<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Posts on Jonias Fortuna</title>
    <link>https://potato.id/en/posts/</link>
    <description>Recent content in Posts on Jonias Fortuna</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Mon, 20 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://potato.id/en/posts/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>How to Improve Your Qualys SSL Server Test Score and Get A&#43; in SSL Labs</title>
      <link>https://potato.id/en/posts/improve-qualys-ssl-server-test-score/</link>
      <pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/improve-qualys-ssl-server-test-score/</guid>
      <description>&lt;p&gt;If you are trying to understand &lt;strong&gt;how to improve your Qualys SSL Server Test score&lt;/strong&gt;, you are in the right place. Qualys SSL Server Test, often referred to as &lt;strong&gt;SSL Labs&lt;/strong&gt;, is one of the most widely used public tools for checking how well a website is configured for HTTPS and TLS.&lt;/p&gt;&#xA;&lt;p&gt;A lot of admins care about getting an &lt;strong&gt;A&lt;/strong&gt; or &lt;strong&gt;A+&lt;/strong&gt; because it is an easy, visible way to validate that their SSL/TLS setup is modern, secure, and free from obvious mistakes.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Build It vs Break It: Why Vibe Coders Keep Shipping Apps That Are Easy to Hack</title>
      <link>https://potato.id/en/posts/build-it-vs-break-it-mindset-vibe-coder-security/</link>
      <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/build-it-vs-break-it-mindset-vibe-coder-security/</guid>
      <description>&lt;p&gt;There is a pattern that keeps playing out. A developer or vibe coder builds an app in a short amount of time, deploys it publicly, gets traction on social media, and then a while later someone replies - the database got leaked.&lt;/p&gt;&#xA;&lt;p&gt;Not because the developer was incompetent. Not because the technology stack was bad. But because one thing kept getting skipped when the focus was entirely on speed: &lt;strong&gt;security&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Subdomain Takeover via AWS Elastic Beanstalk</title>
      <link>https://potato.id/en/posts/subdomain-takeover-via-aws-elastic-beanstalk/</link>
      <pubDate>Sat, 28 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/subdomain-takeover-via-aws-elastic-beanstalk/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Subdomain takeover&lt;/strong&gt; is a vulnerability that&amp;rsquo;s often underestimated, yet carries significant real-world impact. This article covers a real case of subdomain takeover via &lt;strong&gt;AWS Elastic Beanstalk&lt;/strong&gt; - from the core concept and exploitation steps, to detection and prevention.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;what-is-subdomain-takeover&#34;&gt;What Is Subdomain Takeover?&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Subdomain takeover&lt;/strong&gt; (also known as &lt;em&gt;domain takeover&lt;/em&gt; or &lt;em&gt;domain hijacking&lt;/em&gt;) is a vulnerability that occurs when a domain or subdomain has an active DNS record, but the third-party service it points to has been deleted or deprovisioned.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Anti-Gacor: Prevention and Protection Against Online Gambling Slot Injection on Websites</title>
      <link>https://potato.id/en/posts/anti-gacor-prevention-and-protection-against-online-gambling-slot-injection/</link>
      <pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/anti-gacor-prevention-and-protection-against-online-gambling-slot-injection/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;In recent years, online gambling content injection attacks have surged significantly. Known by some groups as &lt;strong&gt;&amp;ldquo;slot gacor injection&amp;rdquo;&lt;/strong&gt; or &lt;strong&gt;&amp;ldquo;judol (judi online/online gambling) attacks&amp;rdquo;&lt;/strong&gt;, these have become one of the most disruptive threats for website administrators in Indonesia. Countless government agency websites, universities, and trusted institutions have fallen victim.&lt;/p&gt;&#xA;&lt;p&gt;This article provides a comprehensive overview: what slot gacor is, how these attacks work, and how to prevent, detect, and recover from a compromised website.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dynamic IP Denylisting with NGINX Plus and fail2ban</title>
      <link>https://potato.id/en/posts/dynamic-ip-denylisting-nginx-plus-fail2ban/</link>
      <pubDate>Tue, 17 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/dynamic-ip-denylisting-nginx-plus-fail2ban/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;This article is based on the original NGINX blog post by Liam Crilly of F5, published September 19, 2017.&lt;/p&gt;&lt;/blockquote&gt;&#xA;&lt;p&gt;You may not realize it, but your website is under constant threat. If it&amp;rsquo;s running WordPress, bots are trying to spam you. If it has a login page, there are brute-force password attacks. You may also consider search engine spiders as unwanted visitors.&lt;/p&gt;&#xA;&lt;p&gt;Defending your site from unwanted, suspicious, and malicious activity is no easy task. Web application firewalls are effective tools and must be considered as part of your security stack. For most environments, there&amp;rsquo;s no such thing as too much security, and a multi-layered approach is invariably the most effective.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Collection of Best and Fastest DNS Servers 2026</title>
      <link>https://potato.id/en/posts/collection-of-best-and-fastest-dns-servers-2026/</link>
      <pubDate>Wed, 04 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/collection-of-best-and-fastest-dns-servers-2026/</guid>
      <description>&lt;p&gt;DNS (Domain Name System) is a system that translates domain names into IP addresses so it becomes one of the foundations of the Internet. Without DNS, we must access websites using IP numbers directly and memorize each IP Addresses we want to visit.&lt;/p&gt;&#xA;&lt;p&gt;By using the right DNS we can maximize our Internet connection to become faster, not visible to the eye but the speed difference is usually measured in milliseconds.&lt;/p&gt;</description>
    </item>
    <item>
      <title>What Is Infatica P2B Network? How to Remove Infatica from Windows</title>
      <link>https://potato.id/en/posts/what-is-infatica-p2b-network/</link>
      <pubDate>Sat, 21 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/what-is-infatica-p2b-network/</guid>
      <description>&lt;h2 id=&#34;what-is-infatica-p2b-network&#34;&gt;What Is Infatica P2B Network?&lt;/h2&gt;&#xA;&lt;p&gt;Infatica P2B Network is a service from the Infatica company that operates using a peer-to-business (P2B) model.&lt;/p&gt;&#xA;&lt;p&gt;This means:&#xA;your device can be used as a proxy network node, where a small portion of your internet bandwidth is “shared” with the Infatica network or users of the service.&lt;/p&gt;&#xA;&lt;p&gt;It is commonly used for:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Web scraping&lt;/li&gt;&#xA;&lt;li&gt;Market research&lt;/li&gt;&#xA;&lt;li&gt;Testing website access from various locations&lt;/li&gt;&#xA;&lt;li&gt;Data collection by companies&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;is-infatica-dangerous&#34;&gt;Is Infatica Dangerous?&lt;/h2&gt;&#xA;&lt;p&gt;Infatica is known as part of a proxy network (P2B Network). This means your computer can be used as part of a global internet network.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Generate Wildcard SSL Let&#39;s Encrypt with Certbot DNS Challenge (Complete Guide)</title>
      <link>https://potato.id/en/posts/generate-wildcard-ssl-tls-certificate-lets-encrypt-certbot-with-dns-challenge/</link>
