{"id":4347,"date":"2020-12-29T15:43:46","date_gmt":"2020-12-29T15:43:46","guid":{"rendered":"https:\/\/www.hostnic.id\/blog\/?p=4347"},"modified":"2020-12-29T15:43:46","modified_gmt":"2020-12-29T15:43:46","slug":"hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack","status":"publish","type":"post","link":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/","title":{"rendered":"Hal-Hal yang Biasa Dilakukan Hacker Kepada Korban Brute Force Attack"},"content":{"rendered":"<p>Ada banyak hal merugikan yang bisa terjadi ketika hacker berhasil menggunakan teknik brute force attack. Berkut ini merupakan beberapa contoh kejadian yang kerap terjadi di lapangan.<\/p>\n<p><strong>1.Injeksi Malware<\/strong><br \/>\nSetelah hacker berhasil menyusup kedalam website dengan cara melakukan brute force attack, maka salah satu aktivitas yang kerap kali terjadi adalah injeksi malware atau menyusupkan malware kedalam website. Malware ini bisa berupa banyak hal, seperti ransomeware yang sifatnya untuk memeras korban, virus yang bisa menginfeksi program komputer, hingga aplikasi berbahaya yang bisa mengintai data pengguna.<\/p>\n<p><strong>2.Spamvertising<\/strong><br \/>\nSpamvertising merupakan hal yang lumrah terjadi di era teknologi seperti saat ini, hampir samaseperti malware, tindakan ini biasanya dimanfaatkan oleh hacker yang berhasil masuk ke dashboard suatu website untuk memperoleh keuntungan berupa uang dari iklan spam yang telah dipasang secara ilegal.<\/p>\n<p><strong>3.Deface \/ Pengubahan Tampilan Website<\/strong><br \/>\nSelain mencuri data sensitif pengguna sebagaimana yang baru-baru ini menimpa Bhinneka dan Tokopedia. Hacker yang berhasil masuk melalui cara brute force attack biasanya juga meninggalkan jejak dengan cara mengganti tampilan konten. Tindakan ini tentu sangat merugikan bagi pengunjung maupun pemilik situs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ada banyak hal merugikan yang bisa terjadi ketika hacker berhasil menggunakan teknik brute force attack. Berkut ini merupakan beberapa contoh kejadian yang kerap terjadi di lapangan. 1.Injeksi Malware Setelah hacker berhasil menyusup kedalam website dengan cara melakukan brute force attack, maka salah satu aktivitas yang kerap kali terjadi adalah injeksi malware atau menyusupkan malware kedalam [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4348,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[4,82],"tags":[],"class_list":["post-4347","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-teknologi","category-website"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hal-Hal yang Biasa Dilakukan Hacker Kepada Korban Brute Force Attack - Hostnic.id<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hal-Hal yang Biasa Dilakukan Hacker Kepada Korban Brute Force Attack - Hostnic.id\" \/>\n<meta property=\"og:description\" content=\"Ada banyak hal merugikan yang bisa terjadi ketika hacker berhasil menggunakan teknik brute force attack. Berkut ini merupakan beberapa contoh kejadian yang kerap terjadi di lapangan. 1.Injeksi Malware Setelah hacker berhasil menyusup kedalam website dengan cara melakukan brute force attack, maka salah satu aktivitas yang kerap kali terjadi adalah injeksi malware atau menyusupkan malware kedalam [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Hostnic.id\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-29T15:43:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/brute-force-attack-1.jpg?v=1609256544\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"799\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nanda Anubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nanda Anubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\\\/\"},\"author\":{\"name\":\"Nanda Anubis\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"headline\":\"Hal-Hal yang Biasa Dilakukan Hacker Kepada Korban Brute Force Attack\",\"datePublished\":\"2020-12-29T15:43:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\\\/\"},\"wordCount\":180,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/brute-force-attack-1.jpg?fit=1200%2C799&ssl=1?v=1609256544\",\"articleSection\":[\"Teknologi\",\"Website\"],\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\\\/\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\\\/\",\"name\":\"Hal-Hal