View Categories

Identifikasi Attack Surface

1 min read

# Identifikasi Attack Surface

Attack Surface adalah seluruh titik yang dapat dijadikan pintu masuk oleh penyerang untuk menyerang sistem. Memahami attack surface sangat penting karena menjadi dasar strategi pentest dan eksploitasi.

# 1. Elemen Attack Surface

### 1.1 External Attack Surface
– domain & subdomain,
– IP publik,
– exposed APIs,
– CDN endpoints,
– cloud assets (bucket, load balancer).

### 1.2 Internal Attack Surface
– internal networks (VLAN),
– internal applications,
– file servers,
– database servers,
– CI/CD pipelines.

### 1.3 Application Attack Surface
– login forms,
– upload forms,
– API endpoints,
– admin panels,
– business logic.

### 1.4 Human Attack Surface
– employee emails,
– weak passwords,
– phishing likelihood,
– exposed credentials.

# 2. Langkah Identifikasi Attack Surface

### Langkah 1: Enumerasi Aset
Gunakan OSINT + scanning untuk menemukan aset.

### Langkah 2: Klasifikasi Aset
Pisahkan berdasarkan kategori:
– exposed,
– internal,
– third-party,
– legacy.

### Langkah 3: Validasi Risiko
Nilai aset berdasarkan:
– criticality,
– sensitivity,
– exposure level.

# 3. Risiko Umum dari Attack Surface yang Buruk
– shadow IT,
– forgotten subdomain,
– exposed dev/staging system,
– misconfigured S3 buckets.

# 4. Blok Perintah (Semua Tools dalam 1 Code Block)

“`bash
# ASSET DISCOVERY
subfinder -d target.com
amass enum -d target.com
dnsx -d target.com -resp

# PORT & SERVICE SCAN
nmap -p- -T4 target.com
nmap -sV -sC target.com

# WEB TECHNOLOGY FINGERPRINTING
whatweb target.com
wappalyzer http://target.com

# API DISCOVERY
katana -u http://target.com

# CLOUD ENUM INDICATORS
aws s3 ls s3://target-bucket –no-sign-request
gcloud dns managed-zones list
az storage blob list –account-name target

# INTERNAL ATTACK SURFACE (POST-COMPROMISE)
nmap -sV 10.0.0.0/24
crackmapexec smb 10.0.0.0/24

Powered by BetterDocs

Leave a Reply

Your email address will not be published. Required fields are marked *