      <pubDate>Fri, 20 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/generate-wildcard-ssl-tls-certificate-lets-encrypt-certbot-with-dns-challenge/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;A wildcard SSL certificate allows you to secure all subdomains with just one certificate, for example &amp;ldquo;*.example.com&amp;rdquo;, &amp;ldquo;subdomain.example.com&amp;rdquo;. With the help of Let&amp;rsquo;s Encrypt, we can obtain a free and automated SSL/TLS Certificate using Certbot through the DNS challenge method. However, keep in mind that the certificate is not valid for domain names using sub-subdomains such as sub.sub.example.com.&lt;/p&gt;&#xA;&lt;p&gt;This method is very suitable if you have setups like:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Public-facing HTTP infrastructure&lt;/li&gt;&#xA;&lt;li&gt;Internal server or private network&lt;/li&gt;&#xA;&lt;li&gt;Reverse proxy or load balancer&lt;/li&gt;&#xA;&lt;li&gt;Production environment with many subdomains&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;An SSL/TLS certificate functions to encrypt data sent between client and server so it cannot be intercepted (Man in the middle attack), maintain data integrity so it is not altered during transmission, increase user trust because the service appears more secure, and support modern protocols such as HTTP/2 and various API services that require secure connections.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Critical RCE in WordPress Plugin (900K&#43; Installations): Detection &amp; Mitigation</title>
      <link>https://potato.id/en/posts/critical-rce-vulnerability-wordpress-plugin-900k-installations-detection-mitigation/</link>
      <pubDate>Fri, 13 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/critical-rce-vulnerability-wordpress-plugin-900k-installations-detection-mitigation/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;p&gt;A WordPress plugin with more than &lt;strong&gt;900,000 active installations&lt;/strong&gt; is reported to have a &lt;strong&gt;Remote Code Execution (RCE)&lt;/strong&gt; vulnerability with critical severity.&lt;/p&gt;&#xA;&lt;p&gt;This vulnerability allows attackers to execute arbitrary code on the target server under certain conditions. Given the large installation scale, the potential for mass exploitation is very high.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;technical-impact&#34;&gt;Technical Impact&lt;/h2&gt;&#xA;&lt;p&gt;A Remote Code Execution (RCE) vulnerability in a WordPress installation is one of the most critical vulnerability categories because it allows attackers to run commands on the server running WordPress that has this vulnerability. The impact is not limited to the web application but can also extend to the entire server environment depending on configuration and available access rights.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Passwords Alone Are Not Enough!</title>
      <link>https://potato.id/en/posts/passwords-alone-are-not-enough/</link>
      <pubDate>Sat, 12 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/passwords-alone-are-not-enough/</guid>
      <description>&lt;p&gt;Every 39 seconds, one cyber attack occurs somewhere in the world&lt;sup id=&#34;fnref:1&#34;&gt;&lt;a href=&#34;#fn:1&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;1&lt;/a&gt;&lt;/sup&gt;. Many internet users still rely on passwords as the only protection for their accounts, even though this is very risky. Therefore passwords alone are not enough and &lt;strong&gt;Two Factor Authentication (2FA)&lt;/strong&gt; can save you from account theft.&lt;/p&gt;&#xA;&lt;h2 id=&#34;why-passwords-alone-are-not-enough&#34;&gt;Why Passwords Alone Are Not Enough?&lt;/h2&gt;&#xA;&lt;p&gt;Passwords are often easy to guess, reused across many sites, or even leaked through phishing attacks and major data breaches such as those that happened at Facebook, Tokopedia, and through infostealers. If someone gets your password through these methods, they can easily access your account if there is no additional security layer like 2FA.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cyber Hygiene: Everyday Safety Tips</title>
      <link>https://potato.id/en/posts/cyber-hygiene-small-habits-that-protect-you-from-cyber-attacks/</link>
      <pubDate>Fri, 11 Jul 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/cyber-hygiene-small-habits-that-protect-you-from-cyber-attacks/</guid>
      <description>&lt;p&gt;We live in a digital era where almost all activities are connected to the internet — from shopping, banking, working, to entertainment. But many people are still careless about protecting their personal data and unknowingly open gaps for cyber attacks. This is where &lt;strong&gt;cyber hygiene&lt;/strong&gt; becomes important, which refers to good digital habits to prevent cyber attacks.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-is-cyber-hygiene&#34;&gt;What Is Cyber Hygiene?&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;Cyber hygiene&lt;/strong&gt; is a set of practices or daily routines that help maintain the security of your information and digital devices from cyber threats. Just like you regularly wash your hands to prevent illness, cyber hygiene helps prevent malware, phishing, and data theft.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HTTP: Hyper Text Transfer Protocol How HTTP Works Behind the Browser</title>
      <link>https://potato.id/en/posts/http-web-behind-the-browser/</link>
      <pubDate>Mon, 30 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/http-web-behind-the-browser/</guid>
      <description>&lt;p&gt;In this post you will understand &lt;strong&gt;what HTTP is&lt;/strong&gt; examples of HTTP request and response and how it works behind your browser. This is an important foundation to understand how the web works which will be very useful for web hacking bug bounty and pentesting.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;what-is-http&#34;&gt;What Is HTTP?&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;HTTP Hypertext Transfer Protocol&lt;/strong&gt; is the main protocol used to send data between &lt;strong&gt;client browser&lt;/strong&gt; and &lt;strong&gt;server web server&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Every time we access a website the browser sends an &lt;strong&gt;HTTP request&lt;/strong&gt; and the server responds with an &lt;strong&gt;HTTP response&lt;/strong&gt;. This process is not directly visible in the browser and what we usually see is &lt;strong&gt;HTML&lt;/strong&gt; rendered into a web page where the HTML is the result of the HTTP response sent by the server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Understanding the Ransomware Attack Lifecycle: From Initial Access to Data Encryption</title>
      <link>https://potato.id/en/posts/ransomware-lifecycle-and-how-to-break-it/</link>
      <pubDate>Sun, 15 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/ransomware-lifecycle-and-how-to-break-it/</guid>
      <description>&lt;p&gt;In recent years, ransomware has become one of the most serious threats in the cybersecurity landscape. It no longer targets large enterprises only; cybercriminals now also target SMEs, educational institutions, and even the healthcare sector. The impact can be severe, ranging from operational disruption and loss of critical data to financial losses due to ransom payments.&lt;/p&gt;&#xA;&lt;p&gt;Readers can see continuously updated ransomware victims on &lt;a href=&#34;https://ransomware.live/&#34;&gt;Ransomware Live&lt;/a&gt;. From there, we can observe that ransomware attacks happen every day, do not recognize time, and almost every industry sector has become a target for cybercriminals.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Is web phishing HTTP or HTTPS?</title>
      <link>https://potato.id/en/posts/https-is-a-secure-web/</link>
