{"id":4214,"date":"2020-11-13T19:21:33","date_gmt":"2020-11-13T19:21:33","guid":{"rendered":"https:\/\/www.hostnic.id\/blog\/?p=4214"},"modified":"2020-11-29T19:23:14","modified_gmt":"2020-11-29T19:23:14","slug":"cara-kerja-serangan-man-in-the-middle","status":"publish","type":"post","link":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/","title":{"rendered":"Cara Kerja Serangan Man In The Middle"},"content":{"rendered":"<p>Ada dua bentuk jenis a man in the middle attack. Pertama yang melibatkan kedekatan fisik dengan sasaran yang dituju dan yang kedua hanya melibatkan malware yang dikenal sebagai serangan man in the browser (MITB ).<\/p>\n<p>Dengan serangan MITM tradisional, penyerang perlu memiliki akses ke router WiFi yang tidak aman atau yang kurang aman. Jenis koneksi ini umumnya ditemukan di tempat umum dengan WiFi hotspot dan bahkan di rumah. Penyerang akan memindai router dengan menggunakan kode untuk mencari kelemahan tertentu seperti setting standar atau menggunakan password yang buruk atau lubang keamanan karena adanya konfigurasi router yang lemah. Setelah penyerang menemukan kerentanan, mereka kemudian akan memasukkan alat-alat mereka di antara komputer pengguna dan situs yang dikunjungi pengguna.<\/p>\n<p>Versi kedua dari serangan MITM adalah MITB yang telah meraih popularitas dari para kriminal dunia maya karena kemudahan eksekusi. Dengan serangan man in the-browser penyerang hanya perlu untuk menyuntikkan malware ke dalam komputer yang kemudian akan menginstal sendiri ke dalam browser tanpa sepengetahuan pengguna dan kemudian akan mencatat data yang sedang dikirim antara korban dan situs yang khusus ditargetkan, seperti lembaga keuangan yang telah dikodekan ke dalam malware. Setelah malware mengumpulkan data spesifik yang diperlukan kemudian data tersebut dikirim kembali ke penyerang.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ada dua bentuk jenis a man in the middle attack. Pertama yang melibatkan kedekatan fisik dengan sasaran yang dituju dan yang kedua hanya melibatkan malware yang dikenal sebagai serangan man in the browser (MITB ). Dengan serangan MITM tradisional, penyerang perlu memiliki akses ke router WiFi yang tidak aman atau yang kurang aman. Jenis koneksi [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4215,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[4,8,82],"tags":[],"class_list":["post-4214","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-teknologi","category-tips","category-website"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cara Kerja Serangan Man In The Middle - Hostnic.id<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cara Kerja Serangan Man In The Middle - Hostnic.id\" \/>\n<meta property=\"og:description\" content=\"Ada dua bentuk jenis a man in the middle attack. Pertama yang melibatkan kedekatan fisik dengan sasaran yang dituju dan yang kedua hanya melibatkan malware yang dikenal sebagai serangan man in the browser (MITB ). Dengan serangan MITM tradisional, penyerang perlu memiliki akses ke router WiFi yang tidak aman atau yang kurang aman. Jenis koneksi [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/\" \/>\n<meta property=\"og:site_name\" content=\"Hostnic.id\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-13T19:21:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-29T19:23:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/man-in-the-middle-attack-featured-image-big-800x400-1.png?v=1606677766\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nanda Anubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nanda Anubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/cara-kerja-serangan-man-in-the-middle\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/cara-kerja-serangan-man-in-the-middle\\\/\"},\"author\":{\"name\":\"Nanda Anubis\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"headline\":\"Cara Kerja Serangan Man In The Middle\",\"datePublished\":\"2020-11-13T19:21:33+00:00\",\"dateModified\":\"2020-11-29T19:23:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/cara-kerja-serangan-man-in-the-middle\\\/\"},\"wordCount\":203,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/cara-kerja-serangan-man-in-the-middle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/man-in-the-middle-attack-featured-image-big-800x400-1.png?fit=800%2C400&ssl=1?v=1606677766\",\"articleSection\":[\"Teknologi\",\"Tips\",\"Website\"],\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/cara-kerja-serangan-man-in-the-middle\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/cara-kerja-serangan-man-in-the-middle\\\/\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/cara-kerja-serangan-man-in-the-middle\\\/\",\"name\":\"Cara