SlideShare una empresa de Scribd logo
1 de 33
Descargar para leer sin conexión
HOW
TO TRAIN
E-banking Security Assessment
K-159 <k-159@echo.or.id> Your Ninja
2
A Ninja?
The Agenda
3
NO HIDDEN AGENDA
#WHOAMI
A FATHER
RESEARCHER
SOCIAL
ENGINEER
GOSSIPER
noosc
PROLOG
6
EVER
CHOOSED
A BANK
‘COZ THEIR
SECURE IT
SYSTEM?
7
EVER
DREAMED
TO HACK
YOUR
OWN
BANK?
8
SOMEBODY DOES ..
9
John Dilinger - Public Enemy (2010)
10
Inside Man (2006)
INSIDE THE BANK
THE BANK IS ..
Deposits,Loan,prosperity
Old Management New Management
Technology dollar stingy
Aggressive
visionary
technical savvy
SHIFTING ORG.BEHAVIOUR
COMMON SITUATION
High risk.The IT department is high risk
The Data Center is small and crowded
There is no Help Desk system
Most of the communication lines are at speeds of 64 K
The core banking system is old and obsolete
The Trade Finance System is old and obsolete
The ATM switch is old and cannot support many of the
new ATM functions required
The Call Center is obsolete and supports only 8 agents
E-Banking Is ..
Bank Central Regulation
Peraturan BI No. 5/8/PBI/2003
Surat Edaran BI No. 6/18/DPNP, tanggal 20 April 2004
THREAD INCRESE EACH HOUR
PENTESTER ETHICS
NON -DISCLOSURE AGREEMENT
Ebanking Assessment
Activity
SESSION MANAGEMENT
ACCESS CONTROL
AUTHENTICATION
MANAGEMENT
Deliverable ..
MANAGEMENT REPORT
RISK+ASSET+VALUES
TECHNICAL REPORT
TECHNICAL DETAIL+PATCHING+CODING
WELL KNOWN PENTESTER
JIM GEOVEDI
Y3DIPS
Conclusion..
Please Be Safe!
Q&A
Thanks
Twitter.com/159k
CreditsPage1: http://www.ninjaonline.co.uk/media/gbu0/prodlg/ninjasuit.jpg
Page2: http://alformer259.files.wordpress.com/2009/11/dsc001511.jpg
Page3: http://www.flickr.com/photos/wienwardana/3165753895/
Page4: Kendi Demonic Photograph
Page5: http://www.flickr.com/photos/anonymouscollective/2291139919
Page6: http://www.flickr.com/photos/anonymouscollective/2291896028/sizes/l/in/photostream/
Page7: http://www.flickr.com/photos/cverdier/4837773532/sizes/l/in/photostream/
Page8: http://www.detikfinance.com/read/2010/10/05/183003/1456367/68/akhir-kisah-si-pembobol-bank-rp-67-triliun
Page9: http://www.flickr.com/photos/37021726@N07/3595094343/sizes/l/in/photostream/
Page10: http://cdn-images.hollywood.com/site/insideman_dc.jpg
Page11: http://www.familieharmsen.nl/vakanties/Zomer2001/TikabooValley/MVC-288F.JPG
Page12: http://www.primaironline.com/images_content/20100525BankIndonesia%20bankir-indonesia.org.jpg
Page14:http://www.flickr.com/photos/sutje/1315711528
Page15: http://www.flickr.com/photos/seier/3463984860/sizes/z/in/photostream/
Page16: http://www.flickr.com/photos/fabiano/2783656239/sizes/l/in/photostream/
Page18: http://www.flickr.com/photos/felixtito/334828049
Page19: http://www.files.chem.vt.edu/chem-dept/tissue/images/ethics180x120.png
Page20 : http://2.bp.blogspot.com/_VbdMFZn0qEM/TAHiacMpj9I/AAAAAAAAAmQ/OBKaqC0SN9g/s320/
ethics_header.jpgs
Page21: http://www.flickr.com/photos/dcdead/4527722719
Page22: http://www.flickr.com/photos/sugree/3024642081
Page23: http://www.flickr.com/photos/tatraskoda/2057210204/sizes/o/in/photostream/
Page24: http://www.flickr.com/photos/meetings/2073768553/sizes/o/in/photostream/
Page25: http://www.flickr.com/photos/thecrimsonbat/4627770158
Page26: http://www.flickr.com/photos/ingythewingy/4660595849/sizes/l/in/photostream/
Page27: http://www.flickr.com/photos/gvd06a/408242761/
page28: http://sphotos.ak.fbcdn.net/hphotos-ak-ash1/
hs062.ash1/6926_149011886357_693241357_2571740_7209947_n.jpg
Page29: http://www.flickr.com/photos/shadphotos/207233715/sizes/m/in/photostream/
Page30: http://www.flickr.com/photos/rundstedt/4412545871/sizes/l/in/photostream/