      <pubDate>Mon, 19 May 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/https-is-a-secure-web/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Web phishing is one of the attack methods most frequently used by attackers. In a phishing attack, the attacker creates a fake website that imitates a legitimate website. This fake website is usually used to steal sensitive information from victims, such as login credentials, credit card information, and others.&lt;/p&gt;&#xA;&lt;p&gt;A common perception is that phishing websites always use the HTTP protocol. However, is that really the case? Do phishing websites never use the HTTPS protocol?&lt;/p&gt;</description>
    </item>
    <item>
      <title>What Is a Credential Attack? Recognize and Prevent It Before It&#39;s Too Late</title>
      <link>https://potato.id/en/posts/credential-attack/</link>
      <pubDate>Mon, 19 May 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/credential-attack/</guid>
      <description>&lt;h2 id=&#34;what-is-a-credential-attack&#34;&gt;What Is a Credential Attack?&lt;/h2&gt;&#xA;&lt;p&gt;A credential attack or credential-based attack is a hacking attempt to take over someone&amp;rsquo;s account by stealing a username and password. Usually this is done through techniques like &lt;strong&gt;phishing&lt;/strong&gt;, &lt;strong&gt;credential stuffing&lt;/strong&gt;, and &lt;strong&gt;brute force&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Simply put, attackers spy, guess, or try thousands of password combinations to get into your account. After that, they can access all the data inside it, such as email accounts, social media accounts, game accounts, and even banking accounts.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Easily Validate SPF, DKIM, and DMARC Configuration</title>
      <link>https://potato.id/en/posts/validate-spf-dkim-dmarc/</link>
      <pubDate>Sun, 18 May 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/validate-spf-dkim-dmarc/</guid>
      <description>&lt;h2 id=&#34;why-is-validating-spf-dkim-and-dmarc-important&#34;&gt;Why Is Validating SPF, DKIM, and DMARC Important?&lt;/h2&gt;&#xA;&lt;p&gt;If you have already configured SPF, DKIM, and DMARC in DNS, don&amp;rsquo;t immediately assume everything is secure. An invalid configuration can cause emails to go into the spam folder or even be rejected by the receiving server. That&amp;rsquo;s why validation is very important to ensure the configuration you created actually works.&lt;/p&gt;&#xA;&lt;p&gt;If you are still confused about what SPF, DKIM, and DMARC are, you can read the article &lt;a href=&#34;https://potato.id/en/posts/email-security-spf-dkim-dmarc/&#34;&gt;Email DNS Security Configuration Guide (SPF, DKIM, DMARC)&lt;/a&gt; which briefly explains these three things.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Convert PFX, CRT, and PEM Azure SSL/TLS Certificates</title>
      <link>https://potato.id/en/posts/convert-pfx-crt-and-pem-ssl-tls-certificates/</link>
      <pubDate>Thu, 01 May 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/convert-pfx-crt-and-pem-ssl-tls-certificates/</guid>
      <description>&lt;h2 id=&#34;what-is-ssltls&#34;&gt;What is SSL/TLS?&lt;/h2&gt;&#xA;&lt;p&gt;SSL/TLS (Secure Sockets Layer/Transport Layer Security) is a security protocol used to secure communication between a server and a client. In the web context, SSL/TLS is used to encrypt data transmitted between a browser and a web server, so that sensitive information such as passwords and credit card numbers cannot be accessed by third parties.&lt;/p&gt;&#xA;&lt;p&gt;SSL is the earlier version of the protocol, while TLS is the newer and more secure version. Although the term SSL is still commonly used, most websites today actually use TLS, often referred to as SSL/TLS.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Execution After Redirect with Burp Suite</title>
      <link>https://potato.id/en/posts/execution-after-redirect/</link>
      <pubDate>Sat, 19 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/execution-after-redirect/</guid>
      <description>&lt;p&gt;Execution After Redirect or EAR is a technique used to execute code after the redirect process. This technique is usually used to bypass several security features that exist in web applications. In this article, we will discuss how to exploit EAR using Burp Suite.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-is-execution-after-redirect-ear&#34;&gt;What is Execution After Redirect (EAR)?&lt;/h2&gt;&#xA;&lt;p&gt;Execution After Redirect is usually found in web applications with native style code that use a redirect mechanism to direct users to another page after performing a certain process, such as after login or registration. In some cases, the web application does not call the exit() or die() function after performing the redirect process, so the code after the redirect process continues to be executed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fake Sponsored Job Posting Scam</title>
      <link>https://potato.id/en/posts/fake-sponsored-jobposting/</link>
      <pubDate>Wed, 16 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/fake-sponsored-jobposting/</guid>
      <description>&lt;p&gt;This is actually an old case that went viral last year. While browsing Facebook, I frequently encountered sponsored job advertisements claiming to be from well-known companies — especially in mining, factory, and other blue-collar sectors — such as PT Epson, PT Unilever, PT Indofood, and other major corporations.&lt;/p&gt;&#xA;&lt;p&gt;These ads direct applicants to register online by filling out personal information such as:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Full name&lt;/li&gt;&#xA;&lt;li&gt;Address&lt;/li&gt;&#xA;&lt;li&gt;Phone number&lt;/li&gt;&#xA;&lt;li&gt;National ID number&lt;/li&gt;&#xA;&lt;li&gt;And other personal details&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Unfortunately, many people do not realize that these advertisements are &lt;strong&gt;fake&lt;/strong&gt; and are created purely for the scammer&amp;rsquo;s personal profit.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Phishing Simulation with GoPhish</title>
      <link>https://potato.id/en/posts/phishing-simulation-with-gophish/</link>
      <pubDate>Mon, 03 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/phishing-simulation-with-gophish/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;Phishing is an attack carried out by influencing someone to provide personal or confidential information. This attack is usually conducted by sending fake emails that resemble official emails from certain companies or organizations. In a phishing attack, the attacker attempts to obtain sensitive information such as username, password, and even credit card information.&lt;/p&gt;&#xA;&lt;p&gt;As an organization that is aware of information security, it is important for us to conduct phishing simulations regularly. By conducting phishing simulations, we can measure the success rate of our users in identifying phishing attacks and taking appropriate action. A successful phishing attack can cause financial and reputational losses for the organization.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Guide to Configuring Email DNS Security (SPF, DKIM, DMARC)</title>
      <link>https://potato.id/en/posts/email-security-spf-dkim-dmarc/</link>
      <pubDate>Thu, 20 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/email-security-spf-dkim-dmarc/</guid>
      <description>&lt;p&gt;Email is one of the most widely used communication methods, but it is also vulnerable to attacks such as &lt;strong&gt;spoofing&lt;/strong&gt;, &lt;strong&gt;phishing&lt;/strong&gt;, and &lt;strong&gt;spam&lt;/strong&gt;. Therefore, implementing &lt;strong&gt;SPF, DKIM, and DMARC&lt;/strong&gt; is very important to improve the security of the email we own. The following is a configuration guide for SPF, DKIM, and DMARC to improve email security.&lt;/p&gt;&#xA;&lt;h2 id=&#34;sender-policy-framework-spf&#34;&gt;&lt;strong&gt;Sender Policy Framework (SPF)&lt;/strong&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;what-is-spf&#34;&gt;&lt;strong&gt;What is SPF?&lt;/strong&gt;&lt;/h3&gt;&#xA;&lt;p&gt;Sender Policy Framework or SPF is an email authentication mechanism that allows a domain &lt;strong&gt;to determine which servers are authorized to send email on behalf of the owned domain&lt;/strong&gt;. This configuration allows the receiving server to verify that the received email originates from a server authorized by the sending domain, and this configuration is applied to the DNS TXT record of the sending domain.&lt;/p&gt;</description>
