{"id":11684,"date":"2024-10-11T09:53:41","date_gmt":"2024-10-11T02:53:41","guid":{"rendered":"https:\/\/cbtp.co.id\/kb\/?post_type=ht_kb&#038;p=11684"},"modified":"2024-10-11T14:37:07","modified_gmt":"2024-10-11T07:37:07","slug":"port-scanning-menggunakan-netcat-dan-nettcpip","status":"publish","type":"ht_kb","link":"https:\/\/cbtp.co.id\/kb\/knowledge-base\/port-scanning-menggunakan-netcat-dan-nettcpip\/","title":{"rendered":"Port Scanning Menggunakan Netcat dan NetTCPIP"},"content":{"rendered":"\n<p class=\"has-text-align-center\">\u0628\u0650\u0633\u0652\u0645\u0650 \u0627\u0644\u0644\u064e\u0651\u0647\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0652\u0645\u064e\u0646\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0650\u064a\u0652\u0645<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>Tujuan dari port scanning adalah untuk mengetahui apakah port (terutama port TCP) tertentu pada suatu end-point statusnya open, closed, atau filtered. Open artinya port tersebut akan merespon connection request. Closed artinya port tersebut menolak (refused) connection request. Sedangkan filtered artinya ada firewall yang mem-block packet yang dikirimkan ke port tersebut, sehingga packet tersebut tidak sampai ke port tujuan.<\/p>\n\n\n\n<p>Ada banyak cara untuk melakukan port scanning, salah satu tool yang paling kompleks adalah Nmap. Namun ada cara yang lebih simpel yang bisa digunakan untuk tujuan yang sama tanpa meng-install software apapun. Yaitu Netcat pada Linux, dan NetTCPIP pada Windows.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Netcat<\/h2>\n\n\n\n<p>Netcat adalah network utility yang sudah ter-install secara default pada Linux, misalnya Ubuntu. Salah satu fitur yang ada pada Netcat adalah port scanning. Dan Netcat bisa langsung digunakan dari terminal dengan command yang simpel.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>netcat -vzw5 &lt;IP_ADDRESS&gt; &lt;PORT&gt;<\/code><\/pre>\n\n\n\n<p>netcat &gt; command yang digunakan untuk menggunakan Netcat. Command ini bisa juga disingkat menjadi &#8220;nc&#8221;.<br>-v &gt; verbose, adalah flag yang berfungsi untuk menampilkan informasi status dari port yang sedang di-scan.<br>-z &gt; zero I\/O, adalah flag yang jika digunakan, maka Netcat hanya akan mengecek apakah port yang dituju open atau closed tanpa mengirimkan data apapun. Penjelasan lebih teknisnya lagi, Netcat hanya akan menunggu sampai ia menerima packet SYN-ACK, atau RST dari target, kemudian langsung menutup koneksi. Apabila tidak menggunakan flag -z, maka Netcat akan menerima packet SYN-ACK, kemudian membalas dengan packet ACK. Sehingga koneksi antara 2 end-point ini menjadi fully established. Sederhananya, flag -z hanya mengetuk pintu target, dan langsung kabur saat pemilik rumah hendak membuka pintu.<br>-w &gt; timeout, -w5 artinya Netcat akan menunggu selama 5 detik, dan apabila tidak ada respon dari target selama 5 detik, maka Netcat akan menganggap koneksi ke target adalah timeout.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Contoh Netcat 1<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"478\" height=\"49\" src=\"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-suceeded.png\" alt=\"\" class=\"wp-image-11686\" style=\"width:650px;height:auto\" srcset=\"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-suceeded.png 478w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-suceeded-300x31.png 300w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-suceeded-50x5.png 50w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-suceeded-60x6.png 60w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-suceeded-100x10.png 100w\" sizes=\"(max-width: 478px) 100vw, 478px\" \/><\/figure>\n\n\n\n<p>Di atas adalah contoh menggunakan Netcat untuk meng-scan port 80 pada IP 103.XXX.XXX.XXX. Karena kita menggunakan flag -v, maka Netcat menampilkan informasi &#8220;succeeded!&#8221; yang artinya status port tersebut adalah open. Tanpa flag -v, maka tidak ada informasi yang ditampilkan. Kemudian kita juga menggunakan flag -z, sehingga Netcat langsung menutup koneksi dan kita langsung kembali ke console. Jika flag -z tidak digunakan, maka ada delay sebelum kembali ke console karena koneksi antara kita dengan target menjadi fully established. Dan flag -w5 juga digunakan. Jadi jika selama 5 detik tidak ada respon dari target, maka Netcat menganggap timeout. Yang artinya packet kita tidak sampai ke port tujuan karena mungkin ter-filter oleh firewall.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Contoh Netcat 2<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"641\" height=\"45\" src=\"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-filtered.png\" alt=\"\" class=\"wp-image-11687\" style=\"width:658px;height:auto\" srcset=\"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-filtered.png 641w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-filtered-300x21.png 300w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-filtered-50x4.png 50w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-filtered-60x4.png 60w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-filtered-100x7.png 100w\" sizes=\"(max-width: 641px) 100vw, 641px\" \/><\/figure>\n\n\n\n<p>Selanjutnya kita meng-scan port 81 ke IP target yang sama. Ketika command dijalankan, ada delay selama 5 detik, lalu kemudian informasi &#8220;time out&#8221; ditampilkan. Ini karena tidak ada respon dari target selama 5 detik, sehingga Netcat menganggap koneksi ke target adalah timeout. Ini bisa disebabkan oleh firewall yang mem-block port tersebut, atau target dikonfigurasi untuk hanya diam dan tidak memberikan respon apa-apa saat ada packet yang sampai ke port tersebut.