Más contenido relacionado

La actualidad más candente

New innovations in banking industry
New innovations in banking industryNew innovations in banking industry
New innovations in banking industryHemanth Shenoy
 
Banking law emerging trends
Banking law emerging trendsBanking law emerging trends
Banking law emerging trendsDeepika Tripathi
 
E banking p pt sst nwc
E banking p pt sst nwcE banking p pt sst nwc
E banking p pt sst nwcsiya pillai
 
Banking technology in india slide show
Banking technology in india   slide showBanking technology in india   slide show
Banking technology in india slide showLalit Sanagavarapu
 
E-BANKING EMERGING ISSUES AND OPPORTUNITIES
E-BANKING EMERGING ISSUES AND OPPORTUNITIESE-BANKING EMERGING ISSUES AND OPPORTUNITIES
E-BANKING EMERGING ISSUES AND OPPORTUNITIESVinit Varma
 
Use of technologies in the banking sector of Bangladesh
Use of technologies in the banking sector of BangladeshUse of technologies in the banking sector of Bangladesh
Use of technologies in the banking sector of BangladeshMasum Hussain
 
Technology in-banking-insight-and-foresight-idrbt-ey-report
Technology in-banking-insight-and-foresight-idrbt-ey-reportTechnology in-banking-insight-and-foresight-idrbt-ey-report
Technology in-banking-insight-and-foresight-idrbt-ey-reportRohit Sharma
 
E banking-techonology and prospect in bBangladesh
E banking-techonology and prospect in bBangladeshE banking-techonology and prospect in bBangladesh
E banking-techonology and prospect in bBangladeshMD. Baharul Alam
 
It in banking industry
It in banking industryIt in banking industry
It in banking industryDharmik
 

La actualidad más candente (12)

New innovations in banking industry
New innovations in banking industryNew innovations in banking industry
New innovations in banking industry
 
Introduction (1) ME ppt
Introduction (1) ME pptIntroduction (1) ME ppt
Introduction (1) ME ppt
 
Banking law emerging trends
Banking law emerging trendsBanking law emerging trends
Banking law emerging trends
 
E banking p pt sst nwc
E banking p pt sst nwcE banking p pt sst nwc
E banking p pt sst nwc
 
Banking technology in india slide show
Banking technology in india   slide showBanking technology in india   slide show
Banking technology in india slide show
 
New banking technology
New banking technologyNew banking technology
New banking technology
 
E banking
E bankingE banking
E banking
 
E-BANKING EMERGING ISSUES AND OPPORTUNITIES
E-BANKING EMERGING ISSUES AND OPPORTUNITIESE-BANKING EMERGING ISSUES AND OPPORTUNITIES
E-BANKING EMERGING ISSUES AND OPPORTUNITIES
 
Use of technologies in the banking sector of Bangladesh
Use of technologies in the banking sector of BangladeshUse of technologies in the banking sector of Bangladesh
Use of technologies in the banking sector of Bangladesh
 
Technology in-banking-insight-and-foresight-idrbt-ey-report
Technology in-banking-insight-and-foresight-idrbt-ey-reportTechnology in-banking-insight-and-foresight-idrbt-ey-report
Technology in-banking-insight-and-foresight-idrbt-ey-report
 
