Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Jurnal Algoritma

Eksploitasi Broken Access Control Untuk Eskalasi Hak Akses Pada LMS Universitas XYZ Muhammad, Azri; Hadiana, Asep Id; Ilyas, Ridwan
Jurnal Algoritma Vol 22 No 2 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-2.2287

Abstract

This study aims to identify and exploit security vulnerabilities in the Learning Management System (LMS) of a university, with a primary focus on Broken Access Control (BAC) flaws resulting from misconfigurations in user access settings. With the rising threat of data breaches, this research also analyzes the extent to which security principles are applied to protect sensitive LMS user data—an increasingly critical issue in the digital era.The research approach began with the signing of a Non-Disclosure Agreement (NDA) to ensure the confidentiality of information, followed by an analysis of existing vulnerability assessment reports. Penetration testing was then conducted to identify potential unauthorized privilege escalation and further exploitation of vulnerabilities within the system. The analysis revealed a BAC vulnerability that allowed attackers to modify user roles without authorization. Additionally, it identified the use of the outdated MD5 hashing algorithm and the insecure storage of sensitive data on the client side without proper encryption. The exploitation of these vulnerabilities demonstrated that an attacker could gain administrator access simply by manipulating user roles, thereby enabling access to over 117,000 user records, including personal information and health history.This research contributes in three main aspects: first, an in-depth identification of critical vulnerabilities within the LMS, particularly concerning weak access control and inadequate data protection; second, a demonstration of how BAC exploitation can lead to the leakage of sensitive data in higher education environments; and third, the provision of mitigation recommendations based on current security best practices, such as the implementation of Role-Based Access Control (RBAC), the principle of least privilege, stricter role validation, Zero Trust Architecture, and the integration of artificial intelligence (AI) to detect threats early and provide automated responses to potential attacks.It is expected that this research can serve as a guideline for educational institutions in strengthening LMS security systems and more effectively protecting user data.
Pemanfaatan Open-Source Intelligence untuk Deteksi dan Penanganan Cybercrime Judi Online Berbasis Forensik Digital Ramdani, Maullidan Alfa Rizki Fikri; Hadiana, Asep Id; Ilyas, Ridwan
Jurnal Algoritma Vol 22 No 2 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-2.2314

Abstract

The phenomenon of cybercrime related to online gambling is increasing in Indonesia, with web defacement attacks and backdoor insertion on websites that damage the psychological aspects of players and the family economy. This research aims to identify and analyze the threats posed by online gambling through Open-Source Intelligence (OSINT) and penetration testing methods. Using the Google Dorking technique, OSINT successfully identified sites involved in online gambling, while penetration testing uncovered system weaknesses that perpetrators exploit, such as SQL Injection and Cross-Site Scripting (XSS), which allow backdoor insertion. The results of this study demonstrate the effectiveness of OSINT and penetration testing in identifying sites that are vulnerable to attacks as well as loopholes that are often exploited by perpetrators. In addition, this research highlights the importance of digital forensics in handling legitimate electronic evidence for the court. As a scientific contribution, this research proposes the development of more accurate backdoor detection tools, the improvement of web security systems, as well as the implementation of rapid response in dealing with online gambling threats. This research is expected to assist the government and society in addressing cybercrime threats in Indonesia and strengthen policies and strategies to protect digital infrastructure.
Pengembangan Aplikasi Multimedia untuk Edukasi Sejarah pada Zaman Megalitikum Di Indonesia pada Platform Mobile Ihsan, Aminuddin; Yuniarti, Rezki; Ilyas, Ridwan
Jurnal Algoritma Vol 22 No 2 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-2.2522

Abstract

This research developed a two-dimensional (2D) educational game themed on the history of the Megalithic Age in Indonesia for mobile platforms using the Rapid Prototyping method and Unity Engine. The aim was to provide interactive learning media that combines historical narratives with exploration-based game mechanics and puzzle solving. The development process included visual asset design, prototyping, and alpha and beta testing. Beta testing involved 20 respondents from junior high and high school levels, resulting in a satisfaction rate of 71.5% (Agree category) based on the Likert Scale, which indicates positive acceptance of the gameplay and educational content. The limitations of the study include the scope of historical material, which only covers the early Megalithic period, the limited number of respondents, and the difficulty level adjustment, which is not yet optimal for all age groups. Further development is recommended to expand the variety of missions, enrich historical content with the latest research references, and add analytical features to monitor user learning achievements.
Implementasi Yolo Untuk Menghitung Kepadatan Kendaraan Tempat Parkir Hidayat, Ferdian Afza; Umbara, Fajri Rakhmat; Ilyas, Ridwan
Jurnal Algoritma Vol 22 No 2 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-2.2919

