-education-equipment-some-yel.html

Book: http://www.clker.com/clipart-blue-book-1.html

Grass backgorund: https://gameblox.org/editor/16988/

Monkey on tree: https://www.istockphoto.com/vector/cartoon-monkey-tree-gm531777215-55523992

background part 2: https://www.gamedevmarket.net/asset/animals-sprite-sheet-and-one-background-with-multiple-possibilities-2052/

Apple : http://karlmac.com/2011/10/apple-vector-art-free-download/

Lion : https://pngtree.com/freepng/lion_2437454.html

Bird : https://www.123rf.com/photo_2019435_cute-bird-vector-illustration.html

Cat : https://www.jamiesale-cartoonist.com/free-cartoon-cat-vector-clip-art/

Dog : http://animalia-life.club/other/dog-vector-png.html

Cat food : https://www.istockphoto.com/vector/cat-food-bowl-gm510332510-84042403

Dog house : https://www.clipartsgram.com/download/AeBZz2O

Trees tiger : https://www.freepik.com/free-vector/coloured-trees-collection_1021178.htm

Bird nest : https://www.shutterstock.com/image-vector/four-eggs-bird-nest-illustration-471817127

Key : https://www.clker.com/clipart-key.html

Rock : https://play.google.com/store/apps/details id=appinventor.ai_SidhKulkarni1.PetRock

Posted in Uncategorized | Leave a comment

“The Adventure of Timmy the Baby” – Final Project Multimedia and Human Computer Interaction (COMP6341) – L3BC-LEC -Proposal

Background

We are asked to create a game for a kindergarten students for the final projects. So, we created a game called “The Adventure of Timmy”. “Adventure of Timmy” is actually called a journey-type of game rather than a usual game. Since kindergarten students are just not really learning and just want to playing games. We created the games into a journey to safe animals and pets. It’s basically because it’s actually a mixture of 4 game created for kindergarten students that help them improving their skills which are math, shapes knowledge, words and also a fun maze in order to make kindergarten students feel happy to play.

Description

We created 4 games to create a journey inside the games or kindergarten students.

1st game

Before “Timmy” is getting out saving his pets. He must pack his stuff first. In this games, children will learn about shapes. They must find things that have similar shapes as the shadows shown on the game.

2nd game

Now, Timmy is on a journey. He sees Mr. Monkey on the tree. Timmy then asked Mr. Monkey if he knows where his pets are. Mr. Monkey said that they have been captured by the hunters and knows where his pets are. But before that, Mr. Monkey ask Timmy to help him counting the amount of apples. Timmy must count a simple math in the shapes of apples to help Mr. Monkey. The question will be multiple choice and the answer must be clicked to answer the question.

3rd game

Timmy then sees his pets inside the cage. He must save his pets by putting the animals according to their living places. He then found out that Mr. Bird is not inside the cage. He then told that MR. Bird is inside the maze. Timmy then go to the maze.

4th game

Timmy is already in front of the maze. He sees Mr. Bird inside a cage. But, before he could save Mr.Bird, he must collect 3 keys to open the cage.

5th game (4.5th game)

Timmy already save Mr. Bird, he then comes back to the 3rd game to put the bird  back to the nest. Mission complete.

 

-The game end-

Posted in Uncategorized | Leave a comment

Hello world!

Welcome to Binusian blog.
This is the first post of any blog.binusian.org member blog. Edit or delete it, then start blogging!
Happy Blogging 🙂

Posted in Uncategorized | 1 Comment