Claim Missing Document
Check
Articles

Found 7 Documents
Search

Live forensics of tools on android devices for email forensics Rusydi Umar; Imam Riadi; Bashor Fauzan Muthohirin
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.11748

Abstract

Email is one communication technology that can be used to exchange information, data, and etc. The development of email technology not only can be opened using a computer but can be opened using an smartphone. The most widely used smartphone in Indonesian society is Android. Within a row, the development technology of higher cybercrime such as email fraud catching cybercrime offenders need evidence to be submitted to a court, for obtain evidence can use tools like Wireshark and Networkminer to analyzing network traffic on live networks. Opportunity, we will do a comparison of the forensic tools it to acquire digital evidence. The subject of this research focused on Android-based email service to get as much digital evidence as possible on both tools. This process uses National Institute of Standards and Technology method. The results of this research that networkminer managed to get the receiving port, while in Wireshark not found.
Acquisition of Email Service Based Android Using NIST Rusydi Umar; Imam Riadi; Bashor Fauzan Muthohirin
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 3, August 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1004.832 KB) | DOI: 10.22219/kinetik.v3i3.637

Abstract

Email is one of the results of the development of information and communication technology. Email is widely used to exchange information by sending and receiving data, such as document files, images, correspondence and others. With the development of technology and information causing crimes in communicating also growing, the perpetrators of cyber crime commonly referred to as cybercrime. Any crime committed by cybercrime will surely leave the evidence, in this study will make the acquisition of android-based email using the method of national institute of standards and technology (NIST). The results obtained IP address of the sender's email header as digital evidence.
PENERAPAN TOOLS JADX PADA SERANGAN MALWARE BERBASIS ANDROID MENGGUNAKAN METODE NIST : STUDI KASUS UNDANGAN.APK Muthohirin, Bashor Fauzan; Nasuhah, Alfin Zahrotun; Akbi, Denar Regata
Syntax : Journal of Software Engineering, Computer Science and Information Technology Vol 5, No 2 (2024): Desember 2024
Publisher : Universitas Dharmawangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46576/syntax.v5i2.5489

Abstract

Perkembangan teknologi smartphone dengan sistem operasi Android yang pesat telah membuat pengguna menghabiskan rata-rata 5,3 jam per hari. Hal tersebut menjadikan smartphone dengan sistem operasi Android rentan terhadap ancaman malware, termasuk serangan melalui aplikasi berbahaya seperti Undang.apk yang didistribusikan melalui pesan WhatsApp. Serangan ini menggunakan teknik sosial engineering untuk melakukan menipuan, mencuri data pribadi, dan menyebabkan kerugian material kepada korban. Penelitian ini bertujuan untuk menganalisis malware Undang.apk menggunakan metode forensik NIST, Proses awal investigasi dilakukan dengan melakukan akuisisi barang bukti digital menggunakan MOBILedit Forensic Tool, identifikasi malware melalui VirusTotal, serta analisis struktur kode APK menggunakan JADX GUI. Hasil penelitian menunjukkan bahwa malware tersebut memanfaatkan izin berbahaya untuk membaca dan mengirim pesan korban ke bot Telegram milik pelaku. Laporan akhir menyajikan temuan penting yang tidak hanya dapat digunakan sebagai bukti dalam proses hukum, tetapi juga sebagai panduan mitigasi untuk mencegah ancaman serupa di masa mendatang. Kata Kunci: Malware, Android, JADX, Forensics, NIST.  ABSTRACT The rapid development of smartphone technology with the Android operating system has made users spend an average of 5.3 hours per day. This makes smartphones with the Android operating system vulnerable to malware threats, including attacks through malicious applications such as Undang.apk which are distributed via WhatsApp messages. This attack uses social engineering techniques to commit fraud, steal personal data, and cause material losses to victims. This study aims to analyze the Undang.apk malware using the NIST forensic method. The initial investigation process was carried out by acquiring digital evidence using the MOBILedit Forensic Tool, identifying malware through VirusTotal, and analyzing the APK code structure using JADX GUI. The results of the study showed that the malware utilized dangerous permissions to read and send victim messages to the perpetrator's Telegram bot. The final report presents important findings that can not only be used as evidence in legal proceedings, but also as a mitigation guide to prevent similar threats in the future. Keywords: Malware, Android, JADX, Forensics, NIST.
ANALYSIS INVESTIGASI FORENSIK OPTICAL DISC MENGGUNAKAN STANDAR NIST (NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY) Salam, Fajar Mayda; Muthohirin, Bashor Fauzan; Sari, Zamah
Kohesi: Jurnal Sains dan Teknologi Vol. 7 No. 2 (2025): Kohesi: Jurnal Sains dan Teknologi
Publisher : CV SWA Anugerah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.3785/kohesi.v7i2.11168