Kerja Serangan Man In The Middle - Hostnic.id\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/cara-kerja-serangan-man-in-the-middle\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/cara-kerja-serangan-man-in-the-middle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/man-in-the-middle-attack-featured-image-big-800x400-1.png?fit=800%2C400&ssl=1?v=1606677766\",\"datePublished\":\"2020-11-13T19:21:33+00:00\",\"dateModified\":\"2020-11-29T19:23:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/cara-kerja-serangan-man-in-the-middle\\\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/cara-kerja-serangan-man-in-the-middle\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/cara-kerja-serangan-man-in-the-middle\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/man-in-the-middle-attack-featured-image-big-800x400-1.png?fit=800%2C400&ssl=1?v=1606677766\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/man-in-the-middle-attack-featured-image-big-800x400-1.png?fit=800%2C400&ssl=1?v=1606677766\",\"width\":800,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/cara-kerja-serangan-man-in-the-middle\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cara Kerja Serangan Man In The Middle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\",\"name\":\"hostnic.id\",\"description\":\"Info, Tips dan Tutorial Seputar Layanan Hostnic\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\",\"name\":\"Nanda Anubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"caption\":\"Nanda Anubis\"},\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/author\\\/nanda\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cara Kerja Serangan Man In The Middle - Hostnic.id","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/","og_locale":"id_ID","og_type":"article","og_title":"Cara Kerja Serangan Man In The Middle - Hostnic.id","og_description":"Ada dua bentuk jenis a man in the middle attack. Pertama yang melibatkan kedekatan fisik dengan sasaran yang dituju dan yang kedua hanya melibatkan malware yang dikenal sebagai serangan man in the browser (MITB ). Dengan serangan MITM tradisional, penyerang perlu memiliki akses ke router WiFi yang tidak aman atau yang kurang aman. Jenis koneksi [&hellip;]","og_url":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/","og_site_name":"Hostnic.id","article_published_time":"2020-11-13T19:21:33+00:00","article_modified_time":"2020-11-29T19:23:14+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/man-in-the-middle-attack-featured-image-big-800x400-1.png?v=1606677766","type":"image\/png"}],"author":"Nanda Anubis","twitter_card":"summary_large_image","twitter_misc":{"Ditulis oleh":"Nanda Anubis","Estimasi waktu membaca":"1 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/#article","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/"},"author":{"name":"Nanda Anubis","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"headline":"Cara Kerja Serangan Man In The Middle","datePublished":"2020-11-13T19:21:33+00:00","dateModified":"2020-11-29T19:23:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/"},"wordCount":203,"commentCount":0,"image":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/man-in-the-middle-attack-featured-image-big-800x400-1.png?fit=800%2C400&ssl=1?v=1606677766","articleSection":["Teknologi","Tips","Website"],"inLanguage":"id","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/","url":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/","name":"Cara Kerja Serangan Man In The Middle - Hostnic.id","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/#primaryimage"},"image":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/man-in-the-middle-attack-featured-image-big-800x400-1.png?fit=800%2C400&ssl=1?v=1606677766","datePublished":"2020-11-13T19:21:33+00:00","dateModified":"2020-11-29T19:23:14+00:00","author":{"@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"breadcrumb":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/"]}]},{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/#primaryimage","url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/man-in-the-middle-attack-featured-image-big-800x400-1.png?fit=800%2C400&ssl=1?v=1606677766","contentUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/man-in-the-middle-attack-featured-image-big-800x400-1.png?fit=800%2C400&ssl=1?v=1606677766","width":800,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/cara-kerja-serangan-man-in-the-middle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostnic.id\/blog\/"},{"@type":"ListItem","position":2,"name":"Cara