<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hacking Simulation Archives - Ethic Ninja – Jasa Pentest &amp; Audit Keamanan Informasi</title>
	<atom:link href="https://www.ethic.ninja/category/hacking-simulation/feed" rel="self" type="application/rss+xml" />
	<link>https://www.ethic.ninja/category/hacking-simulation</link>
	<description>Penyedia Audit Keamanan Siber &#38; Penetration Testing Indonesia</description>
	<lastBuildDate>Wed, 12 Aug 2015 04:41:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.9</generator>

<image>
	<url>https://www.ethic.ninja/wp-content/uploads/2019/09/favicon2019-100x100.png</url>
	<title>Hacking Simulation Archives - Ethic Ninja – Jasa Pentest &amp; Audit Keamanan Informasi</title>
	<link>https://www.ethic.ninja/category/hacking-simulation</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Simulasi Hacking &#124; Patch File Upload Form Part &#8211; 2 [Finish]</title>
		<link>https://www.ethic.ninja/2014/09/simulasi-hacking-patch-file-upload-form-part-2-finish.html</link>
					<comments>https://www.ethic.ninja/2014/09/simulasi-hacking-patch-file-upload-form-part-2-finish.html#respond</comments>
		
		<dc:creator><![CDATA[Dimaz Arno]]></dc:creator>
		<pubDate>Sun, 28 Sep 2014 04:21:00 +0000</pubDate>
				<category><![CDATA[Hacking Simulation]]></category>
		<category><![CDATA[Patch]]></category>
		<guid isPermaLink="false"></guid>

					<description><![CDATA[<p>Jika anda belum membaca artikel sebelumnya, sebaiknya dibaca dahulu karena masih berkaitan. Oke kita lanjut lagi balada sang admin yang masih galau kok masih bisa ditembus pertahanannya. Di sisi yang lain mari kita telusuri bagaimana hacker memanipulasi data sehingga tetap bisa melakukan deface. Lets cekidot! Kasus 2 : Tantangan Melewati Validasi Type File Pertama kali hacker melakukan upload file-jahat.php , ... </p>
<div><a href="https://www.ethic.ninja/2014/09/simulasi-hacking-patch-file-upload-form-part-2-finish.html" class="more-link">Read More</a></div>
<p>The post <a rel="nofollow" href="https://www.ethic.ninja/2014/09/simulasi-hacking-patch-file-upload-form-part-2-finish.html">Simulasi Hacking | Patch File Upload Form Part &#8211; 2 [Finish]</a> appeared first on <a rel="nofollow" href="https://www.ethic.ninja">Ethic Ninja –  Jasa Pentest &amp; Audit Keamanan Informasi</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.ethic.ninja/2014/09/simulasi-hacking-patch-file-upload-form-part-2-finish.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Simulasi Hacking &#124; File Upload Form Part &#8211; 1</title>
		<link>https://www.ethic.ninja/2014/09/simulasi-hacking-file-upload-form-part-1.html</link>
					<comments>https://www.ethic.ninja/2014/09/simulasi-hacking-file-upload-form-part-1.html#comments</comments>
		
		<dc:creator><![CDATA[Dimaz Arno]]></dc:creator>
		<pubDate>Fri, 26 Sep 2014 07:46:00 +0000</pubDate>
				<category><![CDATA[Hacking Simulation]]></category>
		<guid isPermaLink="false"></guid>

					<description><![CDATA[<p>Kali ini kita akan mempelajari bagaimana proses seorang hacker menyerang website melalui upload form yang disediakan suatu website beserta PENANGGULANGANNYA, harap pergunakan ilmu dengan baik dan bijak. Kasus 1 Alkisah terdapat sebuah website image hosting yang menyediakan jasa dimana seseorang diperbolehkan upload image di website tersebut. Sang developer memang baru belajar fungsi upload dan berhasil mengimplementasikannya tapi ada satu yang ... </p>
<div><a href="https://www.ethic.ninja/2014/09/simulasi-hacking-file-upload-form-part-1.html" class="more-link">Read More</a></div>
<p>The post <a rel="nofollow" href="https://www.ethic.ninja/2014/09/simulasi-hacking-file-upload-form-part-1.html">Simulasi Hacking | File Upload Form Part &#8211; 1</a> appeared first on <a rel="nofollow" href="https://www.ethic.ninja">Ethic Ninja –  Jasa Pentest &amp; Audit Keamanan Informasi</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.ethic.ninja/2014/09/simulasi-hacking-file-upload-form-part-1.html/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
