Demonstrasi Trojan Horse dengan Metasploit Framework Payload

Catatan

BAB 1 Pendahuluan

1.1 Latar Belakang

1.2 Rumusan Masalah

1.3 Tujuan

1.4 Manfaat

1.5 Ruang Lingkup dan Batasan

BAB 2 Dasar Teori

2.1 Pengertian Back Door

2.2 Pengertian Trojan Horse

2.3 Cara Kerja Trojan Hourse

2.4 Macam-macam Trojan Hourse

2.4.1 Trojan Remote Access

2.4.2 Trojan Pengirim Password

2.4.3 Trojan File Transfer Protocol (FTP)

2.4.4 Keyloggers

2.4.5 Trojan Penghancur

2.4.6 Trojan Denial of Service (DoS) Attack

2.4.7 Trojan Proxy/Wingate

2.4.8 Software Detection Killers

2.5 Cara Mengatasi Bahaya Trojan Horse

2.5.1 Task List

2.5.2 Netstat

2.5.3 TCP View

2.6 Pengertian Metasploit

BAB 3 Metode Percobaan

3.1 Tempat dan Waktu Percobaan

3.2 Alat dan Bahan

3.3 Cara Percobaan

BAB 4 Pembahasan

4.1 Memasuki PC korban dengan backdoor yang telah dibuat

BAB 5 Penutup

5.1 Simpulan

5.2 Saran

Mirror

this blog contains all my articles licensed under creative commons attribution customized sharealike (cc-by-sa) where you can sell but mention the open one here

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store