{"id":137,"date":"2020-11-20T09:03:46","date_gmt":"2020-11-20T09:03:46","guid":{"rendered":"https:\/\/www.goldenfast.net\/blog\/?p=137"},"modified":"2024-01-03T10:54:04","modified_gmt":"2024-01-03T03:54:04","slug":"brute-force-adalah","status":"publish","type":"post","link":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/","title":{"rendered":"Brute Force Attack: Pengertian, Tipe &#038; Langkah Mencegahnya"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Masih ingat dengan kasus brute force attack yang menyerang ecommerce ternama Alibaba pada 2016 lalu? <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dalam kasus tersebut, hackers faktanya telah berhasil meretas lebih dari <\/span><span style=\"font-weight: 400;\">20 juta<\/span><span style=\"font-weight: 400;\"> akun, kemudian menggunakannya untuk membeli berbagai produk serta membuat ulasan palsu.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lalu, apa sebenarnya brute force attack itu dan seberapa bahayakah serangan ini terhadap sistem atau jaringan Anda? Yuk pelajari lebih lanjut dalam artikel ini! Selamat membaca.\u00a0 \u00a0 <\/span><span style=\"font-weight: 400;\">\u00a0\u00a0<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Daftar isi :<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69ef9664bc95b\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69ef9664bc95b\" checked aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#Apa_Itu_Brute_Force_Attack\" >Apa Itu Brute Force Attack?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#Mengenal_Beberapa_Brute_Force_Attack_Tools\" >Mengenal Beberapa Brute Force Attack Tools\u00a0<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#1_Aircrack-ng\" >1. Aircrack-ng<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#2_Ophcrack\" >2. Ophcrack<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#3_John_the_Ripper\" >3. John the Ripper<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#4_THC_Hydra\" >4. THC Hydra<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#5_L0phtCrack\" >5. L0phtCrack<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#Tipe_Brute_Force_Attack\" >Tipe Brute Force Attack<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#1_Simple_Brute_Force_Attacks\" >1. Simple Brute Force Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#2_Hybrid_Brute_Force_Attacks\" >2. Hybrid Brute Force Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#3_Reverse_Brute_Force_Attack\" >3. Reverse Brute Force Attack<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#4_Credential_Stuffing\" >4. Credential Stuffing<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#Lindungi_Diri_Anda_dari_Brute_Force_Attack\" >Lindungi Diri Anda dari Brute Force Attack!<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Apa_Itu_Brute_Force_Attack\"><\/span><strong>Apa Itu Brute Force Attack?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Sederhananya, brute force adalah tindakan hackers yang berupaya mengakses sistem atau jaringan secara paksa dengan cara menebak username dan password. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dalam melancarkan serangannya, pelaku menggunakan metode trial-and-error dengan mencoba seluruh kombinasi kata sandi agar bisa melewati proses autentikasi.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sebenarnya, brute force adalah metode serangan lama dan juga terhitung sederhana. Akan tetapi, jenis <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">cybercrime<\/span><\/a><span style=\"font-weight: 400;\"> ini mempunyai success rate yang cukup tinggi dan dinilai sangat efektif. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Itulah mengapa metode ini masih populer sampai saat ini dan banyak digunakan oleh para hackers untuk melakukan tindakan kriminalnya.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lalu, apa yang bisa hackers lakukan setelah memperoleh akses ke sistem atau jaringan Anda? Berikut beberapa motif serangan yang paling umum:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Mencuri informasi personal Anda (termasuk kata sandi seluruh akun Anda) dan kemudian menjualnya ke pihak ketiga;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Menggunakan akun Anda untuk melakukan tindakan kriminal seperti menyebarkan konten hoax\/ilegal maupun melancarkan serangan <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/phishing-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">phishing<\/span><\/a><span style=\"font-weight: 400;\">;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Menghancurkan reputasi korban dengan cara merusak websitenya;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Memasukkan <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/malware-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">malware<\/span><\/a><span style=\"font-weight: 400;\"> (spyware) dan ads ke website korban untuk memonitor aktivitas mereka serta memperoleh uang setiap kali pengunjung mengklik iklan tersebut;\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Mengarahkan website ke situs yang telah disiapkan pelaku, yang tentunya mengandung konten yang berbahaya atau dipenuhi dengan iklan yang menguntungkan pelaku;\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Menginfeksi perangkat Anda dengan <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/ransomware-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">malware<\/span><\/a><span style=\"font-weight: 400;\"> dan mengubahnya menjadi botnets.