SlideShare a Scribd company logo
1 of 27
Download to read offline
Ahmad Muammar W. K.
http://google.com/search?q=y3dips
Backdoor
Suatu metode untuk mem-bypass otentikasi normal atau
keamanan akses secara remote ke suatu mesin (komputer)




                                             http://google.com/search?q=y3dips
Footprinting


     Scanning


    Enumeration


  Gaining Access


Escalating Priveledge


      Pilfering


  Covering Tracks


 Creating Backdoor


 Denial OF Service
Need a Backdoor?
  Tanpa otentikasi resmi
  Akses mesin tanpa batasan (waktu, arsitektur, dsb)
  E.t.c




                                              http://google.com/search?q=y3dips
Types
  Program yang di install, e.g : back orifice, sshv4
  Modifikasi program/file, e.g : OpenSSH backdoor
  Berbasiskan Aplikasi (plugins), e.g : cgi-telnet, php shell
  Program yang di eksekusi (binnary), e.g : bindshell
  etc



                                                 http://google.com/search?q=y3dips
Ahmad Muammar W. K.
http://google.com/search?q=y3dips
Ahmad Muammar W. K.
http://google.com/search?q=y3dips
Simulation
  Password database/file Modification
  Reverse shell




                                        http://google.com/search?q=y3dips
Ahmad Muammar W. K.
http://google.com/search?q=y3dips
Ahmad Muammar W. K.
http://google.com/search?q=y3dips
Reverse Shell
Salah satu teknik yang bisa digunakan untuk membypass firewall
dengan full restriction inbound traffic.




                                                http://google.com/search?q=y3dips
Why ?
  Tidak bisa install program
  Kemampuan User
  Tidak bisa patching/modifikasi aplikasi
  Tidak memberi interactive shell
  Semua koneksi dari dalam keluar not filtered




                                                 http://google.com/search?q=y3dips
Reverse Shell



                http://google.com/search?q=y3dips
Attacker

                                                                                                 Server


                                                          Firewall

       Attacker membuka koneksi ke server menggunakan port 80 (HTTP)
       Attacker menemukan celah untuk memasang backdoor di komputer server dan menutup koneksi
Attacker

                                                                                                          Server


                                                            Firewall

       Attacker kembali membuka koneksi untuk mengakses server target melalui backdoor ytang ditanamkan
       Attacker tidak bisa mengakses backdoor via port yang di tentukan karena terbentur firewall
Attacker

                                                                                           Server


                                                            Firewall

       Attacker membuka kembali koneksi ke server menggunakan port 80 (HTTP)
       Attacker menemukan celah untuk memasang reverse shell backdoor di komputer server
Attacker

                                                                         Server


                                                            Firewall

       Attacker membuka koneksi di mesinnya ( e.g menggunakan netcat )
       Attacker mengeksekusi revershe shell backdoor di mesin target
       Koneksi terjadi ☺
Reverse Shell
  Backdoor tidak selalu online !
  Pengaktifannya bisa melalui backdoor lain di web applikasi
  Minimalisir kecurigaan Tuan Rumah
  PhpShell, cgi-telnet, remote command execution




                                                       http://google.com/search?q=y3dips
Ahmad Muammar W. K.
http://google.com/search?q=y3dips

More Related Content

Similar to Backdoor dan Reverse Shell

Step by step konfigurasi squid server dari berbagai kasus
Step by step konfigurasi squid server dari berbagai kasusStep by step konfigurasi squid server dari berbagai kasus
Step by step konfigurasi squid server dari berbagai kasusfilar
 
Supriyanto squidproxyserver
Supriyanto squidproxyserverSupriyanto squidproxyserver
Supriyanto squidproxyserverHARRY CHAN PUTRA
 
Squidproxyserver
SquidproxyserverSquidproxyserver
Squidproxyserverpuput51
 
#15 Web Security bisnis digital belajar pemograman.pptx
#15 Web Security bisnis digital belajar pemograman.pptx#15 Web Security bisnis digital belajar pemograman.pptx
#15 Web Security bisnis digital belajar pemograman.pptxIDELSAMANGUN
 
Ssl presentation verindo_rev_sholeh
Ssl presentation verindo_rev_sholehSsl presentation verindo_rev_sholeh
Ssl presentation verindo_rev_sholehMuchammad Sholeh
 
Serangan Dari Dalam Jaringan
Serangan Dari Dalam JaringanSerangan Dari Dalam Jaringan
Serangan Dari Dalam JaringanDita Tri Utami
 
Laporan 6
Laporan 6Laporan 6
Laporan 6hudakds
 
How to secure your fckeditor
How to secure your fckeditorHow to secure your fckeditor
How to secure your fckeditorViska
 
Configuring Nginx as Reverse Proxy and Load Balancing Web Application
Configuring Nginx as Reverse Proxy and Load Balancing Web ApplicationConfiguring Nginx as Reverse Proxy and Load Balancing Web Application
Configuring Nginx as Reverse Proxy and Load Balancing Web ApplicationJagoan Neon
 

Similar to Backdoor dan Reverse Shell (14)

Proxy server
Proxy serverProxy server
Proxy server
 
Step by step konfigurasi squid server dari berbagai kasus
Step by step konfigurasi squid server dari berbagai kasusStep by step konfigurasi squid server dari berbagai kasus
Step by step konfigurasi squid server dari berbagai kasus
 
Supriyanto squidproxyserver
Supriyanto squidproxyserverSupriyanto squidproxyserver
Supriyanto squidproxyserver
 
Squidproxyserver
SquidproxyserverSquidproxyserver
Squidproxyserver
 
#15 Web Security bisnis digital belajar pemograman.pptx
#15 Web Security bisnis digital belajar pemograman.pptx#15 Web Security bisnis digital belajar pemograman.pptx
#15 Web Security bisnis digital belajar pemograman.pptx
 