yang Biasa Dilakukan Hacker Kepada Korban Brute Force Attack - Hostnic.id\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/brute-force-attack-1.jpg?fit=1200%2C799&ssl=1?v=1609256544\",\"datePublished\":\"2020-12-29T15:43:46+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\\\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/brute-force-attack-1.jpg?fit=1200%2C799&ssl=1?v=1609256544\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/brute-force-attack-1.jpg?fit=1200%2C799&ssl=1?v=1609256544\",\"width\":1200,\"height\":799},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hal-Hal yang Biasa Dilakukan Hacker Kepada Korban Brute Force Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\",\"name\":\"hostnic.id\",\"description\":\"Info, Tips dan Tutorial Seputar Layanan Hostnic\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\",\"name\":\"Nanda Anubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"caption\":\"Nanda Anubis\"},\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/author\\\/nanda\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hal-Hal yang Biasa Dilakukan Hacker Kepada Korban Brute Force Attack - Hostnic.id","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/","og_locale":"id_ID","og_type":"article","og_title":"Hal-Hal yang Biasa Dilakukan Hacker Kepada Korban Brute Force Attack - Hostnic.id","og_description":"Ada banyak hal merugikan yang bisa terjadi ketika hacker berhasil menggunakan teknik brute force attack. Berkut ini merupakan beberapa contoh kejadian yang kerap terjadi di lapangan. 1.Injeksi Malware Setelah hacker berhasil menyusup kedalam website dengan cara melakukan brute force attack, maka salah satu aktivitas yang kerap kali terjadi adalah injeksi malware atau menyusupkan malware kedalam [&hellip;]","og_url":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/","og_site_name":"Hostnic.id","article_published_time":"2020-12-29T15:43:46+00:00","og_image":[{"width":1200,"height":799,"url":"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/brute-force-attack-1.jpg?v=1609256544","type":"image\/jpeg"}],"author":"Nanda Anubis","twitter_card":"summary_large_image","twitter_misc":{"Ditulis oleh":"Nanda Anubis","Estimasi waktu membaca":"1 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/#article","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/"},"author":{"name":"Nanda Anubis","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"headline":"Hal-Hal yang Biasa Dilakukan Hacker Kepada Korban Brute Force Attack","datePublished":"2020-12-29T15:43:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/"},"wordCount":180,"commentCount":0,"image":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/brute-force-attack-1.jpg?fit=1200%2C799&ssl=1?v=1609256544","articleSection":["Teknologi","Website"],"inLanguage":"id","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/","url":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/","name":"Hal-Hal yang Biasa Dilakukan Hacker Kepada Korban Brute Force Attack - Hostnic.id","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/brute-force-attack-1.jpg?fit=1200%2C799&ssl=1?v=1609256544","datePublished":"2020-12-29T15:43:46+00:00","author":{"@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"breadcrumb":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/"]}]},{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/#primaryimage","url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/brute-force-attack-1.jpg?fit=1200%2C799&ssl=1?v=1609256544","contentUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/brute-force-attack-1.jpg?fit=1200%2C799&ssl=1?v=1609256544","width":1200,"height":799},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/hal-hal-yang-biasa-dilakukan-hacker-kepada-korban-brute-force-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostnic.id\/blog\/"},{"@type":"ListItem","position":2,"name":"Hal-Hal yang Biasa Dilakukan Hacker Kepada Korban Brute Force Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.hostnic.id\/blog\/#website","url":"https:\/\/www.hostnic.id\/blog\/","name":"hostnic.id","description":"Info, Tips dan Tutorial Seputar Layanan