\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/li>\n<\/ul>\n<p><strong>Baca Juga: <a href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kenali Bahaya Social Engineering Serta Cara Ampuh Mencegahnya<\/a><\/strong><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-139 aligncenter\" src=\"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya.jpg\" alt=\"Brute Force Attack Pengertian, Tipe &amp; Langkah Mencegahnya\" width=\"960\" height=\"420\" srcset=\"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya.jpg 960w, https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya-300x131.jpg 300w, https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya-768x336.jpg 768w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Mengenal_Beberapa_Brute_Force_Attack_Tools\"><\/span><strong>Mengenal Beberapa Brute Force Attack Tools\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Untuk mengirimkan serangan brute force, cybercriminals biasanya menggunakan beberapa tools yang membantu mereka mengecek dan mencoba berbagai kombinasi password. Beberapa diantaranya adalah:<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"1_Aircrack-ng\"><\/span><strong>1. Aircrack-ng<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Aircrack-ng adalah hacking tool yang digunakan untuk meretas kata sandi wifi. Dalam prosesnya, tool ini melakukan serangan berbasis <\/span><span style=\"font-weight: 400;\">dictionary attacks<\/span><span style=\"font-weight: 400;\">. Sehingga, keberhasilan serangannya akan banyak dipengaruhi oleh efektivitas password dictionary tool tersebut. Aircrack-ng dapat digunakan di perangkat <a href=\"https:\/\/www.microsoft.com\/id-id\/download\/windows.aspx\" target=\"_blank\" rel=\"noopener\">Windows<\/a>, Linux, iOS, dan Android.<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"2_Ophcrack\"><\/span><strong>2. Ophcrack<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Ophcrack merupakan tool berbasis <\/span><span style=\"font-weight: 400;\">rainbow table<\/span><span style=\"font-weight: 400;\">, yang mana secara khusus didesain untuk meretas kata sandi perangkat Windows. Tool ini hanya bisa menembus password yang memiliki panjang kurang dari 14 karakter serta menggunakan alphanumeric characters.\u00a0<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"3_John_the_Ripper\"><\/span><strong>3. John the Ripper<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">John the Ripper merupakan salah satu hacking tool yang populer dan bisa digunakan di lima belas platform sistem operasi; termasuk Unix, Windows, OpenVMS, DOS, dan BeOS. Tool ini mempunyai kemampuan untuk mengkombinasikan teks dan angka, maupun melancarkan serangan berbasis dictionary attacks.<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"4_THC_Hydra\"><\/span><strong>4. THC Hydra<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">THC hydra dapat digunakan untuk melakukan dictionary attacks terhadap lebih dari 30 protokol yang berbeda; yang diantaranya mencakup HTTP, HTTPS, Telnet, FTP, SMB, SMTP, RDP, dan sebagainya. Tool ini juga mendukung berbagai sistem operasi\u2014termasuk Linux, Windows, MacOS, Solaris, OpenBSD, dan QNX.<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"5_L0phtCrack\"><\/span><strong>5. L0phtCrack<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Tidak hanya Ophcrack, L0phtCrack juga mempunyai kemampuan untuk meretas password perangkat Windows. Bedanya, tool ini bisa melancarkan serangan dengan berbagai metode; mulai dari dictionary attacks, rainbow tables, hingga <\/span><span style=\"font-weight: 400;\">hybrid attacks<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Selain kelima tool di atas, hackers mungkin saja mengirimkan brute force attack menggunakan beberapa software lain; diantaranya yakni Rainbow Crack, Hashcat, DaveGrohl, Brutus, Ncrack, dan Medusa.\u00a0\u00a0<\/span><\/p>\n<p><strong>Baca Juga: <a href=\"https:\/\/www.goldenfast.net\/blog\/firewall-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apa Itu Firewall dan Mengapa Anda Membutuhkannya<\/a> \u00a0<\/strong><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Tipe_Brute_Force_Attack\"><\/span><strong>Tipe Brute Force Attack<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Selanjutnya, mari pahami beberapa tipe brute force attacks. Beberapa diantaranya adalah:<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"1_Simple_Brute_Force_Attacks\"><\/span><strong>1. Simple Brute Force Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Dalam tipe ini, hackers mencoba menebak kata sandi secara logis dan sistematis tanpa bantuan software maupun tool apapun. Simple brute force attacks kebanyakan digunakan untuk meretas password atau PIN sederhana (contoh: admin12345).\u00a0\u00a0<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"2_Hybrid_Brute_Force_Attacks\"><\/span><strong>2. Hybrid Brute Force Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Hybrid brute force attacks mengkombinasikan pendekatan dictionary attack dan simple brute force attack. Jadi, tipe ini akan memulai serangannya dengan memanfaatkan kumpulan kata sandi dalam dictionary, lalu mencoba berbagai variasi lanjutan dengan menambahkan angka atau mengubah besar kecilnya huruf.