    </item>
    <item>
      <title>mshta.exe - Threat Actor&#39;s Favorite Weapon</title>
      <link>https://potato.id/en/posts/mshta-exe-threat-actors-favorite-weapon/</link>
      <pubDate>Mon, 03 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/mshta-exe-threat-actors-favorite-weapon/</guid>
      <description>&lt;h2 id=&#34;what-is-mshtaexe&#34;&gt;What is mshta.exe?&lt;/h2&gt;&#xA;&lt;p&gt;mshta.exe is a Windows file system utility used to run Microsoft HTML Application (.HTA) files. This program allows the execution of VBScript or JScript-based scripts, making it a useful tool for administrators but also a tool that is often abused by threat actors.&lt;/p&gt;&#xA;&lt;h2 id=&#34;why-is-mshtaexe-often-used-by-threat-actors&#34;&gt;Why is mshta.exe often used by Threat Actors?&lt;/h2&gt;&#xA;&lt;p&gt;Threat Actors frequently abuse mshta.exe to execute malicious code in order to avoid detection by antivirus or other security solutions (EDR). Some reasons why mshta.exe is commonly used in malware attacks include:&lt;/p&gt;</description>
    </item>
    <item>
      <title>DNS Security, Maybe?</title>
      <link>https://potato.id/en/posts/dns-security-maybe/</link>
      <pubDate>Fri, 17 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/dns-security-maybe/</guid>
      <description>&lt;p&gt;As we know, DNS is a service responsible for converting hostnames into IP addresses. It sounds simple, but some people do not realize that this DNS service can also cause security vulnerabilities. The following are several events I have experienced related to DNS and its security. Keep in mind this does not cover all vulnerabilities that exist in DNS, such as DNS Spoofing, DNS Amplification, DNS Hijacking, DNS Rebinding Attack, and other attacks, only several events that I have personally experienced.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Infostealer Spreading Through Fake Google reCAPTCHA</title>
      <link>https://potato.id/en/posts/infostealer-spreading-through-fake-google-recaptcha/</link>
      <pubDate>Sun, 05 Jan 2025 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/infostealer-spreading-through-fake-google-recaptcha/</guid>
      <description>&lt;h2 id=&#34;the-beginning&#34;&gt;The Beginning&lt;/h2&gt;&#xA;&lt;p&gt;This December I received a notification from a Facebook group that I follow. In the post (now deleted), there was a screenshot like the image above, complete with the caption: &lt;em&gt;&amp;ldquo;Is this dangerous or not? Why does the captcha look strange?&amp;rdquo;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;In the comments, the Thread Starter added another screenshot containing text that had to be pasted into the run.exe program as shown below&lt;/p&gt;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;  &#xA;  &#xA;&#xA;  &lt;figure class=&#34;mb-5&#34;&gt;&#xA;    &lt;a href=&#34;https://potato.id/img/infostealer/2.png&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34; class=&#34;image-link&#34;&gt;&#xA;      &lt;picture&gt;&#xA;        &lt;source srcset=&#34;https://potato.id/img/infostealer/2_hu_f9c74d422db37a87.webp&#34; media=&#34;(min-width: 1024px)&#34;&gt;&#xA;        &lt;source srcset=&#34;https://potato.id/img/infostealer/2_hu_191fafe9e808783c.webp&#34; media=&#34;(min-width: 768px) and (max-width: 1023px)&#34;&gt;&#xA;        &lt;source srcset=&#34;https://potato.id/img/infostealer/2_hu_de649da62fb1eb20.webp&#34; media=&#34;(max-width: 767px)&#34;&gt;&#xA;        &lt;img src=&#34;https://potato.id/img/infostealer/2_hu_de649da62fb1eb20.webp&#34;&#xA;             alt=&#34;text&#34;&#xA;             class=&#34;hover-effect&#34;&#xA;             width=&#34;800&#34;&#xA;             height=&#34;246&#34;&gt;&#xA;      &lt;/picture&gt;&#xA;    &lt;/a&gt;&#xA;&#xA;    &#xA;  &lt;/figure&gt;&#xA;&#xA;&#xA;&#xA;&lt;p&gt;It is very clear that this is malware. mshta is a built-in Windows file whose function is to execute commands from HTA applications in the Windows environment and is very often used by threat actors as one of their attack techniques &lt;sup id=&#34;fnref:1&#34;&gt;&lt;a href=&#34;#fn:1&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Phishing Attacks and Prevention</title>
      <link>https://potato.id/en/posts/phishing-attacks-and-prevention/</link>
      <pubDate>Fri, 28 Jun 2024 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/phishing-attacks-and-prevention/</guid>
      <description>&lt;p&gt;Phishing is an attack carried out by obtaining someone&amp;rsquo;s personal information through deception. This attack is usually performed by sending fake emails containing links to fraudulent websites that resemble legitimate ones. The goal of this attack is to steal personal information such as usernames, passwords, and credit card details.&lt;/p&gt;&#xA;&lt;h2 id=&#34;how-phishing-works&#34;&gt;How Phishing Works&lt;/h2&gt;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;&#xA;  &#xA;  &#xA;  &#xA;&#xA;  &#xA;  &#xA;&#xA;  &lt;figure class=&#34;mb-5&#34;&gt;&#xA;    &lt;a href=&#34;https://potato.id/img/phishing/phishing-diagram.webp&#34; target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34; class=&#34;image-link&#34;&gt;&#xA;      &lt;picture&gt;&#xA;        &lt;source srcset=&#34;https://potato.id/img/phishing/phishing-diagram_hu_48db634183066547.webp&#34; media=&#34;(min-width: 1024px)&#34;&gt;&#xA;        &lt;source srcset=&#34;https://potato.id/img/phishing/phishing-diagram_hu_599f04821a561b8d.webp&#34; media=&#34;(min-width: 768px) and (max-width: 1023px)&#34;&gt;&#xA;        &lt;source srcset=&#34;https://potato.id/img/phishing/phishing-diagram_hu_f8841e244a81fa87.webp&#34; media=&#34;(max-width: 767px)&#34;&gt;&#xA;        &lt;img src=&#34;https://potato.id/img/phishing/phishing-diagram_hu_f8841e244a81fa87.webp&#34;&#xA;             alt=&#34;Phishing Diagram&#34;&#xA;             class=&#34;hover-effect&#34;&#xA;             width=&#34;800&#34;&#xA;             height=&#34;399&#34;&gt;&#xA;      &lt;/picture&gt;&#xA;    &lt;/a&gt;&#xA;&#xA;    &#xA;      &lt;figcaption class=&#34;text-left&#34;&gt;&#xA;        Illustration of a Phishing Attack&#xA;      &lt;/figcaption&gt;&#xA;    &#xA;  &lt;/figure&gt;&#xA;&#xA;&#xA;&#xA;&lt;p&gt;Phishing attacks usually begin with the distribution of fake emails or social media ads such as those on Facebook, Instagram, or X that promise users rewards like free in-game items, attractive promotions, or even access to a trending viral video. In reality, the link directs victims to a fraudulent website.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Surabaya Hacker Link Underground Write Up</title>
      <link>https://potato.id/en/posts/surabaya-hacker-link-underground-hack-the-box-write-up-challenges/</link>
      <pubDate>Thu, 13 Jun 2024 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/surabaya-hacker-link-underground-hack-the-box-write-up-challenges/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;&#34;&gt;Information&lt;/a&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;challenges-information&#34;&gt;Challenges Information&lt;/h2&gt;&#xA;&lt;p&gt;This is a write-up of the Surabaya Hacker Link challenge for the Underground machine. This machine was built using one of the vulnerable web applications that SHL commonly uses during demo sessions, with several vulnerabilities patched to make the challenge slightly more interesting.&lt;/p&gt;&#xA;&lt;h2 id=&#34;challenges&#34;&gt;Challenges&lt;/h2&gt;&#xA;&lt;p&gt;On the &lt;a href=&#34;https://forum.surabayahackerlink.org/d/3462-new-challenges-underground&#34;&gt;Surabaya Hacker Link forum&lt;/a&gt; there is information about a new challenge replacing Heaven challenges (the &lt;a href=&#34;https://potato.id/en/posts/solution-for-shl-challenges-heaven-vm/&#34;&gt;Heaven VM write-up can be found here&lt;/a&gt;). The information on the forum is quite clear: do not destroy anything, do not spoil the challenge, take the root and read root.txt. In this write-up I used the IP 110.93.14.30.&lt;/p&gt;</description>