Hostnic","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostnic.id\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Person","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89","name":"Nanda Anubis","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","caption":"Nanda Anubis"},"url":"https:\/\/www.hostnic.id\/blog\/author\/nanda\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/brute-force-attack-1.jpg?fit=1200%2C799&ssl=1?v=1609256544","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8D2mv-187","jetpack-related-posts":[{"id":3893,"url":"https:\/\/www.hostnic.id\/blog\/berita\/waspada-serangan-hacker-pada-website\/","url_meta":{"origin":4347,"position":0},"title":"Waspada Serangan Hacker Pada Website","author":"Nanda Anubis","date":"2020-08-17","format":false,"excerpt":"Mengelola website memang tidak selalu mudah. Ada saja halangan seperti kendala atau eror pada website hingga diserang peretas (hacker) yang tidak bertanggung jawab. Namun, kamu wajib memahami apa saja jenis serangan ini agar bisa lebih waspada terhadap serangan siber (cyber attack). DDoS Attack DDoS Attack (Distributed-Denial-of-Service Attack) adalah serangan yang\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/gambar-1.jpg?fit=626%2C462&ssl=1%3Fv%3D1598378984&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/gambar-1.jpg?fit=626%2C462&ssl=1%3Fv%3D1598378984&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/gambar-1.jpg?fit=626%2C462&ssl=1%3Fv%3D1598378984&resize=525%2C300 1.5x"},"classes":[]},{"id":4344,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/mengenal-brute-force-attack\/","url_meta":{"origin":4347,"position":1},"title":"Mengenal Brute Force Attack","author":"Nanda Anubis","date":"2020-12-28","format":false,"excerpt":"Brute Force adalah serangan yang dilakukan untuk membobol password dengan cara mencoba setiap password sampai akhirnya menemukan password yang tepat. Peretas akan menggunakan algoritma yang menggabungkan huruf, angka dan simbol untuk menghasilkan password untuk serangan tersebut. Seperti mencoba menggunakan kata \u201cpassword\u201d yang ditulis dan dikombinasikan dengan simbol sehingga menjadi \u201cp@55w0rd\u201d.\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/brute-force-attack.jpg?fit=1200%2C399&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/brute-force-attack.jpg?fit=1200%2C399&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/brute-force-attack.jpg?fit=1200%2C399&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/brute-force-attack.jpg?fit=1200%2C399&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/brute-force-attack.jpg?fit=1200%2C399&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":4350,"url":"https:\/\/www.hostnic.id\/blog\/tutorial\/tips\/cara-menghindari-brute-force-attack\/","url_meta":{"origin":4347,"position":2},"title":"Cara Menghindari Brute Force Attack","author":"Nanda Anubis","date":"2020-12-30","format":false,"excerpt":"1.Mengatur Limit Login Sebagaimana kita ketahui, brute force attack merupakan jenis serangan yang memanfaatkan database kata-kata umum yang berpotensi digunakan oleh admin website. Sistem logika yang digunakan adalah menebak beberapa susunan karakter tersebut dengan cara mencobanya berulang-ulang. Dengan mengatur sistem limit login, maka halaman login secara otomatis akan terkunci ketika\u2026","rel":"","context":"dalam &quot;Tips&quot;","block_context":{"text":"Tips","link":"https:\/\/www.hostnic.id\/blog\/.\/tutorial\/tips\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/What-is-a-Brute-Force-Attack-The-Complete-Guide.png?fit=1200%2C630&ssl=1%3Fv%3D1609257034&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/What-is-a-Brute-Force-Attack-The-Complete-Guide.png?fit=1200%2C630&ssl=1%3Fv%3D1609257034&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/What-is-a-Brute-Force-Attack-The-Complete-Guide.png?fit=1200%2C630&ssl=1%3Fv%3D1609257034&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/What-is-a-Brute-Force-Attack-The-Complete-Guide.png?fit=1200%2C630&ssl=1%3Fv%3D1609257034&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/12\/What-is-a-Brute-Force-Attack-The-Complete-Guide.png?fit=1200%2C630&ssl=1%3Fv%3D1609257034&resize=1050%2C600 3x"},"classes":[]},{"id":8026,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/brute-force-attack-memahami-ancaman-dan-cara-mengatasinya\/","url_meta":{"origin":4347,"position":3},"title":"Brute Force Attack: Memahami Ancaman dan Cara Mengatasinya","author":"Monic","date":"2023-10-03","format":false,"excerpt":"Hostnic.id -\u00a0Dalam era digital yang semakin maju, keamanan informasi dan perlindungan data menjadi sangat penting. Salah satu ancaman yang sering dihadapi oleh organisasi dan individu adalah serangan brute force. Dalam artikel ini, kita akan membahas tentang serangan brute force, mengapa serangan ini berbahaya, dan bagaimana cara mengatasinya. 