\u00a0\u00a0\u00a0<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"3_Reverse_Brute_Force_Attack\"><\/span><strong>3. Reverse Brute Force Attack<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Berbeda dengan tipe lainnya, dalam reverse brute force attack, cybercriminals telah mengetahui kata sandi korbannya atau menggunakan password yang paling umum. Pelaku kemudian mencari berbagai kemungkinan usernames yang cocok dengan kata sandi tersebut.\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"4_Credential_Stuffing\"><\/span><strong>4. Credential Stuffing<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Dalam credential stuffing, hackers telah berhasil mengetahui satu kombinasi username dan password milik korban. Lalu, mereka mencoba meretas website atau sumber daya jaringan lainnya menggunakan informasi tersebut. Dengan kata lain, pelaku akan memanfaatkan kecenderungan orang dalam menggunakan satu username dan password untuk berbagai akun.\u00a0\u00a0<\/span><\/p>\n<p><strong>Baca Juga: <a href=\"https:\/\/www.goldenfast.net\/blog\/ddos-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\">DDoS Attack: Pengertian, Tipe, dan Cara Mencegahnya<\/a>\u00a0\u00a0\u00a0<\/strong><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Lindungi_Diri_Anda_dari_Brute_Force_Attack\"><\/span><strong>Lindungi Diri Anda dari Brute Force Attack!<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Setelah mempelajari apa itu brute force attack serta bahayanya bagi sistem maupun jaringan, Anda sekarang tentu semakin memahami betapa pentingnya melindungi diri Anda dari ancaman serangan tersebut.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kabar baiknya, ada banyak tindakan pencegahan yang dapat dilakukan agar sistem maupun jaringan Anda tetap aman. Beberapa diantaranya yaitu:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Tingkatkan kompleksitas password dengan mengkombinasikan huruf, simbol, dan angka;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Perhatikan panjang password yang dibuat. Semakin panjang karakter yang digunakan, semakin sulit akun Anda untuk diretas;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Sebaiknya, gunakan kata sandi yang berbeda untuk setiap akun;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Hindari menggunakan pola kata sandi yang umum serta menuliskan informasi yang mudah ditebak (seperti nama dan tanggal lahir);<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Manfaatkan aplikasi password manager untuk membuat dan menyimpan kata sandi yang unik dan kuat untuk setiap akun. Beberapa opsi software yang dapat dipertimbangkan adalah Dashlane, RoboForm, LastPass, 1Password, dan Zoho Vault;\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Terapkan account lockout policy untuk mengunci akun pengguna dalam jaringan Anda jika terdeteksi gagal memasukkan kata sandi beberapa kali;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Maksimalkan <\/span><span style=\"font-weight: 400;\">captcha<\/span><span style=\"font-weight: 400;\"> untuk menerapkan proses autentikasi tambahan sebelum log in;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Menggunakan multifactor authentication adalah sebuah keharusan. Dengan metode ini, akun Anda akan dibekali dengan layer keamanan berlapis, yakni dengan menerapkan proses identifikasi lanjutan\u2014seperti memindai sidik jari, memasukkan kode khusus, atau berbagai metode lainnya.\u00a0\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Selanjutnya, apakah Anda ingin memperdalam pengetahuan mengenai berbagai jenis ancaman keamanan siber serta langkah jitu mencegahnya? Yuk kunjungi terus <a href=\"https:\/\/www.goldenfast.net\/blog\/\" target=\"_blank\" rel=\"noopener\"><strong>blog <\/strong><\/a><\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/\" target=\"_blank\" rel=\"noopener\"><strong>GoldenFast Network<\/strong><\/a><span style=\"font-weight: 400;\"> dan temukan artikel-artikel menarik tentang keamanan server\/jaringan, web development, serta topik terpopuler lainnya.\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dan bagi Anda yang sedang mengelola website bisnis, jangan lupa tingkatkan proteksi web Anda dengan memilih <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/server-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">server<\/span><\/a><span style=\"font-weight: 400;\"> yang reliabel dan mempunyai fitur keamanan yang handal.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sebagai rekomendasi, Anda bisa menggunakan layanan <\/span><strong>dedicated server<\/strong><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.goldenfast.net\/colocation-server\/\" target=\"_blank\" rel=\"noopener\"><strong>colocation server<\/strong><\/a><span style=\"font-weight: 400;\">, maupun <\/span><strong>VPS server<\/strong><span style=\"font-weight: 400;\"> dari <\/span><a href=\"https:\/\/www.goldenfast.net\/\" target=\"_blank\" rel=\"noopener\"><b>GoldenFast Network <\/b><\/a><span style=\"font-weight: 400;\">yang dibekali dengan fasilitas 24\/4 monitoring, 24\/7 customer service, hardware kelas enterprise, UPS backup, serta berbagai fitur dan fasilitas keamanan terbaik lainnya untuk melindungi web Anda dari ancaman brute force attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Semoga berhasil!