    </item>
    <item>
      <title>There is no way it&#39;s DNS</title>
      <link>https://potato.id/en/posts/there-is-no-way-it-is-dns/</link>
      <pubDate>Tue, 28 May 2024 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/there-is-no-way-it-is-dns/</guid>
      <description>&lt;h2 id=&#34;preamble&#34;&gt;Preamble&lt;/h2&gt;&#xA;&lt;p&gt;Some time ago, there was a bit of discussion at the office regarding a new policy from the DKI Jakarta Provincial Government about deactivating Jakarta ID cards for residents who are no longer domiciled in Jakarta. Several colleagues were affected, so others who still had Jakarta ID cards immediately checked their NIK status.&lt;/p&gt;&#xA;&lt;p&gt;However, as we know, many people have had bad experiences accessing digital government services, ranging from slow loading to being completely inaccessible. My colleagues experienced the same thing. There was also something strange when accessing the website in question, sometimes it worked, sometimes it showed a maintenance page. Out of nowhere, a thought crossed my mind: this must be DNS.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Moving From Disqus to Giscus with Hugo SSG</title>
      <link>https://potato.id/en/posts/moving-from-disqus-to-giscus-with-hugo-ssg/</link>
      <pubDate>Sat, 18 May 2024 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/moving-from-disqus-to-giscus-with-hugo-ssg/</guid>
      <description>&lt;h2 id=&#34;goodbye-disqus-hello-giscus&#34;&gt;Goodbye Disqus, Hello Giscus&lt;/h2&gt;&#xA;&lt;p&gt;After using Disqus for a long time as a comment platform, also known as Comment-as-a-service, this website has finally switched to giscus after considering another similar platform that also uses GitHub, namely utterances.&lt;/p&gt;&#xA;&lt;h2 id=&#34;starting&#34;&gt;Starting&lt;/h2&gt;&#xA;&lt;p&gt;When I first built this website, I was confused about which comment system to use. Since this site is an SSG (Static Site Generator) and does not have a database connection, using a third party comment platform was the best option. In Hugo, there is a default template for Disqus comments, so Disqus was chosen as the comment platform for this blog.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Update Newsfeed RSS to Discord</title>
      <link>https://potato.id/en/posts/update-newsfeed-rss-to-discord-webhook/</link>
      <pubDate>Wed, 01 May 2024 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/update-newsfeed-rss-to-discord-webhook/</guid>
      <description>&lt;p&gt;As a Cybersecurity worker, we must stay up-to-date with any news, alerts, advisories and others also in the IT field everything is new and growing so fast, especially in cybersecurity&lt;/p&gt;&#xA;&lt;p&gt;To fill this gap I use a RSS aggregator to send the latest update from my favorite blog/news to notify me&lt;/p&gt;&#xA;&lt;p&gt;If you join SHL Discord you’ll be familiar with feeds and feeds-ransom text channel, this is how I configure it&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hacking Phishing-as-a-Service</title>
      <link>https://potato.id/en/posts/hacking-phishing-as-a-service/</link>
      <pubDate>Mon, 18 Mar 2024 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/hacking-phishing-as-a-service/</guid>
      <description>&lt;h3 id=&#34;you-may-have-just-clicked-on-a-phishing-ad&#34;&gt;You may have just clicked on a Phishing Ad&lt;/h3&gt;&#xA;&lt;p&gt;I am tired of the ads that appear while watching reels on Facebook. Besides malware ads and online gambling ads, there are also many phishing ads targeting games like Free Fire and Mobile Legends, as well as ads inviting users to join 18+ groups. These ads are designed to steal social media account credentials and can seriously harm users.&lt;/p&gt;&#xA;&lt;p&gt;Phishing, or password fishing, is a method widely used by threat actors to obtain access or credentials to services such as social media platforms like Facebook, TikTok, Instagram, WhatsApp, and others. After gaining access, accounts are often used for other malicious activities.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Interesting or Suspicious Ads Continued</title>
      <link>https://potato.id/en/posts/malwared-ads-continued/</link>
      <pubDate>Tue, 29 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/malwared-ads-continued/</guid>
      <description>&lt;p&gt;After writing about malware ads using the &lt;a href=&#34;https://potato.id/en/posts/malwared-ads/&#34;&gt;Google Bard&lt;/a&gt; lure, now there is another malware ad that is slightly different, both in terms of the lure and the malware being delivered. This ad promotes a custom Windows taskbar to make it look more attractive. However, the file downloaded is actually malware and there is no custom taskbar installation as advertised. So what does the downloaded file install? Of course, malware. Below is roughly what the installer does.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dictionary Attack</title>
      <link>https://potato.id/en/posts/dictionary-attack/</link>
      <pubDate>Mon, 28 Aug 2023 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/dictionary-attack/</guid>
      <description>&lt;h2 id=&#34;understanding-what-a-dictionary-attack-is&#34;&gt;Understanding What a Dictionary Attack Is&lt;/h2&gt;&#xA;&lt;p&gt;A dictionary attack is one of the common techniques used in hacking or pentesting. This attack uses a collection of commonly used passwords (wordlists) or passwords that have been leaked on the internet, such as rockyou.txt, ignis, and others.&lt;/p&gt;&#xA;&lt;p&gt;The difference between a brute force attack and a dictionary attack lies in the use of a wordlist. A brute force attack attempts all possible character combinations, which usually takes much longer. A dictionary attack also requires time, depending on the password complexity, the quality of the wordlist used, and the server response time.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Interesting or Suspicious Ads?</title>
      <link>https://potato.id/en/posts/malwared-ads/</link>
      <pubDate>Sat, 15 Jul 2023 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/malwared-ads/</guid>
      <description>&lt;p&gt;Last June, on the 14th to be exact, I was scrolling Facebook and found an interesting ad about Google&amp;rsquo;s AI called Bard. What made it even more interesting was the comment section, so I immediately checked the comments.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://potato.id/img/iklan/verified-accounts.jpeg&#34; alt=&#34;verified accounts&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Why were all the commenters verified blue check accounts? Why were Indonesian politicians commenting on it? What does politics have to do with Google Bard? The comments also showed mostly positive sentiment.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Secure Surfing Practice</title>
      <link>https://potato.id/en/posts/secure-surfing-practice/</link>
      <pubDate>Sat, 20 May 2023 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/secure-surfing-practice/</guid>
      <description>&lt;p&gt;The internet has become an important part of daily life. Most commonly, it is used as a source of information and entertainment. However, unwise and improper use of the internet can endanger data security and privacy. Below are several steps you can follow to stay safe while browsing the internet:&lt;/p&gt;&#xA;&lt;h2 id=&#34;add-web-protection&#34;&gt;Add Web Protection&lt;/h2&gt;&#xA;&lt;p&gt;Install the Malwarebytes Browser Guard extension in your browser. With this extension, Malwarebytes will block access when you accidentally open a suspicious website or a site indicated as malware or trojan.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lesson Learned from Ransomware</title>