E banking-techonology and prospect in bBangladesh
E banking-techonology and prospect in bBangladeshE banking-techonology and prospect in bBangladesh
E banking-techonology and prospect in bBangladesh
 
It in banking industry
It in banking industryIt in banking industry
It in banking industry
 

Destacado

070726 Mobile Social Networking Stephen Johnston
070726 Mobile Social Networking Stephen Johnston 070726 Mobile Social Networking Stephen Johnston
070726 Mobile Social Networking Stephen Johnston Stephen Johnston
 
Social media strategy for Nokia
Social media strategy for NokiaSocial media strategy for Nokia
Social media strategy for Nokiasajithkaimal
 
IT in Healthcare
IT in HealthcareIT in Healthcare
IT in HealthcareNetApp
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShareSlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShareSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 

Destacado (7)

070726 Mobile Social Networking Stephen Johnston
070726 Mobile Social Networking Stephen Johnston 070726 Mobile Social Networking Stephen Johnston
070726 Mobile Social Networking Stephen Johnston
 
Social media strategy for Nokia
Social media strategy for NokiaSocial media strategy for Nokia
Social media strategy for Nokia
 
IT in Healthcare
IT in HealthcareIT in Healthcare
IT in Healthcare
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar a How to train your ninja

Why digital banking in Indonesia will fail
Why digital banking in Indonesia will failWhy digital banking in Indonesia will fail
Why digital banking in Indonesia will failAnjar Priandoyo
 
Understanding Core Banking.pdf
Understanding Core Banking.pdfUnderstanding Core Banking.pdf
Understanding Core Banking.pdfSoftware House
 
Low cost 3d authentication service for atm and pos
Low cost 3d authentication service for atm and pos Low cost 3d authentication service for atm and pos
Low cost 3d authentication service for atm and pos Bank Alfalah Limited
 
Trust and Usage of Ebanking Presentation
Trust and Usage of Ebanking PresentationTrust and Usage of Ebanking Presentation
Trust and Usage of Ebanking PresentationYOGESHSHAKYA11
 
Bank Indonesia Regulation 9/15/2007 IT Risk Management
Bank Indonesia Regulation 9/15/2007 IT Risk ManagementBank Indonesia Regulation 9/15/2007 IT Risk Management
Bank Indonesia Regulation 9/15/2007 IT Risk ManagementAnjar Priandoyo
 
E banking-130826111407-phpapp01
E banking-130826111407-phpapp01E banking-130826111407-phpapp01
E banking-130826111407-phpapp01haris ali
 
Yang perlu kita ketahui Untuk memahami aspek utama IT dalam bisnis_.pdf
Yang perlu kita ketahui Untuk memahami aspek utama IT dalam bisnis_.pdfYang perlu kita ketahui Untuk memahami aspek utama IT dalam bisnis_.pdf
Yang perlu kita ketahui Untuk memahami aspek utama IT dalam bisnis_.pdfEqunix Business Solutions
 
Bba401 e-commerce
Bba401  e-commerceBba401  e-commerce
Bba401 e-commercesmumbahelp
 
DBS Bank Insight - Digital Banking Asean Banks
DBS Bank Insight - Digital Banking Asean BanksDBS Bank Insight - Digital Banking Asean Banks
DBS Bank Insight - Digital Banking Asean BanksSan Naing
 
Asia Digital Banking Penetration - Market research
Asia Digital Banking Penetration - Market research Asia Digital Banking Penetration - Market research
Asia Digital Banking Penetration - Market research Thành Công
 
E banking service of sbi bank
E banking service of sbi bankE banking service of sbi bank
E banking service of sbi bankPriyanka Mangotra
 
5 Predictions for Finance, FinTech and Blockchain Market
5 Predictions for Finance, FinTech and Blockchain Market5 Predictions for Finance, FinTech and Blockchain Market
5 Predictions for Finance, FinTech and Blockchain MarketGrow VC Group
 
PACB Future of Community Banking 2015-Marsico
PACB Future of Community Banking 2015-MarsicoPACB Future of Community Banking 2015-Marsico
PACB Future of Community Banking 2015-MarsicoJeff Marsico
 
