Author Archives: mirnasumopawiro

Ethical Hacking Study Journal: Target Exploitation

Hello again! I still can’t believe that it’s already week 9 of Ethical Hacking and Penetration Testing course. Time flies so fast, I can’t believe the semester is almost over! For the 9th week, we learned about target exploitation. Now, … Continue reading

Posted in Uncategorized | Comments Off on Ethical Hacking Study Journal: Target Exploitation

Ethical Hacking Study Journal: Social Engineering

I didn’t know I would encounter a topic that is THIS interesting in this course. Social engineering, in security, is the act of psychologically manipulating people into doing things that we want them to do. A simple day-to-day example would … Continue reading

Posted in Uncategorized | Leave a comment

Ethical Hacking Study Journal: DVWA Installation

Before Mid-sems, Mr. Lim told us to install DVWA. So what is this DVWA? DVWA stands for Damn Vulnerable Website Application. It is an application that lets people try to use ethical hacking tools for websites in a secure environment. … Continue reading

Posted in Uncategorized | Comments Off on Ethical Hacking Study Journal: DVWA Installation

Ethical Hacking Study Journal: Port Scanning (Test)

Having to attend BILT, a leadership training for clubs, I had to skip week 6 of Ethical Hacking class. The topic of the lecture was port scanning. For week 7, we tried doing the port scanning. We used nmap and … Continue reading

Posted in Uncategorized | Comments Off on Ethical Hacking Study Journal: Port Scanning (Test)

Ethical Hacking Study Journal: Enumeration

For week 5 of the course, there was an activity that was given. The topic was enumeration. The first was to enumerate the user of wp1.pentest.id The second was to enumerate the user of jo1.pentest.id The third was to enumerate … Continue reading

Posted in Uncategorized | Comments Off on Ethical Hacking Study Journal: Enumeration

Ethical Hacking Study Journal: Target Discovery

From what I understand, Target Discovery is more about dealing with DNS’s and IP addresses. What I get is that the tester is trying to get the right target. It is about finding old information about the target that we … Continue reading

Posted in Uncategorized | Comments Off on Ethical Hacking Study Journal: Target Discovery

Ethical Hacking Study Journal: More Information Gathering and Utilizing Search Engine

On the third week, we started off by continuing what we learned the previous week because we didn’t have enough time to go through the whole material. We learned about the tools used to gather information. Apparently, there are lots. … Continue reading

Posted in Uncategorized | Comments Off on Ethical Hacking Study Journal: More Information Gathering and Utilizing Search Engine

Ethical Hacking Study Journal: Information Gathering

On the second week, I learned about many terms that are used in security. These terms include Kali Linux Testing Technology, OSSTTM and OWASP, Black Box and White Box and Gray Box methodology as well as Blue Team and Red … Continue reading

Posted in Uncategorized | Comments Off on Ethical Hacking Study Journal: Information Gathering

Ethical Hacking Study Journal: Introduction

Taking Computer Science, I have been interested in computer security. I have always thought it would be cool since I watched Mr. Robot thinking I want to do that in the future. I honestly had no idea what I would … Continue reading

Posted in Uncategorized | Comments Off on Ethical Hacking Study Journal: Introduction

Multimedia and Human Computer Interaction Final Project Report: SHAPE MATCH

For Multimedia and Human Computer Interaction final project, Mikha and I made a game called SHAPE MATCH where the goal of the user is to help the character go to space by finding matching shapes.

Posted in Projects | Leave a comment