1. Apa itu\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"Brute Force Attack: Memahami Ancaman dan Cara Mengatasinya","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/BFAT.png?fit=750%2C391&ssl=1%3Fv%3D1696332253&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/BFAT.png?fit=750%2C391&ssl=1%3Fv%3D1696332253&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/BFAT.png?fit=750%2C391&ssl=1%3Fv%3D1696332253&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/BFAT.png?fit=750%2C391&ssl=1%3Fv%3D1696332253&resize=700%2C400 2x"},"classes":[]},{"id":5228,"url":"https:\/\/www.hostnic.id\/blog\/tutorial\/website\/plugin-wordpress-terbaik\/","url_meta":{"origin":4347,"position":4},"title":"6 Rekomendasi Plugin WordPress Terbaik, Wajib diinstall!","author":"Monic","date":"2022-07-17","format":false,"excerpt":"Saat ini membangun website bukan menjadi hal sulit meskipun Anda mungkin termasuk orang yang tidak memahami bahasa pemrograman. Caranya Anda cukup menggunakan plugin WordPress terbaik yang dapat menjamin kualitas fitur dan performa website. Artikel ini akan memberikan beberapa rekomendasi plugin yang wajib Anda install untuk kebutuhan website. Rekomendasi Plugin WordPress\u2026","rel":"","context":"dalam &quot;Website&quot;","block_context":{"text":"Website","link":"https:\/\/www.hostnic.id\/blog\/.\/tutorial\/website\/"},"img":{"alt_text":"6 Rekomendasi Plugin WordPress Terbaik yang Wajib Anda Install","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2022\/07\/plugin.jpg?fit=512%2C341&ssl=1%3Fv%3D1657819598&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":7638,"url":"https:\/\/www.hostnic.id\/blog\/tutorial\/website\/wordpress\/plugin-security-wordpress-memperkuat-pertahanan-website-anda\/","url_meta":{"origin":4347,"position":5},"title":"Plugin Security WordPress: Memperkuat Pertahanan Website Anda","author":"Monic","date":"2023-09-25","format":false,"excerpt":"Selamat datang di artikel ini yang akan membahas tentang Plugin Security WordPress: Memperkuat Pertahanan Website Kamu. Dalam dunia yang semakin terhubung secara digital, keamanan website menjadi prioritas utama bagi pemilik website. Plugin WordPress yang kuat dan aman sangat penting untuk melindungi website Kamu dari ancaman dan serangan yang mungkin terjadi.\u2026","rel":"","context":"dalam &quot;Wordpress&quot;","block_context":{"text":"Wordpress","link":"https:\/\/www.hostnic.id\/blog\/.\/tutorial\/website\/wordpress\/"},"img":{"alt_text":"cara mengamankan website","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/09\/personal-digital-security_74855.jpg?fit=740%2C493&ssl=1%3Fv%3D1695625462&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/09\/personal-digital-security_74855.jpg?fit=740%2C493&ssl=1%3Fv%3D1695625462&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/09\/personal-digital-security_74855.jpg?fit=740%2C493&ssl=1%3Fv%3D1695625462&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/09\/personal-digital-security_74855.jpg?fit=740%2C493&ssl=1%3Fv%3D1695625462&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/4347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/comments?post=4347"}],"version-history":[{"count":1,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/4347\/revisions"}],"predecessor-version":[{"id":4349,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/4347\/revisions\/4349"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media\/4348"}],"wp:attachment":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media?parent=4347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/categories?post=4347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/tags?post=4347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}