Technopreneurship, Incubation and Angel Investments in China
Technopreneurship, Incubation and Angel Investments in ChinaTechnopreneurship, Incubation and Angel Investments in China
Technopreneurship, Incubation and Angel Investments in ChinaChris Evdemon
 

Similar a How to train your ninja (20)

Why digital banking in Indonesia will fail
Why digital banking in Indonesia will failWhy digital banking in Indonesia will fail
Why digital banking in Indonesia will fail
 
Online Banking
Online BankingOnline Banking
Online Banking
 
From Online To Digital
From Online To DigitalFrom Online To Digital
From Online To Digital
 
Understanding Core Banking.pdf
Understanding Core Banking.pdfUnderstanding Core Banking.pdf
Understanding Core Banking.pdf
 
Low cost 3d authentication service for atm and pos
Low cost 3d authentication service for atm and pos Low cost 3d authentication service for atm and pos
Low cost 3d authentication service for atm and pos
 
Trust and Usage of Ebanking Presentation
Trust and Usage of Ebanking PresentationTrust and Usage of Ebanking Presentation
Trust and Usage of Ebanking Presentation
 
Bank Indonesia Regulation 9/15/2007 IT Risk Management
Bank Indonesia Regulation 9/15/2007 IT Risk ManagementBank Indonesia Regulation 9/15/2007 IT Risk Management
Bank Indonesia Regulation 9/15/2007 IT Risk Management
 
E banking-130826111407-phpapp01
E banking-130826111407-phpapp01E banking-130826111407-phpapp01
E banking-130826111407-phpapp01
 
Yang perlu kita ketahui Untuk memahami aspek utama IT dalam bisnis_.pdf
Yang perlu kita ketahui Untuk memahami aspek utama IT dalam bisnis_.pdfYang perlu kita ketahui Untuk memahami aspek utama IT dalam bisnis_.pdf
Yang perlu kita ketahui Untuk memahami aspek utama IT dalam bisnis_.pdf
 
Bba401 e-commerce
Bba401  e-commerceBba401  e-commerce
Bba401 e-commerce
 
DBS Bank Insight - Digital Banking Asean Banks
DBS Bank Insight - Digital Banking Asean BanksDBS Bank Insight - Digital Banking Asean Banks
DBS Bank Insight - Digital Banking Asean Banks
 
Asia Digital Banking Penetration - Market research
Asia Digital Banking Penetration - Market research Asia Digital Banking Penetration - Market research
Asia Digital Banking Penetration - Market research
 
Online Banking
Online BankingOnline Banking
Online Banking
 
E banking service of sbi bank
E banking service of sbi bankE banking service of sbi bank
E banking service of sbi bank
 
5 Predictions for Finance, FinTech and Blockchain Market
5 Predictions for Finance, FinTech and Blockchain Market5 Predictions for Finance, FinTech and Blockchain Market
5 Predictions for Finance, FinTech and Blockchain Market
 
Internet banking
Internet bankingInternet banking
Internet banking
 
Tolga Yurteri, NKBM
Tolga Yurteri, NKBMTolga Yurteri, NKBM
Tolga Yurteri, NKBM
 
PACB Future of Community Banking 2015-Marsico
PACB Future of Community Banking 2015-MarsicoPACB Future of Community Banking 2015-Marsico
PACB Future of Community Banking 2015-Marsico
 
Technopreneurship, Incubation and Angel Investments in China
Technopreneurship, Incubation and Angel Investments in ChinaTechnopreneurship, Incubation and Angel Investments in China
Technopreneurship, Incubation and Angel Investments in China
 
Online banking
Online banking  Online banking
Online banking
 

Más de idsecconf

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfidsecconf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...idsecconf
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfidsecconf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...idsecconf
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfidsecconf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...idsecconf
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfidsecconf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...idsecconf
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidadaidsecconf
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullahidsecconf
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaidsecconf
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...idsecconf
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwiantoidsecconf
 

Más de idsecconf (20)

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullah
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
 

Último

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

How to train your ninja