\u00a0\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Masih ingat dengan kasus brute force attack yang menyerang ecommerce ternama Alibaba pada 2016 lalu? Dalam kasus tersebut, hackers faktanya telah berhasil meretas lebih dari 20 juta akun, kemudian menggunakannya untuk membeli berbagai produk serta membuat ulasan palsu.\u00a0\u00a0 Lalu, apa sebenarnya brute force attack itu dan seberapa bahayakah serangan ini terhadap sistem atau jaringan Anda? [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":139,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,71,3],"tags":[26,157,154,156,155,158,159,160],"class_list":["post-137","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-glossary","category-security","category-tips","tag-apa-itu-apache","tag-apa-itu-brute-force-attack","tag-brute-force-adalah","tag-brute-force-attack","tag-brute-force-attack-adalah","tag-pengertian-brute-force-attack","tag-tipe-brute-force-attack","tag-tips-mencegah-brute-force-attack"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Brute Force Attack: Pengertian, Tipe &amp; Langkah Mencegahnya<\/title>\n<meta name=\"description\" content=\"Brute force adalah ancaman keamanan siber yang bisa menyerang siapa saja. Yuk kenali pengertian, tipe, dan cara mencegah brute force attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Brute Force Attack: Pengertian, Tipe &amp; Langkah Mencegahnya\" \/>\n<meta property=\"og:description\" content=\"Brute force adalah ancaman keamanan siber yang bisa menyerang siapa saja. Yuk kenali pengertian, tipe, dan cara mencegah brute force attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/\" \/>\n<meta property=\"og:site_name\" content=\"GFN Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-20T09:03:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T03:54:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"420\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Amera P. Safira\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amera P. Safira\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/brute-force-adalah\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/brute-force-adalah\\\/\"},\"author\":{\"name\":\"Amera P. Safira\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/person\\\/c916afa27bf5efd317c18ac835b33dff\"},\"headline\":\"Brute Force Attack: Pengertian, Tipe &#038; Langkah Mencegahnya\",\"datePublished\":\"2020-11-20T09:03:46+00:00\",\"dateModified\":\"2024-01-03T03:54:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/brute-force-adalah\\\/\"},\"wordCount\":1031,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/brute-force-adalah\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya.jpg\",\"keywords\":[\"apa itu apache\",\"apa itu brute force attack\",\"brute force adalah\",\"brute force attack\",\"brute force attack adalah\",\"pengertian brute force attack\",\"tipe brute force attack\",\"tips mencegah brute force attack\"],\"articleSection\":[\"Glossary\",\"Security\",\"Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/brute-force-adalah\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/brute-force-adalah\\\/\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/brute-force-adalah\\\/\",\"name\":\"Brute Force Attack: Pengertian, Tipe & Langkah Mencegahnya\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/brute-force-adalah\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/brute-force-adalah\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya.jpg\",\"datePublished\":\"2020-11-20T09:03:46+00:00\",\"dateModified\":\"2024-01-03T03:54:04+00:00\",\"description\":\"Brute force adalah ancaman keamanan siber yang bisa menyerang siapa saja. Yuk kenali pengertian, tipe, dan cara mencegah brute force attack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/brute-force-adalah\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/brute-force-adalah\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/brute-force-adalah\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya.jpg\",\"contentUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya.jpg\",\"width\":960,\"height\":420,\"caption\":\"Brute Force Attack Pengertian, Tipe & Langkah Mencegahnya\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/brute-force-adalah\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brute Force Attack: Pengertian, Tipe &#038; Langkah Mencegahnya\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/\",\"name\":\"GFN Blog\",\"description\":\"Blog | GoldenFast Network\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#organization\",\"name\":\"Goldenfast Network\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logogoldenfast.png\",\"contentUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logogoldenfast.png\",\"width\":232,\"height\":80,\"caption\":\"Goldenfast Network\"},\"image\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/person\\\/c916afa27bf5efd317c18ac835b33dff\",\"name\":\"Amera P. Safira\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g\",\"caption\":\"Amera P. Safira\"},\"description\":\"With a newfound love of the IT world, Amera likes to turn complex topics into easy-to-read and comprehensive articles. In her spare times, Amera enjoys playing video games and reading every book she can find.