Another Side of Hacking
Raising the Awareness, Honing the Skills
Satria Ady Pradana
https://xathrya.id
@ STMIK Nusa Mandiri
25 April 2017
#Whoami?
 Cyber Security Consultant at Mitra Integrasi Informatika (MII)
 Researcher at dracOs Dev Team
 Coordinator of Reversing.ID
 Member of Indonesia Honeynet Project
Today’s Adventure
 Learning How Hacker See and Act
 Do What Hacker Do (Ethically)
 Watching something fun
 Get serious in this field
Security
ILLUSIONIs (just)
Or, some say ...
And many more...
Hacking is...?
 Exploiting the Weakness
What weakness? A lot of things
 Some people are not aware that they are vulnerable.
More threats and we have to start to aware of it.
 Sometimes hacker see somethings that are unseen by most people.
What Hacker See?
 Any piece of information might lead to something.
 Some important information:
 How target is organized
 How target reacts to certain event
 The knowledge of the system
Hacking Steps
 Reconnaissance
 Vulnerability Mapping
 Exploitation
 Post Exploitation
Privilege Escalation
Maintaining Access
Data Exfiltration
 Covering Track
The Key Point in Security Field
 Programming
 Networking
 Logic and Problem Solving
Don’t forget about
Social Skills
How can I start learning?
 Take course on computer science (seriously)
 Participate in competitions
 CTF
 Wargame
 Create Practice Lab
Advice
 Be Evil !
 Have Fun!
(DEMO) Let’s Pwning!
Being a Professional?
Time to get Serious
Area of Expertise
Network Security
Web Security
Mobile Security
IoT & Embedded System Security
Jobs in Cyber Security Field?
By End of 2016
The Challenges Ahead
The GAP between current us and future world.
Problem? Any Question?

More Related Content

PPTX
Path of Cyber Security
PPTX
(Training) Malware - To the Realm of Malicious Code
PPTX
Web Security Workshop : A Jumpstart
PPTX
Down The Rabbit Hole, From Networker to Security Professional
PPTX
Python-Assisted Red-Teaming Operation
PPTX
Dracos forensic flavor
PPTX
Malware Analysis
PPTX
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Path of Cyber Security
(Training) Malware - To the Realm of Malicious Code
Web Security Workshop : A Jumpstart
Down The Rabbit Hole, From Networker to Security Professional
Python-Assisted Red-Teaming Operation
Dracos forensic flavor
Malware Analysis
Ethical Hacking Conference 2015- Building Secure Products -a perspective

What's hot (20)

PPTX
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
PPTX
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
PPTX
(Workshop) Reverse Engineering - Protecting and Breaking the Software
PDF
A tale story of building and maturing threat hunting program
PPTX
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
PPTX
Threat hunting - Every day is hunting season
PDF
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
PPTX
Cyber Threat Hunting Training (CCTHP)
PDF
Cambodia CERT Seminar: Incident response for ransomeware attacks
PDF
Windows Threat Hunting
PPTX
Threat hunting on the wire
PPTX
Hunting on the Cheap
PDF
Threat Modeling Everything
PPTX
Bsides 2019 - Intelligent Threat Hunting
PPTX
IOCs for modern threat landscape-slideshare
PPTX
Threat hunting in cyber world
PPTX
Cyber Threat Intelligence: Building and maturing an intelligence program that...
PDF
TTPs for Threat hunting In Oil Refineries
PPTX
(Workshop) Memory Forensic - Investigating Memory Artefact
PDF
PHDays 2018 Threat Hunting Hands-On Lab
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
(Workshop) Reverse Engineering - Protecting and Breaking the Software
A tale story of building and maturing threat hunting program
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
Threat hunting - Every day is hunting season
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
Cyber Threat Hunting Training (CCTHP)
Cambodia CERT Seminar: Incident response for ransomeware attacks
Windows Threat Hunting
Threat hunting on the wire
Hunting on the Cheap
Threat Modeling Everything
Bsides 2019 - Intelligent Threat Hunting
IOCs for modern threat landscape-slideshare
Threat hunting in cyber world
Cyber Threat Intelligence: Building and maturing an intelligence program that...
TTPs for Threat hunting In Oil Refineries
(Workshop) Memory Forensic - Investigating Memory Artefact
PHDays 2018 Threat Hunting Hands-On Lab

Similar to Another Side of Hacking (15)

PDF
The Hacking Team Hack: Lessons Learned for Enterprise Security
PPTX
Scot Secure 2015
PPTX
Android Security: Art of Exploitation
PPTX
Android Security : A Hacker's Perspective
PPTX
Cybersecurity in 2016
PPTX
Hackers are people too
PPTX
Ignite 8 Cincinnati
PPTX
The Personal and Website Security Mindset
PPTX
Hacking
PPTX
What Is Hacking
PPTX
Ha(Attackers) Exposed
PPTX
Red vs. Blue Why we’ve been getting it wrong for 25 years
PPT
Ethichack 2012
PPTX
I hack you hack we all hack
PPTX
Corp Web Risks and Concerns
The Hacking Team Hack: Lessons Learned for Enterprise Security
Scot Secure 2015
Android Security: Art of Exploitation
Android Security : A Hacker's Perspective
Cybersecurity in 2016
Hackers are people too
Ignite 8 Cincinnati
The Personal and Website Security Mindset
Hacking
What Is Hacking
Ha(Attackers) Exposed
Red vs. Blue Why we’ve been getting it wrong for 25 years
Ethichack 2012
I hack you hack we all hack
Corp Web Risks and Concerns

More from Satria Ady Pradana (10)

PPTX
Rekayasa Balik - Sebuah Hikayat dari Dunia Digital
PPTX
The Offensive Python - Practical Python for Penetration Testing
PPTX
From Reversing to Exploitation
PPTX
Bypass Security Checking with Frida
PPTX
Reverse Engineering - Protecting and Breaking the Software
PPTX
Memory Forensic - Investigating Memory Artefact
PPTX
Drac lab automatic malware analysis & repository
PPTX
Docker and-daily-devops
PDF
Defense of the assets
PPTX
Tugas Akhir 13510030 - Analisis Keamanan Dalam Pengembangan Sistem Transaksi ...
Rekayasa Balik - Sebuah Hikayat dari Dunia Digital
The Offensive Python - Practical Python for Penetration Testing
From Reversing to Exploitation
Bypass Security Checking with Frida
Reverse Engineering - Protecting and Breaking the Software
Memory Forensic - Investigating Memory Artefact
Drac lab automatic malware analysis & repository
Docker and-daily-devops
Defense of the assets
Tugas Akhir 13510030 - Analisis Keamanan Dalam Pengembangan Sistem Transaksi ...

Recently uploaded (20)

PPTX
TEXTILE technology diploma scope and career opportunities
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPTX
Module 1 Introduction to Web Programming .pptx
DOCX
search engine optimization ppt fir known well about this
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Configure Apache Mutual Authentication
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
TEXTILE technology diploma scope and career opportunities
OpenACC and Open Hackathons Monthly Highlights July 2025
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
4 layer Arch & Reference Arch of IoT.pdf
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Microsoft Excel 365/2024 Beginner's training
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Custom Battery Pack Design Considerations for Performance and Safety
Module 1 Introduction to Web Programming .pptx
search engine optimization ppt fir known well about this
Taming the Chaos: How to Turn Unstructured Data into Decisions
Configure Apache Mutual Authentication
Convolutional neural network based encoder-decoder for efficient real-time ob...
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
A review of recent deep learning applications in wood surface defect identifi...
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV
How ambidextrous entrepreneurial leaders react to the artificial intelligence...

Another Side of Hacking