      <link>https://potato.id/en/posts/lesson-learned-from-ransomware/</link>
      <pubDate>Tue, 28 Feb 2023 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/lesson-learned-from-ransomware/</guid>
      <description>&lt;h2 id=&#34;ransomware&#34;&gt;Ransomware&lt;/h2&gt;&#xA;&lt;p&gt;Ransomware is a type of malware (malicious software) that encrypts victims&amp;rsquo; files, causing them to lose access to their data. The malware will decrypt the files if the ransom has been paid by the victim, but there is no guarantee that all data will be restored. If the victim refuses to pay, some ransomware variants will expose the victim&amp;rsquo;s files to the internet. Ransomware spreads through fake installers, phishing, exploit kits, remote desktop access, and other methods.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Yes, It was DNS!</title>
      <link>https://potato.id/en/posts/it-was-dns/</link>
      <pubDate>Thu, 06 Oct 2022 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/it-was-dns/</guid>
      <description>&lt;p&gt;As we know, DNS or Domain Name Server is a service responsible for translating domain names into IP addresses so users do not need to remember complicated IP addresses one by one. Therefore, DNS is a crucial service and must be configured properly. Otherwise, it may cause a domain to become difficult or even impossible for users to access.&lt;/p&gt;&#xA;&lt;p&gt;For example, some time ago a colleague complained to the infrastructure team because they could not access monev.spbe.go.id. Long story short, I asked the user for additional information such as traceroute results and a screenshot of the error when accessing the website.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Download Wordlist Password Indonesia</title>
      <link>https://potato.id/en/posts/download-wordlist-password-indonesia/</link>
      <pubDate>Sun, 28 Aug 2022 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/download-wordlist-password-indonesia/</guid>
      <description>&lt;p&gt;In this digital era, protecting personal data is becoming increasingly important, especially in Indonesia. Many internet users still use weak passwords, which can easily be exploited by cybercriminals. If you are looking for information about &lt;strong&gt;downloading Indonesian password wordlists&lt;/strong&gt;, this article will discuss it, including their usage, risks, and how to protect yourself.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;what-is-a-password-wordlist&#34;&gt;What Is a Password Wordlist?&lt;/h2&gt;&#xA;&lt;p&gt;A &lt;strong&gt;password wordlist&lt;/strong&gt; is a collection of passwords commonly used by internet users. This list is usually used by cybersecurity professionals for:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Job and Shortcut Management in Terminal</title>
      <link>https://potato.id/en/posts/bash-job-management-and-shortcut/</link>
      <pubDate>Mon, 31 Aug 2020 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/bash-job-management-and-shortcut/</guid>
      <description>&lt;p&gt;We often find ourselves needing to work quickly when dealing with the terminal. This is already helped by bash-completion, which allows us to type commands automatically by pressing the &lt;code&gt;[TAB]&lt;/code&gt; key twice. However, in general the terminal also has shortcuts that help us work with Linux more easily and quickly. Below is a list of common terminal shortcuts. This list was taken from Hack The Box Academy.&lt;/p&gt;&#xA;&lt;p&gt;Auto Completion&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;[TAB]&lt;/code&gt; - Initiates command auto completion.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Retas.io Hellbound VM Write-up</title>
      <link>https://potato.id/en/posts/retas-io-hellbound-vm-write-up/</link>
      <pubDate>Mon, 15 Jun 2020 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/retas-io-hellbound-vm-write-up/</guid>
      <description>&lt;p&gt;Let&amp;rsquo;s get straight to the point: this machine is hard, period. When the labs were first launched there were three machines: Zombie, Hellbound, and Anonymouz. In my opinion this one is quite difficult, probably due to my lack of experience in exploitation and intuition. Until the time this write-up was written, the author still hadn&amp;rsquo;t obtained the root user flag and was stuck at www-data. Fortunately, the user flag is readable by www-data, so it can still be submitted.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Retas.io Zombie VM Write-up</title>
      <link>https://potato.id/en/posts/retas-io-zombie-vm-write-up/</link>
      <pubDate>Mon, 25 May 2020 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/retas-io-zombie-vm-write-up/</guid>
      <description>&lt;p&gt;Retas.io is a company from PT. Solusi Siber Teknologi that offers various security services ranging from Vulnerability Assessment, Penetration Testing, to other specialized IT and security-related needs.&lt;/p&gt;&#xA;&lt;p&gt;Recently retas.io launched a new product called retas labs which is intended to help new players entering the Infosec world. These labs are somewhat similar to Hack The Box. By using a VPN we are required to solve challenges using our IT knowledge and skills. Not only that, they also plan to release Retas Campus which aims to provide education and training for entering the Infosec field. However, when this article was written the feature was still under development. Below is the write-up for the Zombie VM challenge available in retas.io labs.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Completion of Malang Hacker Link Challenges</title>
      <link>https://potato.id/en/posts/solution-for-mhl-challenges/</link>
      <pubDate>Wed, 22 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/solution-for-mhl-challenges/</guid>
      <description>&lt;p&gt;After a long time without creating or solving challenges due to increasingly limited free time and assignments piling up, I finally received information about a challenge from a friend in a Telegram group. This challenge was created by another community called Malang Hacker Link. The challenge is quite unique and fun to solve because no “magic tricks” are required.&lt;/p&gt;&#xA;&lt;p&gt;From the information provided, I immediately opened the link and found a form with two fields: first name and last name. Since we had not explored the application yet and had no clues, we tried using this feature to observe the output of the web application. For the firstname field we input &lt;strong&gt;abc&lt;/strong&gt; and for lastname &lt;strong&gt;def&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Write up of Challenges Surabaya Hacker Link VM Heaven</title>
      <link>https://potato.id/en/posts/solution-for-shl-challenges-heaven-vm/</link>
      <pubDate>Fri, 17 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/solution-for-shl-challenges-heaven-vm/</guid>
      <description>&lt;p&gt;Since this machine has already been retired and is no longer considered relevant as a challenge, I decided to write a solution explaining how to complete the &lt;strong&gt;VM Heaven&lt;/strong&gt; challenge from Surabaya Hacker Link.&lt;/p&gt;&#xA;&lt;p&gt;In fact, solving this challenge does not require special hacking tools such as &lt;strong&gt;sqlmap&lt;/strong&gt; or &lt;strong&gt;metasploit&lt;/strong&gt; because the challenge is relatively easy. No advanced hacking knowledge is required. As long as you are familiar with the &lt;strong&gt;GNU/Linux operating system&lt;/strong&gt; and understand the basics of &lt;strong&gt;pwning (owning) a machine&lt;/strong&gt;, this VM can be solved quite easily.&lt;/p&gt;</description>
    </item>
    <item>