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Contoh Netcat 3<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"593\" height=\"48\" src=\"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-refused.png\" alt=\"\" class=\"wp-image-11693\" style=\"width:666px;height:auto\" srcset=\"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-refused.png 593w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-refused-300x24.png 300w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-refused-50x4.png 50w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-refused-60x5.png 60w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-refused-100x8.png 100w\" sizes=\"(max-width: 593px) 100vw, 593px\" \/><\/figure>\n\n\n\n<p>Contoh selanjutnya adalah port scanning ke port 22 dengan hasil &#8220;Connection refused&#8221;. Artinya packet yang dikirimkan oleh Netcat sampai ke port tujuan, akan tetapi target langsung mengirimkan penolakan berupa packet dengan flag RST. Ibaratnya seperti kita memanggil seseorang, &#8220;halo dek&#8221;, orang tersebut tahu kita memanggilnya, akan tetapi dia hanya menjawab &#8220;gak&#8221;.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Contoh Netcat 4<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"590\" height=\"194\" src=\"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-port-range.png\" alt=\"\" class=\"wp-image-11702\" style=\"width:665px;height:auto\" srcset=\"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-port-range.png 590w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-port-range-300x99.png 300w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-port-range-50x16.png 50w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-port-range-60x20.png 60w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-port-range-100x33.png 100w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/><\/figure>\n\n\n\n<p>Netcat bisa melakukan scan ke lebih dari 1 port. dan juga port range dengan menggunakan 1 baris command saja. Pada contoh di atas, kita melakukan port scanning ke port 22, 80, dan 443 sampai 450. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">NetTCPIP<\/h2>\n\n\n\n<p>Bagaimana jika kita ingin melakukan port scanning dari Windows? Sedangkan Netcat secara default hanya tersedia di Linux. Caranya adalah menggunakan NetTCPIP. NetTCPIP adalah module yang secara default ada di setiap OS Windows, dan dapat digunakan melalui Powershell. Kekurangan NetTCPIP dibandingkan Netcat adalah, NetTCPIP hanya bisa meng-scan 1 port saja dalam 1 baris command.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Test-NetConnection &lt;IP_ADDRESS&gt; -Port &lt;PORT_NUMBER&gt;<\/code><\/pre>\n\n\n\n<p>Test-NetConnection &gt; cmdlet yang digunakan untuk melakukan diagnosa koneksi jaringan, misalnya port scanning. Command ini bisa disingkat menjadi &#8220;tnc&#8221;.<br>-Port &gt; adalah parameter untuk memasukkan port yang ingin kita scan. Parameter ini bisa disingkat menjadi -p saja.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Contoh Test-NetConnection 1<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"864\" height=\"265\" src=\"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-true.png\" alt=\"\" class=\"wp-image-11704\" srcset=\"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-true.png 864w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-true-300x92.png 300w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-true-768x236.png 768w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-true-50x15.png 50w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-true-60x18.png 60w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-true-100x31.png 100w\" sizes=\"(max-width: 864px) 100vw, 864px\" \/><\/figure>\n\n\n\n<p>Pada contoh ini kita melakukan scan ke port 443 IP 103.XXX.XXX.XXX. &#8220;TcpTestSucceeded : True&#8221; artinya status port 443 pada IP tersebut adalah open.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Contoh Test-NetConnection 2<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"866\" height=\"315\" src=\"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-false.png\" alt=\"\" class=\"wp-image-11705\" srcset=\"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-false.png 866w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-false-300x109.png 300w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-false-768x279.png 768w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-false-50x18.png 50w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-false-60x22.png 60w, https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/tnc-false-100x36.png 100w\" sizes=\"(max-width: 866px) 100vw, 866px\" \/><\/figure>\n\n\n\n<p>Pada contoh ini kita menggunakan singkatan dari cmdlet Test-NetConnection, yaitu &#8220;tnc&#8221;, dan juga singkatan dari parameter -Port, yaitu &#8220;-p&#8221;. &#8220;TcpTestSucceeded : False&#8221; menunjukkan bahwa status port yang kita scan adalah closed\/timeout.