Abstract

Digital forensic investigation is a crucial process in collecting, analyzing, and presenting digital evidence that can be used in law enforcement. One type of storage media that is often used as an object of investigation is optical drives, such as CDs, DVDs, and Blu-rays. This study discusses the application of the National Institute of Standards and Technology (NIST) standard method in the forensic analysis of optical drives. The methodology used includes the stages of identification, acquisition, analysis, and reporting, all of which are in accordance with NIST guidelines. Through the application of the NIST method, this study highlights the reliability and accuracy of the procedure in ensuring the integrity of digital evidence from optical drives. This study also discusses challenges that are often faced in the forensic process, such as physical damage to the media and data encryption. The results of the study show that a systematic approach based on NIST standards can improve the accuracy and validity of the investigation results. Thus, the application of this standard is very important to support the credibility of digital evidence in court. Investigasi forensik digital merupakan proses krusial dalam pengumpulan, analisis, dan penyajian bukti digital yang dapat digunakan dalam penegakan hukum. Salah satu jenis media penyimpanan yang sering dijadikan objek investigasi adalah optical drive, seperti CD, DVD, dan Blu-ray. Penelitian ini membahas penerapan metode standar National Institute of Standards and Technology (NIST) dalam analisis forensik optical drive. Metodologi yang digunakan mencakup tahapan identifikasi, akuisisi, analisis, dan pelaporan, yang semuanya sesuai dengan pedoman NIST. Melalui penerapan metode NIST, penelitian ini menyoroti keandalan dan ketepatan prosedur dalam memastikan integritas bukti digital dari optical drive. Studi ini juga membahas tantangan yang sering dihadapi dalam proses forensik, seperti kerusakan fisik media dan enkripsi data. Hasil penelitian menunjukkan bahwa pendekatan sistematis berdasarkan standar NIST mampu meningkatkan akurasi dan validitas hasil investigasi. Dengan demikian, penerapan standar ini sangat penting untuk mendukung kredibilitas bukti digital di pengadilan.
ANALISIS DAN INVESTIGASI FORENSIK APLIKASI INSTAGRAM DAN THREADS DALAM MENDAPATKAN BUKTI DIGITAL MENGGUNAKAN METODE NIST 800-86 Pratama, Bagus Aryo Hany; Muthohirin, Bashor Fauzan; Sari, Zamah
Kohesi: Jurnal Sains dan Teknologi Vol. 7 No. 2 (2025): Kohesi: Jurnal Sains dan Teknologi
Publisher : CV SWA Anugerah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.3785/kohesi.v7i2.11169