Kerja Serangan Man In The Middle"}]},{"@type":"WebSite","@id":"https:\/\/www.hostnic.id\/blog\/#website","url":"https:\/\/www.hostnic.id\/blog\/","name":"hostnic.id","description":"Info, Tips dan Tutorial Seputar Layanan Hostnic","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostnic.id\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Person","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89","name":"Nanda Anubis","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","caption":"Nanda Anubis"},"url":"https:\/\/www.hostnic.id\/blog\/author\/nanda\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/man-in-the-middle-attack-featured-image-big-800x400-1.png?fit=800%2C400&ssl=1?v=1606677766","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8D2mv-15Y","jetpack-related-posts":[{"id":4208,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/waspada-serangan-man-in-the-middle\/","url_meta":{"origin":4214,"position":0},"title":"Waspada Serangan Man In The Middle","author":"Nanda Anubis","date":"2020-11-11","format":false,"excerpt":"Man in The Middle merupakan salah satu serangan cyber yang dilakukan untuk mencuri informasi pribadi serta memata-matai korban. Serangan ini cukup berbahaya karena sebagian besar orang tidak sadar bahwa mereka sedang menjadi korban. Untuk menghindari serangan cyber ini, ada baiknya jika kalian mengetahui pengertian serangan Man in The Middle ini.\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/1_GhDEH_3VNFnhU7mQVz90QQ.jpeg?fit=700%2C467&ssl=1%3Fv%3D1606677387&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/1_GhDEH_3VNFnhU7mQVz90QQ.jpeg?fit=700%2C467&ssl=1%3Fv%3D1606677387&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/1_GhDEH_3VNFnhU7mQVz90QQ.jpeg?fit=700%2C467&ssl=1%3Fv%3D1606677387&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/1_GhDEH_3VNFnhU7mQVz90QQ.jpeg?fit=700%2C467&ssl=1%3Fv%3D1606677387&resize=700%2C400 2x"},"classes":[]},{"id":4211,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/tanda-resiko-terkena-serangan-man-in-the-middle-dan-cara-menghindarinya\/","url_meta":{"origin":4214,"position":1},"title":"Tanda Resiko Terkena Serangan Man In The Middle dan Cara Menghindarinya","author":"Nanda Anubis","date":"2020-11-12","format":false,"excerpt":"Beberapa tanda kalian beresiko terkena serangan Man in the Middle Menggunakan open \/ Wi-Fi network publik. Menggunakan SSIDs (nama Wi-Fi) yang mencurigakan. Berada di lokasi dengan evil twin Wi-Fi network, yaitu ketika terdapat dua nama Wi-Fi yang terlihat hampir sama di satu lokasi yang sama, contoh : onlineshopfreewifi dan onlineshopwifi.\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/social-graphic-man-in-the-middle-v4-2.png?fit=875%2C404&ssl=1%3Fv%3D1606677651&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/social-graphic-man-in-the-middle-v4-2.png?fit=875%2C404&ssl=1%3Fv%3D1606677651&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/social-graphic-man-in-the-middle-v4-2.png?fit=875%2C404&ssl=1%3Fv%3D1606677651&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/11\/social-graphic-man-in-the-middle-v4-2.png?fit=875%2C404&ssl=1%3Fv%3D1606677651&resize=700%2C400 2x"},"classes":[]},{"id":9131,"url":"https:\/\/www.hostnic.id\/blog\/blog\/perbedaan-http-dan-https-brainly-memahami-protokol-komunikasi\/","url_meta":{"origin":4214,"position":2},"title":"Perbedaan HTTP Dan HTTPS Brainly: Memahami Protokol Komunikasi","author":"Monic","date":"2024-02-24","format":false,"excerpt":"Halo pembaca setia Hostnic.id! Bagaimana kabar kalian? Apakah kalian pernah bertanya-tanya tentang perbedaan antara HTTP dan HTTPS? Jika iya, maka kalian telah datang ke tempat yang tepat. Dalam artikel ini, kita akan membahas perbedaan antara kedua protokol komunikasi tersebut. Jadi, mari kita mulai dan teruskan membaca. Terima kasih! Pengenalan HTTP\u2026","rel":"","context":"dalam &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/www.hostnic.id\/blog\/.\/blog\/"},"img":{"alt_text":"Perbedaan HTTP dan HTTPS Brainly: Memahami Protokol Komunikasi","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-24T172805.643.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-24T172805.643.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-24T172805.643.