WeTOFU
Index
Initializing search
    syahrolus
    • Introduction
    • Mata Kuliah
    • Cyber Security
    • Jaringan Komputer
    • Cloud Computing
    • Kriptografi
    • AI
    • CTF
    • Tools
    • Tips
    • Blog
    syahrolus
      • Welcome
      • Mata Kuliah
      • Topology & Security
      • IDS/IPS
      • Firewall
      • Lab
        • Network Security Infrastructure
        • Security +
        • Comparing Security Roles and Security Controls
      • Terminology
        • Security +
        • Learning Sources
        • Methodology
        • Usefull Tools
        • Some Cases
          • Laravel
      • Intro
      • Perangkat Cisco
      • IP, Subnet, Wildcard
      • OSI Layer
      • NET Tools
        • Protokol Routing
        • RIP
        • EIGRP
        • OSPF
        • BGP
        • PPTP
        • SSTP
        • L2TP
        • OpenVPN
      • Route Redistribution
        • SYN
        • UDP
        • TFTP
        • DNS
        • LDAP
        • MSSQL
        • NTP
        • SNMP
        • SSDP
        • NetBIOS
      • Autonomous System
      • Access Control List
      • VLAN
      • Mikrotik
      • Arista
      • Fortigate
      • VirtualBox Network
        • AWS
        • Google Cloud
        • GCD & EGCD
        • CRT
        • Modular Multiplicative Inverse
        • Fermat's little theorem
          • ECB
          • CBC
          • CFB
          • OFB
        • Confusion & Diffusion Shannon
        • Feistel Network
        • S-Box
        • Digital Signature
        • Digital Signature Standard
        • MAC
        • Digital Certificate
        • PKCS 1
        • RSA Basic
        • Modulo-related Attack
        • Public Key Indexed-related Attack
        • Private key d-related Attack
        • Chosen Plaintext Attack
        • Random
        • DES Basic
        • AES Basic
        • RC4 Basic
        • HASH Basic
        • El Gamal Basic
        • Diffie-Hellman Basic
        • Blowfish Basic
        • Twofish Basic
        • ECC Basic
        • Rumus
        • NTRU Basic
        • Chain Rule
        • Linear Regression
        • Backpropagation
        • Activation Function
        • NN
        • ANN
        • CNN
        • SVM
        • Naive Bayes
        • Random Forest
        • K-Nearest Neighbors
        • K-means
        • Apriori
        • Logistic Regression
        • Boosting
      • CTF
        • Basic
          • Stack
          • Stack0
          • Stack1
          • Stack2
          • Stack3
          • Stack4
          • Stack5
          • Stack6
          • Format
          • Format0
          • Format1
          • Format2
          • Format3
          • Format4
        • Bind Shellcode
        • Return to libc
          • Heap Memory
            • malloc chunk
            • malloc state
            • bins & chunks
            • internal functions
            • core functions
            • security checks
            • First Fit
          • Net0
          • Net1
          • Net2
          • Final0
          • Final1
          • Final2
      • web vuln
          • Bandit
          • Natas
          • Leviathan
          • Hackthebox
          • Meow
          • Fawn
          • Dancing
          • Redeemer
          • Explosion
          • Preignition
          • Appointment
          • Sequel
          • Crocodile
          • Responder
          • Ignition
          • Bike
          • Pennyworth
          • Tactics
          • Archetype
          • Oopsie
          • Vaccine
          • Unified
          • Included
          • Markup
          • Jeeves
          • Bat Computer
          • Optimistic
          • Reg
          • HTB Console
          • PwnShop
          • Lame
          • Jerry
          • Netmon
          • Blue
          • Emdee five for life
          • Heist
          • OpenAdmin
          • Curling
          • Hey Buddy
          • Todo List
          • Keep Your Secrets
          • John the Rocker
        • zer0ptsCTF2022, Anti-Fermat
          • Baby RSA Quiz
          • XORROX
          • Steam Locomotive
          • A Wild Ride
          • Ostrich
          • Space pirate, Going Deeper
          • Android-in-the-Middle
          • Jenny From The Block
          • The Three-Eyed Oracle
          • How The Columns Have Turned
          • WIDE
          • Omega One
          • Rebuilding
          • Without a Trace
          • Snakecode
          • Linkedlist
        • c++
        • php
      • sqlmap
      • Nmap
      • Curl
      • Tcpdump
      • GDB
      • Radare2
      • Cutter
      • fcrackzip
      • ngrok
      • Netcat
        • Shell Script
        • Special Character
        • Operators
        • Array
        • Decision
        • Loop
      • OpenSSL
      • Archive File
      • Hydra
      • IronBee
      • ModSecurity
      • Commix
      • Burp Suite
      • OWASP
      • Maltego
      • GNS3
      • Zabbix
      • Snort
      • Guide This Web
      • Mdbook
      • Github
      • Install / Remove .deb in ubuntu
      • Install sql server ubuntu 20.04
      • Setting IP Static
      • HTTPS in Local Network (Ubuntu Server 20.04)
      • SSH with rsakey
      • IT Career Roadmap
      • Wlan Monitor Mode
      • Wifi Hacking
      • Virtualbox
      • Install Spesific Python version
      • Path variable terminal
      • Linux Users & Groups
      • Replikasi Onnocenter
      • Install Moodle
        • Install
        • ROS Melodic
        • ROS Noetic
        • Install ROS & Opencv
      • Hapus Dual Boot
      • Membuat File ISO
      • Docker
      • Python Email
      • Python Email
      • Keylogger
      • Phising
      • Random
      • Index
        • 2024
        • 2023
    • July 13, 2024
    • 1 min read

    Real Case - Time based Blind SQL Injection using Manual Script Python

    Continue reading
    • July 13, 2024
    • 1 min read

    Easy Auto Penetration Report with Spreadsheet and Apps Script

    optimize the efficiency of making pentest reports with this method.

    *Of course it can apply to all cases not just Pentest

    Continue reading
    • July 6, 2024
    • 3 min read

    Real Case - Bypass SQL Injection using Character Encoding and SQLMAP Tamper

    When sqlmap requires manual tampering to bypass WAF using Character Encoding.

    Continue reading
    • December 31, 2023
    • 15 min read

    Happy new years eve!

    We hope you are all having fun and wish you all the best for the new year!

    Continue reading
    Copyright © 2022 Syahrolus
    Made with Material for MkDocs

    Cookie consent

    We use cookies to recognize your repeated visits and preferences, as well as to measure the effectiveness of our documentation and whether users find what they're searching for. With your consent, you're helping us to make our documentation better.