      <title>My Daily VIM</title>
      <link>https://potato.id/en/posts/my-daily-vim/</link>
      <pubDate>Wed, 12 Feb 2020 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/my-daily-vim/</guid>
      <description>&lt;h2 id=&#34;vim---text-editor&#34;&gt;VIM - Text Editor&lt;/h2&gt;&#xA;&lt;p&gt;You might already be familiar with this text editor, it&amp;rsquo;s  &lt;strong&gt;VIM&lt;/strong&gt; or &lt;strong&gt;Vi Improved&lt;/strong&gt;. Vim is a terminal-based text editor that is very efficient and can significantly speed up work. Vim is often considered difficult because many users are not yet familiar with its default key bindings.&lt;/p&gt;&#xA;&lt;p&gt;VIM itself has existed since &lt;strong&gt;1991&lt;/strong&gt;, and it is still widely used by developers, system administrators, and many others. VIM is also a very lightweight and fast editor that can be accessed directly through the terminal. VIM is an improved version of &lt;strong&gt;Vi&lt;/strong&gt;, which was the default text editor in UNIX operating systems. Usually &lt;strong&gt;VIM/Vi is already installed&lt;/strong&gt; on UNIX-based operating systems such as &lt;strong&gt;Linux, macOS, and BSD&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Harderning Server with Fail2ban and Reporting to Telegram</title>
      <link>https://potato.id/en/posts/harderning-server-with-fail2ban-to-telegram/</link>
      <pubDate>Mon, 11 Nov 2019 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/harderning-server-with-fail2ban-to-telegram/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://potato.id/img/fail2ban/thumb.webp&#34; alt=&#34;fail2ban-logs&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;After being busy enough that I didn&amp;rsquo;t have time to create challenges and write down how to complete these challenges on this blog, this time we will discuss a little about fail2ban and how to configure it.&lt;/p&gt;&#xA;&lt;p&gt;Generally fail2ban is used to ban IPs that fail to authenticate up to the maximum limit stated in the configuration and this IPS is very effective in preventing attacks that will occur on the server, such as bruteforce attacks on SSH ports (22), FTP (21), SMTP (25), etc., even other attacks via the web server (80/443), then before knowing how to configure fail2ban, we will learn a little about how fail2ban works.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Solution for Inclusion Challenges</title>
      <link>https://potato.id/en/posts/solution-for-inclusion-challenges/</link>
      <pubDate>Sun, 15 Sep 2019 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/solution-for-inclusion-challenges/</guid>
      <description>&lt;p&gt;As usual, in the Surabaya Hacker Link group there are various challenges. Not only admins create them, but members also submit challenges, and I helped deploy this one. Not only deploying it, of course I also tried solving it :3&lt;/p&gt;&#xA;&lt;p&gt;Without further ado, we accessed the challenge at challshl.com.&lt;/p&gt;&#xA;&lt;p&gt;Since I was involved during deployment, I had a slight idea where the bug was located. The cool term would be white box pentest, meaning testing by reading the website source code &lt;em&gt;cmiiw.&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Write a Good Vulnerability Findings Report</title>
      <link>https://potato.id/en/posts/writing-a-good-vulnerability-report/</link>
      <pubDate>Wed, 04 Sep 2019 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/writing-a-good-vulnerability-report/</guid>
      <description>&lt;p&gt;First of all, Happy Eid al Fitr 1440 H, please forgive any mistakes.&#xA;Nothing in this world is perfect, including this writing.&lt;/p&gt;&#xA;&lt;p&gt;Since the launch of the BSSN program titled V2DP or Voluntary Vulnerability Disclosure Program, many people have asked in discussion forums and social media groups about how to properly write a bug report after discovering a vulnerability.&#xA;Here are a few tips from me on how to write a good report.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Solution for QR Generator Challenges</title>
      <link>https://potato.id/en/posts/solution-for-qr-generator-challenges/</link>
      <pubDate>Wed, 04 Sep 2019 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/solution-for-qr-generator-challenges/</guid>
      <description>&lt;p&gt;After a long time without creating a challenge, I finally decided to make a simple one.&lt;br&gt;&#xA;This challenge is themed as a QR Code Generator, but the vulnerability is not in the QR Code itself. Below is a simple way to solve it.&lt;/p&gt;&#xA;&lt;h2 id=&#34;gathering-information&#34;&gt;Gathering Information&lt;/h2&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Challenge Given&lt;br&gt;&#xA;&lt;img src=&#34;https://potato.id/img/qr/challenges.webp&#34; alt=&#34;telegram&#34;&gt;&lt;br&gt;&#xA;As usual, the challenge was posted in the Surabaya Hacker Link group. There was no clue at all, so we directly accessed the website. It turned out to be a QR Generator page with name and Instagram input fields.&lt;/p&gt;</description>
    </item>
    <item>
      <title>GitHub Pages Custom Domain with E-mail Service</title>
      <link>https://potato.id/en/posts/github-pages-custom-domain-with-email-service/</link>
      <pubDate>Sat, 10 Aug 2019 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/github-pages-custom-domain-with-email-service/</guid>
      <description>&lt;p&gt;After using a custom domain with GitHub Pages, I was quite happy to host on GitHub for free and use a unique workflow. However, after some time I noticed that no emails were coming from the custom domain. It turned out the mail server was not connected.&lt;/p&gt;&#xA;&lt;p&gt;I searched the internet using the DuckDuckGo search engine but found no clear answers even after going through several pages. On GitHub Pages itself, there is no explanation about how to keep email working properly. After digging deeper, I found a trick to keep email working while the domain still points to GitHub Pages, which is by configuring the DNS zone properly.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How I Built This Website</title>
      <link>https://potato.id/en/posts/how-i-deploy-this-site/</link>
      <pubDate>Sat, 10 Aug 2019 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/how-i-deploy-this-site/</guid>
      <description>&lt;p&gt;I have wanted to have my own blog and custom email for a long time. Eventually, I started blogging using WordPress. However, as a student with a limited budget, I could only afford a web.id domain which now can use .id and the cheapest hosting plan 100,000 per year at &lt;a href=&#34;https://dracoola.com/&#34;&gt;Dracoola&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;After publishing several articles with WordPress, the hosting disk usage became quite large, so I stopped adding new articles and the site felt heavy to access. Since then, I took a break.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Your Website Hacked?, Do the Following</title>
      <link>https://potato.id/en/posts/my-website-hacked-now-what/</link>
      <pubDate>Thu, 01 Aug 2019 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/my-website-hacked-now-what/</guid>
      <description>&lt;p&gt;In the Surabaya Hacker Link Telegram group, I and &lt;code&gt;@ytyao&lt;/code&gt; often create challenges such as web hacking, reversing, and others. However, in a previous challenge there was a small incident, the website was hacked. Well, the website was intentionally built to be hacked, but this hacker performed a mass wipe by deleting all files and folders. From that incident I learned something new, post incident handling, or commonly called Incident Response.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Solution for Ramadhan Challenges</title>
      <link>https://potato.id/en/posts/solution-for-ramadhan-challenges/</link>
      <pubDate>Thu, 09 May 2019 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/solution-for-ramadhan-challenges/</guid>
