Network Scanner and Network Probing

The second phase in ethical hacking is the network scanning phase. Network scanning is the phase where a hacker identifies hosts, ports, and services on the target network. In socket-based programming, the server is the host that provides a service and the client is the host that accesses or uses the service. Socket itself is a combination of IP address and port number, for example is the mail service that uses socket 202....

May 30, 2015 · 1 min · Rizal Asrul Pambudi

Configure Tripwire As Host-based IDS

IDS, or Intrusion Detection System is a program aimed at detecting and monitoring the state of network anomalies caused by one of them by intruders (intruders). After the detection stage, usually the IDS can be set to alert network administrators. IDS types are broadly divided into two, namely host-based and network-based. This time we will discuss one program from host-based IDS, namely tripwire. The tripwire program functions to maintain the integrity of system files and directories, by recording every change that occurs in files and directories....

April 30, 2015 · 1 min · Rizal Asrul Pambudi

Controlling the Server Computer GUI Using VNC

VNC, or Virtual Network Computing is one of the computer programs used to remotely server computers with a user interface basis. For more details, the practicum file can be downloaded here.

April 28, 2015 · 1 min · Rizal Asrul Pambudi

How to control a server computer using SSH

This time we will try to remotely the server computer via the client computer using SSH. For your information, SSH is a network protocol for data communication. Here is the scenario that will be used to remotely server: Login to the server computer that has the IP address 10.252.108.76. Login as root. View server computer address. Do updates. View the memory of the server computer. View the hard drive of the computer....

March 23, 2015 · 1 min · Rizal Asrul Pambudi