Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Building of Informatics, Technology and Science

Analisis Malicious Software Trojan Downloader Pada Android Menggunakan Teknik Reverse Engineering (Studi Kasus: Kamus Kesehatan v2.apk) Putra, Andriyan Dwi; Santoso, Joko Dwi; Ardiansyah, Ipung
Building of Informatics, Technology and Science (BITS) Vol 4 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1094.745 KB) | DOI: 10.47065/bits.v4i1.1515

Abstract

The development of smartphone technology with the Android platform has made very rapid progress. Smartphones help and facilitate daily human work such as communicating, shopping, and financial transactions. However, because android is an open- source system, anyone can easily develop android applications that can be downloaded on the android app market. Including applications that have been inserted by malware by application developers, one of which is the Trojan downloader malware. The analysis was carried out by implementing the Trojan downloader malware infection in the health dictionary application using the reverse engineering method. Trojan downloader malware infection uses metasploit framework tools. The application will be infected with the payload created from the metasploit framework. This study will analyze the health dictionary application before and after being infected with the Trojan downloader malware using the reverse engineering method. The results of the analysis on the health dictionary application found that the difference in the size of the application was 10.17 MB, which previously was 10.05 MB. Of course, by changing the file size, the SHA256 hashing changes automatically. In the permissions section, it was found that there were only 9 permissions before being infected, but after being infected, we found 18 additional permissions, bringing the total to 27 permissions
Implementasi VPN Menggunakan Metode Point to Point Tunneling Protocol Andriani, Ria; Sa’di, Ahmad; Putra, Andriyan Dwi
Building of Informatics, Technology and Science (BITS) Vol 4 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (654.653 KB) | DOI: 10.47065/bits.v4i1.1611

Abstract

The XYZ office is a government agency covering various fields, ranging from government, economy, development, people's welfare, community life development and public service affairs. However, work activities in agencies were disrupted due to the COVID-19 pandemic which caused the government to impose a Large-Scale Social Restriction (PSBB) policy to suppress the spread of this virus, resulting in agency workers having to work from home. Therefore we need an appropriate means to be able to support these activities. One of them is making a technology design by implementing a VPN on a proxy router with the PPTP (Point to Point Tunnelling Protocol) method so that it can make it easier for employees to communicate without thinking about location. In addition, users can still remotely access the local network even though they are outside the office network. more secure. Based on the results of testing the network security at the XYZ Office before using the VPN Server, it proved that the wiretapping attackers could still obtain data in the form of website login information, proxy logins, or view data contents when exchanging data. Meanwhile, when the user connects to the VPN Server, the eavesdropper cannot see the contents of the data in it, then with the implementation of a VPN with the PPTP method, employees who are working from home can connect and communicate well with each other, with that work and information exchange will become more flexible and faster