What is Computer Forensic? Computer Forensic is an progress that include a few step like presenvation, identification, extrction, interpretation, and documentation of computer evidence. When all the evidence is computer analyze, it will be provide by an expert opinion during the presentation in the court. Purpose […]
Cryptojacking is a new terms that means as a secret use of your computing device to mine cryptocurrency where it normally used on the purpose of be confined to the victim without their awareness. The function of it is to installing the program on the device […]
Information gathering is gain any information of an organization or a person . Sometimes, Information Gathering need some “soft skills” and social engineering method. There is a lot of choice of information gathering such as phishing, reconnaissance and social engineering via phone. Below are some of […]
As most of us know, Penetration Testing will need to follow a few step in order to testing the server and network. Below are the manual that need to be doing during the Penetration Testing activity STEP 1 – RECONNAISSANCE The main objective is to gather […]
What is Wireless Penetration Testing? Nowadays, Wireless Penetration Testing can be considered as one of the main testing for any organization. When we talk about Wireless, it can be dangerous because of the attacker can easily sniffer any traffic where they can obtain any sensitive information […]
What is IOT Penetration Testing? The IOT Penetration Testing is more like checking the vulnerabilities of the IOT device which it can consider as checking for any weakness on the IOT Device The advantages of IoT penetration testing is that Strengthening device security, Protecting against unauthorized […]