Abstract

Digital violations such as the spread of pornographic content are increasing due to the growing prevalence of social media. Therefore, comprehending the potential of social media is crucial applications to store and provide relevant data. Accuracy and integrity in every stage of collecting, examining, analyzing, and reporting digital evidence are ensured by using NIST 800-86 techniques. To collect and analyze data from mobile devices, this study uses forensic tools such as Autopsy, MOBILedit Forensics, and FTK Imager. The focus of the study is the ability of forensic tools to find and collect reliable evidence. The study's findings demonstrate that these apps have the capacity to retain a variety of data kinds, including pictures, videos, and account details. It is expected that this will significantly help law enforcement against digital crimes. Pelanggaran digital seperti penyebaran konten pornografi meningkat sebagai akibat dari peningkatan penggunaan platform media sosial menjadi hal yang signifikan. Oleh sebab itu, memahami aspek-aspeknya menjadi sangat penting terutama kemampuan aplikasi media sosial untuk menyimpan dan memberikan data yang relevan. Akurasi dan integritas dalam setiap tahap pengumpulan, pemeriksaan, analisis, dan pelaporan bukti digital dijamin dengan menggunakan teknik NIST 800-86. Untuk mengumpulkan dan menganalisis data dari perangkat mobile, penelitian ini menggunakan alat forensik seperti Autopsy, MOBILe Edit Forensik, dan FTK Imager. Fokus penelitian adalah kemampuan alat forensik untuk menemukan dan mengumpulkan bukti yang dapat dipertanggungjawabkan. Hasil penelitian menunjukkan bahwa aplikasi ini memiliki kemampuan untuk menyimpan berbagai jenis data, seperti informasi akun, video, dan gambar. Ini diharapkan akan meningkatkan penegakan hukum terhadap kejahatan digital.
SISTEM INFORMASI MANAJEMEN PESERTA MAGANG PLN UP3 SIDOARJO MENGGUNAKAN METODE SDLC WATERFALL Maulana, Noordin Prasetyo; Suharso, Wildan; Muthohirin, Bashor Fauzan
Jurnal Informatika Vol 9, No 3 (2025): JIKA (Jurnal Informatika)
Publisher : University of Muhammadiyah Tangerang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31000/jika.v9i3.13914

Abstract

Dalam era digital yang terus berkembang, kebutuhan akan sistem informasi menjadi hal krusial dalam menunjang kegiatan administrasi dan operasional di berbagai instansi. PT. PLN (Persero) UP3 Sidoarjo selain bergerak di bidang jasa kelistrikan juga memberikan kesempatan para pelajar untuk merasakan seperti apa dunia kerja sebenarnya melalui kesempatan magang yang diberikan oleh perusahaan. Dalam pelaksanaan pendataan peserta magang selama ini pengelolaan dilakukan secara manual sehingga memunculkan berbagai kendala seperti duplikasi data, keterlambatan pencetakan sertifikat, dan kesulitan dalam pemantauan jumlah peserta magang yang aktif. Permasalahan ini mendorong dilakukannya penelitian untuk merancang dan membangun sistem informasi manajemen peserta magang yang mampu memfasilitasi proses pendataan peserta magang. Penelitian ini menggunakan metode Software Development Life Cycle (SDLC) model Waterfall, yang meliputi empat tahap utama: analisis, desain, pengkodean, pengujian sistem menggunakan metode black-box. Dalam rancang bangun yang telah dilakukan berhasil menghasilkan sebuah sistem yang dapat memenuhi seluruh kebutuhan pengguna.
Optimalisasi Jaringan MikroTik Dengan Menggunakan Load Balancing PCC dengan Pendekatan PPDIOO Ahmadi, Meisandi Naufal; Risqiwati, Diah; Muthohirin, Bashor Fauzan
Jurnal Algoritma Vol 22 No 2 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-2.2878

Abstract

The need for a stable and high-performance network is essential to support real-time data transmission. One common challenge faced is the effective management of two or more internet connections to avoid bottlenecks on a single link. This study aims to optimize network performance by implementing the Load Balancing PCC (Per Connection Classifier) method on Mikrotik routers to evenly distribute traffic load across two available ISP links. The research methodology used is PPDIOO (Prepare, Plan, Design, Implement, Operate, Optimize), an approach that encompasses all network management activities. The testing environment is simulated using PNETLab, with performance monitoring conducted using tools such as Zabbix Server Monitoring and Speedtest.net. The parameters tested include Quality of Services such as throughput, response time, bandwidth utilization, and traffic load distribution across each ISP link. The test results show that the application of the PCC method significantly improves network performance. The average throughput increased from 1.49 Mbps to 2.08 Mbps, response time decreased from 3.6 ms to 1.6 ms, and download bandwidth utilization increased from 0.43 Mbps to 0.96 Mbps. Furthermore, the traffic load, which was initially concentrated on a single ISP link, was successfully distributed evenly across both links, demonstrating that PCC load balancing is effective in balancing connections. Therefore, this method is highly recommended for network implementations that require high efficiency and stability in traffic management.