Keamanan web
Keamanan webKeamanan web
Keamanan web
 
Ssl presentation verindo_rev_sholeh
Ssl presentation verindo_rev_sholehSsl presentation verindo_rev_sholeh
Ssl presentation verindo_rev_sholeh
 
Serangan Dari Dalam Jaringan
Serangan Dari Dalam JaringanSerangan Dari Dalam Jaringan
Serangan Dari Dalam Jaringan
 
Laporan 6
Laporan 6Laporan 6
Laporan 6
 
FreeBSD Proxy Server
FreeBSD Proxy ServerFreeBSD Proxy Server
FreeBSD Proxy Server
 
Authenticated proxy
Authenticated proxyAuthenticated proxy
Authenticated proxy
 
15 jenis serangan cracker
15 jenis serangan cracker15 jenis serangan cracker
15 jenis serangan cracker
 
How to secure your fckeditor
How to secure your fckeditorHow to secure your fckeditor
How to secure your fckeditor
 
Configuring Nginx as Reverse Proxy and Load Balancing Web Application
Configuring Nginx as Reverse Proxy and Load Balancing Web ApplicationConfiguring Nginx as Reverse Proxy and Load Balancing Web Application
Configuring Nginx as Reverse Proxy and Load Balancing Web Application
 

More from Ammar WK

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssnAmmar WK
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?Ammar WK
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsAmmar WK
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!Ammar WK
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryAmmar WK
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0dayAmmar WK
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent ThreatAmmar WK
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingAmmar WK
 
Burp suite
Burp suiteBurp suite
Burp suiteAmmar WK
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet AnalysisAmmar WK
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)Ammar WK
 
Network security
Network securityNetwork security
Network securityAmmar WK
 
Penetration testing
Penetration testingPenetration testing
Penetration testingAmmar WK
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security ProfessionalAmmar WK
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsAmmar WK
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationAmmar WK
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A HackerAmmar WK
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?Ammar WK
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkAmmar WK
 
Attack the (Own) Network so You'll Survive
	 Attack the (Own) Network so You'll Survive	 Attack the (Own) Network so You'll Survive
Attack the (Own) Network so You'll SurviveAmmar WK
 

More from Ammar WK (20)

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssn
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0day
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet Analysis
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)
 
Network security
Network securityNetwork security
Network security
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security Professional
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A Hacker
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 network
 
Attack the (Own) Network so You'll Survive
	 Attack the (Own) Network so You'll Survive	 Attack the (Own) Network so You'll Survive
Attack the (Own) Network so You'll Survive
 

Backdoor dan Reverse Shell

  • 1. Ahmad Muammar W. K. http://google.com/search?q=y3dips
  • 2. Backdoor Suatu metode untuk mem-bypass otentikasi normal atau keamanan akses secara remote ke suatu mesin (komputer) http://google.com/search?q=y3dips
  • 3. Footprinting Scanning Enumeration Gaining Access Escalating Priveledge Pilfering Covering Tracks Creating Backdoor Denial OF Service
  • 4. Need a Backdoor? Tanpa otentikasi resmi Akses mesin tanpa batasan (waktu, arsitektur, dsb) E.t.c http://google.com/search?q=y3dips
  • 5. Types Program yang di install, e.g : back orifice, sshv4 Modifikasi program/file, e.g : OpenSSH backdoor Berbasiskan Aplikasi (plugins), e.g : cgi-telnet, php shell Program yang di eksekusi (binnary), e.g : bindshell etc http://google.com/search?q=y3dips
  • 6. Ahmad Muammar W. K. http://google.com/search?q=y3dips
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Ahmad Muammar W. K. http://google.com/search?q=y3dips
  • 14. Simulation Password database/file Modification Reverse shell http://google.com/search?q=y3dips
  • 15. Ahmad Muammar W. K. http://google.com/search?q=y3dips
  • 16.
  • 17. Ahmad Muammar W. K. http://google.com/search?q=y3dips
  • 18. Reverse Shell Salah satu teknik yang bisa digunakan untuk membypass firewall dengan full restriction inbound traffic. http://google.com/search?q=y3dips
  • 19. Why ? Tidak bisa install program Kemampuan User Tidak bisa patching/modifikasi aplikasi Tidak memberi interactive shell Semua koneksi dari dalam keluar not filtered http://google.com/search?q=y3dips
  • 20. Reverse Shell http://google.com/search?q=y3dips
  • 21. Attacker Server Firewall Attacker membuka koneksi ke server menggunakan port 80 (HTTP) Attacker menemukan celah untuk memasang backdoor di komputer server dan menutup koneksi
  • 22. Attacker Server Firewall Attacker kembali membuka koneksi untuk mengakses server target melalui backdoor ytang ditanamkan Attacker tidak bisa mengakses backdoor via port yang di tentukan karena terbentur firewall
  • 23. Attacker Server Firewall Attacker membuka kembali koneksi ke server menggunakan port 80 (HTTP) Attacker menemukan celah untuk memasang reverse shell backdoor di komputer server
  • 24. Attacker Server Firewall Attacker membuka koneksi di mesinnya ( e.g menggunakan netcat ) Attacker mengeksekusi revershe shell backdoor di mesin target Koneksi terjadi ☺
  • 25.
  • 26. Reverse Shell Backdoor tidak selalu online ! Pengaktifannya bisa melalui backdoor lain di web applikasi Minimalisir kecurigaan Tuan Rumah PhpShell, cgi-telnet, remote command execution http://google.com/search?q=y3dips
  • 27. Ahmad Muammar W. K. http://google.com/search?q=y3dips