Category: Publication

Home / Category: Publication

I Passed eMAPT Certification

June 20, 2017 | Publication | No Comments

Two days ago, I had completed my journey in eMAPT (eLearnSecurity Mobile Application Penetration Tester) certification. The certificate ID is eMAPT-117 which can be verified here. This is my second certification process and I am glad that I pass this.

So what’s the fun in eMAPT?

As eLS said, eMAPT certification is really practical. It uses no multiple-choice style of exam. In the certification process, I was tasked to create a program to exploiting the vulnerabilities in certain application. Worry not. In the MASPT (Mobile Application Security and Penetration Testing) course, the course provided for eMAPT certification, we can learn many things from the basic and fundamental concept. I can say that eLS had done a good job elaborate the course materials with lots of labs experience.

Oh, the course itself has two sections. One for Android and another one for iOS.

That’s for it. I won’t spoil the fun more than it is.

Last week I was invited to give a talk about reverse engineering basic. Frankly, this is the most excited talk for me. It is not very common theme for a seminar in university level so I think we need more. I had two days for my presentation. The first day is a seminar and the second day is the workshop.

The first day I talk about basic and common things and reverse engineering. To be honest, Reverse Engineering is a broad term so we had to focus our attention to software reverse engineering or reverse code engineering. I emphasize on three things in any Reverse Engineering process: Comprehension, Decomposition, and Reconstruction, as you can see in the slide. Though, I am not an expert in this field.

In the workshop we also had many hands on. It is difficult to teach assembly language in such time (2 hours) so I decided to bring CIL in. The “assembly” in .NET language is relatively easy for newcomers and the participant might have not hurt their head too much.

As always, you are free to read and spread it.

The slides for seminar can be obtained from here.

 

The slide for workshop is available here.

So there was a seminar and workshop, a week ago. Not a big one, limited to at least 30 people. DracOs is invited to give a workshop, and I was one of the speaker. The presentation I brought is about memory forensics. This is an introduction and we were discussing certain basic of memory forensic there. I got two slots, the seminar in the morning and the workshop in the afternoon.

For workshop we were talking about Volatility framework for analysis and some tools for dumping memory in Windows. We also had handson material. We were not analyzing some random sample of memory dump, but we were analyzing a memory dump of host which infected by malware.

As always, you are free to read and spread it.

For the Seminar, you can grab it here.

 

For the workshop, you can grab it here.

Some days ago I was invited to give a talk about security. The presentation I brought is just an insight about security. How do we start learn and what to learn. What I want to give is a fundamental concept of hacking / penetration testing, not an instant hacking.

As always, you are free to read and spread it.

DracOs Workshop – DracOs Forensic Flavor!

February 24, 2017 | Publication | No Comments

Last week I delivered a presentation on seminar and workshop in Yogyakarta, Indonesia. The main theme is about digital forensic. This is the first day (seminar) slide where I give a general overview about dracos and digital forensic. Our vision is to make dracOs as a powerful linux distribution for cyber security. Digital forensic is one of area we had set as our goal. Here in this seminar we gave some insight about what happen in development process, current state of dracOs (in digital forensic), and the next plan.

You can see and download the slides freely. You are free to use the slides and spread it as you like. If you have a question you can direct your question to me.

Best regards,

Satria Ady Pradana.

DracOS Workshop – Path of Cyber Security

December 24, 2016 | Publication | No Comments

Thanks to Lord of Procrastination, I finally write this.

Sunday, November 27th 2016 I have delivered a presentation about “hacking”. I was so honored to be one of the speaker. We had two sessions available, one for introducing DracOS and the other for main course (hacking). As DracOS developer we gave insight about what DracOS is, the development process, and unlimited possibilities we have. But as my session is about the hacking one, I will share mine.

I highlight the theme, Path of Cyber Security, to be my focus. Many people want to “hack” so we will give some tastes of what real world hack is. It’s not your average hacking workshop in Indonesia. It’s filled with many demos and labs. Unfortunately we didn’t record it so you should satisfied with just the slide.

You can see and download the slides freely. You are free to use the slides and spread it as you like. If you have a question you can direct your question to me.

Best regards,

Satria Ady Pradana.

Sunday, June 26th 2016 I have delivered a presentation about Docker. It is an introduction to two things: Docker and DevOps activity. I believe that Docker and DevOps is complementing each other.

You can see and download the slides freely. You are free to use the slides and spread it as you like. If you have a question you can direct your question to me.

Best regards,

Satria Ady Pradana.

Here is my presentation of student’s final project as requirement for graduation from Institut Teknologi Bandung (ITB).

The slides would be in Indonesian Language.

The title would be “Analisis Keamanan dalam Pengembangan Sistem Transaksi ATM Menggunakan Otentikasi Pembuluh Darah” or in English it would be “Security Analysis on ATM System Development using Vein Authentication”

Hai, ini presentasi tugas akhir saya sebagai persyaratan untuk lulus dari Institut Teknologi Bandung (ITB).

Slide presentasi akan menggunakan Bahasa Indonesia.

Judul yang diberikan adalah “Analisis Keamanan dalam Pengembangan Sistem Transaksi ATM Menggunakan Otentikasi Pembuluh Darah”.

 

Social media & sharing icons powered by UltimatelySocial