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":9315,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/penjelasan-tentang-cara-kerja-ssl-atau-tls\/","url_meta":{"origin":4214,"position":3},"title":"Penjelasan Tentang Cara Kerja SSL Atau TLS","author":"Monic","date":"2024-03-12","format":false,"excerpt":"Hostnic\u00a0\u2013\u00a0Halo pembaca yang terhormat, apa kabar kalian? Selamat datang di artikel ini yang akan membahas tentang cara kerja SSL atau TLS. Sebelum kita memulai, izinkan saya memberikan salam kepada kalian semua. Semoga kalian dalam keadaan baik-baik saja. Terima kasih telah meluangkan waktu untuk membaca artikel ini. Mari kita lanjutkan membahas\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"Penjelasan Tentang Cara Kerja SSL Atau TLS","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2024\/03\/Screenshot_5.jpg?fit=1189%2C634&ssl=1%3Fv%3D1710188833&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2024\/03\/Screenshot_5.jpg?fit=1189%2C634&ssl=1%3Fv%3D1710188833&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2024\/03\/Screenshot_5.jpg?fit=1189%2C634&ssl=1%3Fv%3D1710188833&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2024\/03\/Screenshot_5.jpg?fit=1189%2C634&ssl=1%3Fv%3D1710188833&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2024\/03\/Screenshot_5.jpg?fit=1189%2C634&ssl=1%3Fv%3D1710188833&resize=1050%2C600 3x"},"classes":[]},{"id":8032,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/brute-force-hack-mengenal-metode-serangan-yang-umum-digunakan\/","url_meta":{"origin":4214,"position":4},"title":"Brute Force Hack: Mengenal Metode Serangan yang Umum Digunakan","author":"Monic","date":"2023-10-03","format":false,"excerpt":"Hostnic.id -\u00a0Dalam era digital saat ini, keamanan informasi menjadi sangat penting. Semakin banyak data yang disimpan secara digital, semakin besar pula ancaman terhadap keamanannya. Salah satu metode serangan yang umum digunakan oleh penyerang siber adalah brute force hack. Brute force hack adalah metode serangan yang melibatkan percobaan berulang-ulang dengan menggunakan\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"Brute Force Hack: Mengenal Metode Serangan yang Umum Digunakan","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/BFHA.png?fit=773%2C473&ssl=1%3Fv%3D1696332830&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/BFHA.png?fit=773%2C473&ssl=1%3Fv%3D1696332830&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/BFHA.png?fit=773%2C473&ssl=1%3Fv%3D1696332830&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/BFHA.png?fit=773%2C473&ssl=1%3Fv%3D1696332830&resize=700%2C400 2x"},"classes":[]},{"id":6437,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/kenali-15-jenis-serangan-keamanan-jaringan-dan-cara-penanggulangannya\/","url_meta":{"origin":4214,"position":5},"title":"Kenali 15 Jenis Serangan Keamanan Jaringan Dan Cara Penanggulangannya","author":"Monic","date":"2023-08-17","format":false,"excerpt":"Hostnic.id - Halo pembaca yang terhormat, bagaimana kabar kalian? Saya harap semuanya baik-baik saja. Pada kesempatan kali ini, kita akan membahas topik yang menarik mengenai keamanan jaringan. Seperti yang kita ketahui, Indonesia merupakan salah satu negara dengan perkembangan teknologi yang pesat. Namun, semakin majunya teknologi juga membawa dampak negatif, salah\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"Kenali 15 Jenis Serangan Keamanan Jaringan","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/15.png?fit=738%2C437&ssl=1%3Fv%3D1692281369&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/15.png?fit=738%2C437&ssl=1%3Fv%3D1692281369&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/15.png?fit=738%2C437&ssl=1%3Fv%3D1692281369&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/15.png?fit=738%2C437&ssl=1%3Fv%3D1692281369&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/4214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/comments?post=4214"}],"version-history":[{"count":1,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/4214\/revisions"}],"predecessor-version":[{"id":4216,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/4214\/revisions\/4216"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media\/4215"}],"wp:attachment":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media?parent=4214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/categories?post=4214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/tags?post=4214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}