      <description>&lt;p&gt;This challenge was created when I was confused about how to explain the LFI bug Local File Inclusion during a secure coding session at &lt;a href=&#34;https://stts.edu&#34;&gt;STTS&lt;/a&gt;. Since I was quite bored with LFI to Local File Read via wrapper, I searched for LFI to RCE methods other than through &lt;code&gt;self/proc/environ&lt;/code&gt; and found LFI to RCE via Access Log Poisoning. However, because hosting environments could not read log files in txt format, a file upload feature was created that only allows txt files. Below is the Write Up.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Getting to Know DOM Based XSS More Closely</title>
      <link>https://potato.id/en/posts/dom-based-xss/</link>
      <pubDate>Wed, 27 Feb 2019 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/dom-based-xss/</guid>
      <description>&lt;p&gt;Before getting into DOM XSS, let&amp;rsquo;s first get to know DOM, what is DOM?, &lt;del&gt;needle?&lt;/del&gt;&lt;/p&gt;&#xA;&lt;p&gt;DOM stands for Document Object Model, which means a hierarchical structure in an HTML document, so in HTML code there is a kind of family tree&lt;/p&gt;&#xA;&lt;p&gt;for XSS you can read &lt;a href=&#34;https://potato.id/en/posts/is-xss-dangerous/&#34;&gt;here&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;In the case of DOM Based XSS, the XSS payload will change HTML content through this DOM????&lt;/p&gt;&#xA;&lt;p&gt;Example:&#xA;DVWA, DOM XSS, Level:Low&lt;/p&gt;&#xA;&lt;p&gt;There is a language selection feature, let&amp;rsquo;s check the script&lt;/p&gt;</description>
    </item>
    <item>
      <title>XSS Prevention</title>
      <link>https://potato.id/en/posts/xss-prevention/</link>
      <pubDate>Thu, 21 Feb 2019 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/xss-prevention/</guid>
      <description>&lt;p&gt;after briefly discussing XSS &lt;a href=&#34;https://potato.id/en/posts/is-xss-dangerous/&#34;&gt;here&lt;/a&gt;, even though it was a bit messy, now it&amp;rsquo;s time to discuss how to prevent this bug from existing on our website&lt;/p&gt;&#xA;&lt;p&gt;XSS can run / be executed because of loose &lt;code&gt;&amp;lt;script&amp;gt;&lt;/code&gt; tags that are executed / rendered by the browser, therefore we manipulate the browser so it does not execute HTML tags that are &lt;em&gt;&lt;strong&gt;input&lt;/strong&gt;&lt;/em&gt; by users. But don&amp;rsquo;t worry, we&amp;rsquo;re not going to mess with the browser, just a little handling before user input is displayed on the website&lt;/p&gt;</description>
    </item>
    <item>
      <title>SQL Injection Into XRDP Account Take Over</title>
      <link>https://potato.id/en/posts/sql-injection-into-xrdp-account-take-over/</link>
      <pubDate>Fri, 25 Jan 2019 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/sql-injection-into-xrdp-account-take-over/</guid>
      <description>&lt;p&gt;Well maybe the title is a bit &lt;em&gt;&lt;strong&gt;click bait&lt;/strong&gt;&lt;/em&gt; — SQL injection itself can&amp;rsquo;t directly inject all the way to an RDP account takeover xD&lt;/p&gt;&#xA;&lt;p&gt;Actually the initial goal was just to download anime on moesubs.com, but when opening the website there was a URL that looked very suspicious:&#xA;&lt;code&gt;https://moesubs.com/?hal=dlrilisan&amp;amp;id=591&lt;/code&gt;&#xA;so I tried checking with &lt;code&gt;&#39;&lt;/code&gt; and the site returned an error. After the error I balanced it using an SQL comment &lt;code&gt;--+-&lt;/code&gt; and the page returned to normal, okay let&amp;rsquo;s continue with order by.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Solution for Surabaya Hacker Link Challenges</title>
      <link>https://potato.id/en/posts/solution-for-surabaya-hacker-link-challenges/</link>
      <pubDate>Thu, 03 Jan 2019 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/solution-for-surabaya-hacker-link-challenges/</guid>
      <description>&lt;p&gt;Well, this post was made because the Surabaya Hacker Link challenges have been updated and many people were curious about this challenge but hadn&amp;rsquo;t solved it yet and suggested making a video tutorial, but since I can&amp;rsquo;t make a video, I&amp;rsquo;ll just write it here instead, &lt;a href=&#34;https://forum.surabayahackerlink.org/d/3142-update-challenges-shl&#34;&gt;updated challenges&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;It explains that we have to save John&amp;rsquo;s website and then we will be given a Telegram group link (flag).&lt;br&gt;&#xA;&lt;img src=&#34;https://potato.id/img/shl-johnpeperikus/awal.webp&#34; alt=&#34;awal&#34;&gt;&lt;br&gt;&#xA;initial appearance of the shl challenge page&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hey I Found Git Repository</title>
      <link>https://potato.id/en/posts/hey-i-found-git-repository/</link>
      <pubDate>Mon, 31 Dec 2018 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/hey-i-found-git-repository/</guid>
      <description>&lt;h2 id=&#34;preface&#34;&gt;PREFACE&lt;/h2&gt;&#xA;&lt;p&gt;Just a small note when finding an exposed git repository on a website&lt;/p&gt;&#xA;&lt;h2 id=&#34;notes&#34;&gt;NOTES&lt;/h2&gt;&#xA;&lt;p&gt;Git is a version control system used by developers to build software collaboratively. The main function of git is to manage versions of your program source code by marking which lines and code were added or changed. Git will create a dotfiles (.git), which contains all its data including committed source code, therefore it’s better to route or restrict access to the git repository from outside. Why? Because otherwise bad things might happen.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Solution for &#39;Simple&#39; Web Challenges</title>
      <link>https://potato.id/en/posts/solution-for-my-simple-web-challenges/</link>
      <pubDate>Fri, 21 Dec 2018 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/solution-for-my-simple-web-challenges/</guid>
      <description>&lt;h2 id=&#34;preface&#34;&gt;Preface&lt;/h2&gt;&#xA;&lt;p&gt;First of all, thanks to &lt;a href=&#34;https://ctf.slashrootctf.id/&#34;&gt;slashroot ctf&lt;/a&gt; because without slashroot ctf I might not have been able to provide these challenges through &lt;a href=&#34;https://dewaweb.com/&#34;&gt;dewaweb.com&lt;/a&gt;. Thanks to all player who took the time to try this &amp;lsquo;simple&amp;rsquo; challenge.&lt;/p&gt;&#xA;&lt;h2 id=&#34;notes&#34;&gt;Notes&lt;/h2&gt;&#xA;&lt;p&gt;clue &amp;ldquo;recon, tools, sign-in, submit&amp;rdquo;&lt;/p&gt;&#xA;&lt;p&gt;This recon is very easy, actually you don’t need to use tools or scanners. There are still many websites that store important things in HTML comments.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://potato.id/img/simplewebchall/htmlcomment.webp&#34; alt=&#34;html comment sensitive information&#34;&gt;&#xA;It clearly shows info that the git repository (/.git/) was moved to the /git/ directory. Let&amp;rsquo;s try accessing it first.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Is XSS Dangerous?</title>
      <link>https://potato.id/en/posts/is-xss-dangerous/</link>
      <pubDate>Thu, 20 Dec 2018 00:00:00 +0000</pubDate>
      <guid>https://potato.id/en/posts/is-xss-dangerous/</guid>
      <description>&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&#xA;&lt;p&gt;From observing several IT groups that I follow, many people keep asking, Is XSS dangerous?, How to upload a webshell via XSS?, Why is my XSS bug report not responded to? Is it because XSS is not dangerous?, &lt;del&gt;Or maybe because the web admin is already you know what?&lt;/del&gt;, More or less those are the questions that come up, let’s discuss together what the characteristics of XSS are,&lt;/p&gt;&#xA;&lt;h2 id=&#34;definition&#34;&gt;Definition&lt;/h2&gt;&#xA;&lt;p&gt;Cross-site scripting is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy. &amp;ndash;Wikipedia&amp;ndash;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