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Kesimpulan<\/h2>\n\n\n\n<p>Untuk memahami bagaimana cara port scanning bekerja, maka kita sangat perlu untuk terlebih dahulu memahami bagaimana cara kerja TCP, dan bagaimana packet itu berpindah dari satu poin ke poin yang lain di dalam suatu jaringan.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0628\u0650\u0633\u0652\u0645\u0650 \u0627\u0644\u0644\u064e\u0651\u0647\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0652\u0645\u064e\u0646\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0650\u064a\u0652\u0645 Introduction Tujuan dari port scanning adalah untuk mengetahui apakah port (terutama port TCP) tertentu pada suatu end-point statusnya open, closed, atau filtered. Open artinya port tersebut akan merespon connection request. Closed artinya port tersebut menolak (refused) connection request. Sedangkan filtered artinya ada firewall yang mem-block packet&#8230;<\/p>\n","protected":false},"author":22,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"ht-kb-category":[],"ht-kb-tag":[195,193,194,196,197,192],"class_list":["post-11684","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_tag-linux","ht_kb_tag-netcat","ht_kb_tag-nettcpip","ht_kb_tag-port","ht_kb_tag-scan","ht_kb_tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Port Scanning Menggunakan Netcat dan NetTCPIP - CBTP Knowledgebase<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cbtp.co.id\/kb\/knowledge-base\/port-scanning-menggunakan-netcat-dan-nettcpip\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Port Scanning Menggunakan Netcat dan NetTCPIP - CBTP Knowledgebase\" \/>\n<meta property=\"og:description\" content=\"\u0628\u0650\u0633\u0652\u0645\u0650 \u0627\u0644\u0644\u064e\u0651\u0647\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0652\u0645\u064e\u0646\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0650\u064a\u0652\u0645 Introduction Tujuan dari port scanning adalah untuk mengetahui apakah port (terutama port TCP) tertentu pada suatu end-point statusnya open, closed, atau filtered. Open artinya port tersebut akan merespon connection request. Closed artinya port tersebut menolak (refused) connection request. Sedangkan filtered artinya ada firewall yang mem-block packet...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cbtp.co.id\/kb\/knowledge-base\/port-scanning-menggunakan-netcat-dan-nettcpip\/\" \/>\n<meta property=\"og:site_name\" content=\"CBTP Knowledgebase\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/cybertechtonic\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-11T07:37:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-suceeded.png\" \/>\n\t<meta property=\"og:image:width\" content=\"478\" \/>\n\t<meta property=\"og:image:height\" content=\"49\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/knowledge-base\\\/port-scanning-menggunakan-netcat-dan-nettcpip\\\/\",\"url\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/knowledge-base\\\/port-scanning-menggunakan-netcat-dan-nettcpip\\\/\",\"name\":\"Port Scanning Menggunakan Netcat dan NetTCPIP - CBTP Knowledgebase\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/knowledge-base\\\/port-scanning-menggunakan-netcat-dan-nettcpip\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/knowledge-base\\\/port-scanning-menggunakan-netcat-dan-nettcpip\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/netcat-suceeded.png\",\"datePublished\":\"2024-10-11T02:53:41+00:00\",\"dateModified\":\"2024-10-11T07:37:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/knowledge-base\\\/port-scanning-menggunakan-netcat-dan-nettcpip\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/knowledge-base\\\/port-scanning-menggunakan-netcat-dan-nettcpip\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/knowledge-base\\\/port-scanning-menggunakan-netcat-dan-nettcpip\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/netcat-suceeded.png\",\"contentUrl\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/netcat-suceeded.png\",\"width\":478,\"height\":49},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/knowledge-base\\\/port-scanning-menggunakan-netcat-dan-nettcpip\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Port Scanning Menggunakan Netcat dan NetTCPIP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/#website\",\"url\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/\",\"name\":\"CBTP Knowledgebase\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/#organization\",\"name\":\"Cybertechtonic