Abstract

The significant increase in the number of vehicles entering the Universitas Jenderal Achmad Yani area—especially after the construction of the Faculty of Science and Informatics building—has caused congestion at several strategic points on campus, including the area in front of the campus mosque. This study aims to develop a real-time vehicle density monitoring system to support more efficient campus traffic management. The method used involves applying the YOLOv5 object detection algorithm to identify and count vehicles from video recordings in selected monitoring areas. The system is designed to deliver fast and accurate detection while providing real-time vehicle density information. Testing results show that the system achieved strong detection performance, with a maximum precision value of 1.00 at a confidence threshold of 0.983. The maximum recall value of 0.90 was obtained at a lower confidence threshold, reflecting the system’s ability to detect most objects present. These findings highlight the trade-off between model confidence in predictions and its ability to avoid missing relevant objects. The contribution of this study is the development of a prototype system capable of automatically and in real time monitoring vehicle density in campus areas. This system has the potential to become part of a smarter, data-driven campus traffic management solution to reduce congestion and improve the comfort and mobility of the academic community.
Co-Authors Achmad Aziz Adriana, Reyhan Agung Besti Agus Komarudin Akbar, Tzazkia Febriyana Aminuddin Ihsan, Aminuddin Ari Sri Windyaswari Ari Sri Windyaswari, Ari Sri Ariq Irawan, Muhamad Asendra, Irfan Asep Saepul Ridwan Ashaury, Herdy Aziz, Achmad Azmira Mifti Harjana Besti, Agung Chandani Nurul Hafizah Destri Wulansari Dhimas Ariya Wibiksana Djamal, Esmeralda Contesa Dwi Hendratmo Widyantoro Dwifani, Bella Melati Wiranur Eddie Khrisna Putra Eriyadi, Maulidina Norick Esmeralda C Djamal Esmeralda C Djamal Esmeralda C. Djamal Esmeralda C. Djamal Esmeralda Contessa Djamal Fadhilahsyah Ramadhan, Muhammad Diky Fahrauk Faramayuda, Fahrauk Fajri Rakhmat Umbara Fajri Umbara Fatimah Indrianti, Nisa Fitri Nur Suciani Gunawan Abdillah Gunawan Abdillah, Gunawan Hadiana, Asep Id Hidayat, Ferdian Afza Iqbal Prayoga Willyana Ismail, Nursafira Khairunnisa Iyan Taufik Hidayat Janjan Nurjaman Kania Ningsih, Ade Kasyidi, Fatan Luthfi Ahmad Fadhil Masayu Leylia Khodra Maulidina Norick Eriyadi Melina Melina Muhamad Ramdan, Muhamad Muhamad Rizal Firmansyah Muhammad Ramdhani, Muhammad Muhammad, Azri Naufal Akhfasy, Muhammad Neneng Nurhamidah NIDA MUTHI ANNISA Nur Shabrina, Nariswari Nurhamidah, Neneng Nursafira Khairunnisa Ismail Nurul S, Puspita Nurul Sabrina, Puspita Paramita, Veronika Santi Purnama Ginandjar, Ichas Putra, Dion Revaldy Putri, Dhiffa Namira Alifia Ramdani, Maullidan Alfa Rizki Fikri Ramdhan, Edvin Resa Abdilah Reyhan Adriana Deris Reza Dwi Putra Reza Indrawan Rezki Yuniarti Rezky Yuniarti ridwan fauzi Rifaz Muhammad Sukma Rizka Khoirunnisa Guntina Rizki Kurniawan, Moch. Sopian, Annisa Mufidah Susilowati, Merliana Tri Syarafina, Fildzah Tzazkia Febriyana Akbar Wildan Pratama Wina Witanti Yamina Azmi Yoga Esa Mahendra Yulison Herry Chrisnanto Yustiana Fauziyah