Skip to content

iwandanu

In Madya Mangun Karsa

  • Beranda
  • Pajak
  • Seputar TIK
  • Wisdoms
  • Curriculum Vitae
×

Tag: ExPetr

Petya, Tak Sesimpel Namanya

Petya, Tak Sesimpel Namanya

  • 5 min

Petya ini bukanlah nama mbak-mbak, nama bunga, apalagi nama makanan snack di hari kemenangan. Malware yang disinyalir hasil dari pengembangan Petya versi awal ini sukses membuat aktivis keamanan IT bekerja ekstra di saat kaum muslimin menikmati sajian lebaran di kediaman handai taulan, […]

  • 29/06/2017
Tagged ExPetr, Malware, NoPetya, Petya, Ransomware

About Me

Ing Madya Mangun Karsa~

My Socials

Random Posts

Kami Nggak Kerja, Kalian Nggak Gajian
Mengenal Opini Akuntan
Vinir Slicing
Ringkasan RUU Pengampunan Nasional 2015

Quotes Of The Day

Be strong enough to be gentle;

Donate

Partners

Categories

  • Artikel Referensi
  • Ide dan Inspirasi
  • OSINT
  • Pajak
  • Peluang Usaha
  • Personal
  • Seputar TIK
  • Wisdoms

KitPloit

DFShell - The Best Forwarded Shell
Yaralyzer - Visually Inspect And Force Decode YARA And Regex Matches Found In Both Binary And Text Data, With Colors
SSTImap - Automatic SSTI Detection Tool With Interactive Interface

Hakin9

Authentication Flood | Wireless Network AttacksĀ [FREE COURSE CONTENT]
Main Tips for Students to Protect Data Privacy
E-Mails Leading to a Malicious Link | Client-Side Exploitation [FREE COURSE VIDEO]
What are the Common Security Weaknesses of Cloud Based Networks?
Improper Error Handling | Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]
Introduction to Open-Source Intelligence | OSINT Fundamentals [FREE COURSE CONTENT]
Monitoring Docker container metrics and events
Vulnerability management with Wazuh open source XDR
7 Tips to Build A Banking Application That Will Be User-Friendly
Deception Technologies: Improving Incident Detection and Response by Alex Vakulov

Hacktivity h1

Open Redirect at blueonboardingqa1.jetblue.com
Rails ActionView sanitize helper bypass leading to XSS using SVG tag.
[U.S. Air Force] Information disclosure due unauthenticated access to APIs and system browser functions
Reflected XSS on .mil
reflected xss in www..gov
XSS on ( .gov ) Via URL path
IDOR for changing privacy settings on any memories
XSS at TikTok Ads Endpoint
Verification process done using different documents without corresponding to user information / User information can be changed after verification
wavecell.com: Broken Link Hijacking / Instagram Takeover @

The Hacker News

Titan Stealer: A New Golang-Based Information Stealer Malware Emerges
Realtek Vulnerability Under Attack: Over 134 Million Attempts to Hack IoT Devices
Gootkit Malware Continues to Evolve with New Components and Obfuscations
Microsoft Urges Customers to Secure On-Premises Exchange Servers
ISC Releases Security Patches for New BIND DNS Software Vulnerabilities
Ukraine Hit with New Golang-based 'SwiftSlicer' Wiper Malware in Latest Cyber Attack
Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of Charge
Experts Uncover the Identity of Mastermind Behind Golden Chickens Malware Service
Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices
3 Lifehacks While Analyzing Orcus RAT in a Malware Sandbox

iwandanu

Proudly powered by WordPress | Theme : Voice Blog free WordPress theme : by : Postmagthemes