Analisa Metasploit Framework “msfvenom” Backdoor Trojan dan Fully Undetected (FUD) Trojan
Pengunaan teknologi informasi berupa penggunaan internet di Indonesia terus mengalami peningkatan sejak 2 dekade terakhir hingga 73,24% atau 202 juta jiwa dari 275.77 juta jiwa penduduk Indonesia. Penggunaan teknologi tersebut tidak lepas dari sebuah ancaman pengambilan informasi secara ilegal. Ting...
Main Authors: | Mursalim Mursalim, Wachid Darmawan, Tresi Aprilia |
---|---|
Format: | Article |
Language: | Indonesian |
Published: |
Universitas Dian Nuswantoro
2024-02-01
|
Series: | Techno.Com |
Subjects: | |
Online Access: | https://publikasi.dinus.ac.id/index.php/technoc/article/view/9741 |
Similar Items
-
ENTT/ENTTR: A Family of Improved Emerging NVM-Based Trojan Triggers and Resets
by: Karthikeyan Nagarajan, et al.
Published: (2022-04-01) -
Exploitation with Reverse_tcp Method on Android Device using Metasploit
by: Rizky Dwiananda Putra, et al.
Published: (2019-04-01) -
A New Characterization of Hardware Trojans
by: Samer Moein, et al.
Published: (2016-01-01) -
Tales of the Trojan War /
by: 284011 Khanduri, Kamini
Published: (2002) -
A Crater Chronology for the Jupiter’s Trojan Asteroids
by: S. Marchi, et al.
Published: (2023-01-01)