\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/author\\\/amera-p-safira\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Brute Force Attack: Pengertian, Tipe & Langkah Mencegahnya","description":"Brute force adalah ancaman keamanan siber yang bisa menyerang siapa saja. Yuk kenali pengertian, tipe, dan cara mencegah brute force attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/","og_locale":"en_US","og_type":"article","og_title":"Brute Force Attack: Pengertian, Tipe & Langkah Mencegahnya","og_description":"Brute force adalah ancaman keamanan siber yang bisa menyerang siapa saja. Yuk kenali pengertian, tipe, dan cara mencegah brute force attack.","og_url":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/","og_site_name":"GFN Blog","article_published_time":"2020-11-20T09:03:46+00:00","article_modified_time":"2024-01-03T03:54:04+00:00","og_image":[{"width":960,"height":420,"url":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya.jpg","type":"image\/jpeg"}],"author":"Amera P. Safira","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Amera P. Safira","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#article","isPartOf":{"@id":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/"},"author":{"name":"Amera P. Safira","@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/person\/c916afa27bf5efd317c18ac835b33dff"},"headline":"Brute Force Attack: Pengertian, Tipe &#038; Langkah Mencegahnya","datePublished":"2020-11-20T09:03:46+00:00","dateModified":"2024-01-03T03:54:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/"},"wordCount":1031,"commentCount":2,"publisher":{"@id":"https:\/\/www.goldenfast.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#primaryimage"},"thumbnailUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya.jpg","keywords":["apa itu apache","apa itu brute force attack","brute force adalah","brute force attack","brute force attack adalah","pengertian brute force attack","tipe brute force attack","tips mencegah brute force attack"],"articleSection":["Glossary","Security","Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/","url":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/","name":"Brute Force Attack: Pengertian, Tipe & Langkah Mencegahnya","isPartOf":{"@id":"https:\/\/www.goldenfast.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#primaryimage"},"image":{"@id":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#primaryimage"},"thumbnailUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya.jpg","datePublished":"2020-11-20T09:03:46+00:00","dateModified":"2024-01-03T03:54:04+00:00","description":"Brute force adalah ancaman keamanan siber yang bisa menyerang siapa saja. Yuk kenali pengertian, tipe, dan cara mencegah brute force attack.","breadcrumb":{"@id":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#primaryimage","url":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya.jpg","contentUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/brute-force-attack-pengertian-tipe-dan-langkah-mencegahnya.jpg","width":960,"height":420,"caption":"Brute Force Attack Pengertian, Tipe & Langkah Mencegahnya"},{"@type":"BreadcrumbList","@id":"https:\/\/www.goldenfast.net\/blog\/brute-force-adalah\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.goldenfast.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Brute Force Attack: Pengertian, Tipe &#038; Langkah Mencegahnya"}]},{"@type":"WebSite","@id":"https:\/\/www.goldenfast.net\/blog\/#website","url":"https:\/\/www.goldenfast.net\/blog\/","name":"GFN Blog","description":"Blog | GoldenFast Network","publisher":{"@id":"https:\/\/www.goldenfast.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.goldenfast.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.goldenfast.net\/blog\/#organization","name":"Goldenfast Network","url":"https:\/\/www.goldenfast.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2021\/04\/logogoldenfast.png","contentUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2021\/04\/logogoldenfast.png","width":232,"height":80,"caption":"Goldenfast Network"},"image":{"@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/person\/c916afa27bf5efd317c18ac835b33dff","name":"Amera P. Safira","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g","caption":"Amera P. Safira"},"description":"With a newfound love of the IT world, Amera likes to turn complex topics into easy-to-read and comprehensive articles. In her spare times, Amera enjoys playing video games and reading every book she can find.","url":"https:\/\/www.goldenfast.net\/blog\/author\/amera-p-safira\/"}]}},"_links":{"self":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts\/137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/comments?post=137"}],"version-history":[{"count":7,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts\/137\/revisions"}],"predecessor-version":[{"id":3229,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts\/137\/revisions\/3229"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/media\/139"}],"wp:attachment":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/media?parent=137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/categories?post=137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/tags?post=137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}