Pratama\",\"url\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/cbtp_small.png\",\"contentUrl\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/cbtp_small.png\",\"width\":512,\"height\":512,\"caption\":\"Cybertechtonic Pratama\"},\"image\":{\"@id\":\"https:\\\/\\\/cbtp.co.id\\\/kb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/facebook.com\\\/cybertechtonic\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Port Scanning Menggunakan Netcat dan NetTCPIP - CBTP Knowledgebase","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cbtp.co.id\/kb\/knowledge-base\/port-scanning-menggunakan-netcat-dan-nettcpip\/","og_locale":"en_US","og_type":"article","og_title":"Port Scanning Menggunakan Netcat dan NetTCPIP - CBTP Knowledgebase","og_description":"\u0628\u0650\u0633\u0652\u0645\u0650 \u0627\u0644\u0644\u064e\u0651\u0647\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0652\u0645\u064e\u0646\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0650\u064a\u0652\u0645 Introduction Tujuan dari port scanning adalah untuk mengetahui apakah port (terutama port TCP) tertentu pada suatu end-point statusnya open, closed, atau filtered. Open artinya port tersebut akan merespon connection request. Closed artinya port tersebut menolak (refused) connection request. Sedangkan filtered artinya ada firewall yang mem-block packet...","og_url":"https:\/\/cbtp.co.id\/kb\/knowledge-base\/port-scanning-menggunakan-netcat-dan-nettcpip\/","og_site_name":"CBTP Knowledgebase","article_publisher":"http:\/\/facebook.com\/cybertechtonic","article_modified_time":"2024-10-11T07:37:07+00:00","og_image":[{"width":478,"height":49,"url":"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-suceeded.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cbtp.co.id\/kb\/knowledge-base\/port-scanning-menggunakan-netcat-dan-nettcpip\/","url":"https:\/\/cbtp.co.id\/kb\/knowledge-base\/port-scanning-menggunakan-netcat-dan-nettcpip\/","name":"Port Scanning Menggunakan Netcat dan NetTCPIP - CBTP Knowledgebase","isPartOf":{"@id":"https:\/\/cbtp.co.id\/kb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cbtp.co.id\/kb\/knowledge-base\/port-scanning-menggunakan-netcat-dan-nettcpip\/#primaryimage"},"image":{"@id":"https:\/\/cbtp.co.id\/kb\/knowledge-base\/port-scanning-menggunakan-netcat-dan-nettcpip\/#primaryimage"},"thumbnailUrl":"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-suceeded.png","datePublished":"2024-10-11T02:53:41+00:00","dateModified":"2024-10-11T07:37:07+00:00","breadcrumb":{"@id":"https:\/\/cbtp.co.id\/kb\/knowledge-base\/port-scanning-menggunakan-netcat-dan-nettcpip\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cbtp.co.id\/kb\/knowledge-base\/port-scanning-menggunakan-netcat-dan-nettcpip\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cbtp.co.id\/kb\/knowledge-base\/port-scanning-menggunakan-netcat-dan-nettcpip\/#primaryimage","url":"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-suceeded.png","contentUrl":"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2024\/10\/netcat-suceeded.png","width":478,"height":49},{"@type":"BreadcrumbList","@id":"https:\/\/cbtp.co.id\/kb\/knowledge-base\/port-scanning-menggunakan-netcat-dan-nettcpip\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cbtp.co.id\/kb\/"},{"@type":"ListItem","position":2,"name":"Port Scanning Menggunakan Netcat dan NetTCPIP"}]},{"@type":"WebSite","@id":"https:\/\/cbtp.co.id\/kb\/#website","url":"https:\/\/cbtp.co.id\/kb\/","name":"CBTP Knowledgebase","description":"","publisher":{"@id":"https:\/\/cbtp.co.id\/kb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cbtp.co.id\/kb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cbtp.co.id\/kb\/#organization","name":"Cybertechtonic Pratama","url":"https:\/\/cbtp.co.id\/kb\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cbtp.co.id\/kb\/#\/schema\/logo\/image\/","url":"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2019\/10\/cbtp_small.png","contentUrl":"https:\/\/cbtp.co.id\/kb\/wp-content\/uploads\/2019\/10\/cbtp_small.png","width":512,"height":512,"caption":"Cybertechtonic Pratama"},"image":{"@id":"https:\/\/cbtp.co.id\/kb\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/cybertechtonic"]}]}},"_links":{"self":[{"href":"https:\/\/cbtp.co.id\/kb\/wp-json\/wp\/v2\/ht-kb\/11684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cbtp.co.id\/kb\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/cbtp.co.id\/kb\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/cbtp.co.id\/kb\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/cbtp.co.id\/kb\/wp-json\/wp\/v2\/comments?post=11684"}],"version-history":[{"count":4,"href":"https:\/\/cbtp.co.id\/kb\/wp-json\/wp\/v2\/ht-kb\/11684\/revisions"}],"predecessor-version":[{"id":11712,"href":"https:\/\/cbtp.co.id\/kb\/wp-json\/wp\/v2\/ht-kb\/11684\/revisions\/11712"}],"wp:attachment":[{"href":"https:\/\/cbtp.co.id\/kb\/wp-json\/wp\/v2\/media?parent=11684"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/cbtp.co.id\/kb\/wp-json\/wp\/v2\/ht-kb-category?post=11684"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/cbtp.co.id\/kb\/wp-json\/wp\/v2\/ht-kb-tag?post=11684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}