Claim Missing Document
Check
Articles

Found 2 Documents
Search

Forensik Web Layanan Instant Messaging Menggunakan Metode Association of Chief Police Officers Riadi, Imam; Umar, Rusydi; Aziz, Muhammad Abdul
Mobile and Forensics Vol 1, No 1 (2019)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v1i1.705

Abstract

Aplikasi instant messaging khususnya yang terdapat layanan berbasis web, sangat memungkinkan untuk dijadikan sasaran oleh para pelaku tindak kejahatan digital atau cybercrime. Vulnerabilitas dari aplikasi instant messaging berbasis web dapat dieksploitasi oleh pihak-pihak yang tidak bertanggung jawab untuk melakukan tindak kejahatan digital. Penelitian ini difokuskan pada tahapan-tahapan investigasi forensik kasus tindak kejahatan digital yang terjadi di layanan berbasis web aplikasi instant messaging WhatsApp, LINE dan Telegram. Metode yang digunakan dalam penelitian ini merujuk pada metode Association of Chief Police Officers dengan alur plan, capture, analyse dan present. Penelitian ini dalam proses investigasi forensiknya berhasil didapatkan artifact dari layanan berbasis web aplikasi instant messaging. Alat atau tools investigasi forensik yang digunakan dalam penelitian ini adalah FTK imager, NetWitness Investigator, dan Wireshark. Tingkat kerberhasilan penelitian ini mencapai 40% pada aplikasi Telegram, 60% untuk aplikasi LINE, dan aplikasi WhatsApp yang menduduki pringkat tertinggi dengan tingkat keberhasilan sebesar 85%.
Vulnerability Assessment of Vehicle Keyless Entry Systems Using the PTES Methodology Ulil Akbar; Muhammad Abdul Aziz; Donna Setiawati; Yusuf Eko Rohmadi
Jurnal Penelitian Pendidikan IPA Vol 11 No 8 (2025): August
Publisher : Postgraduate, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jppipa.v11i8.11887

Abstract

The growing adoption of keyless entry systems in motor vehicles introduces new challenges in the security of radio-based communication. This study aims to identify and evaluate the vulnerability level of the keyless entry system on the Honda PCX 150 motorcycle against two types of man-in-the-middle-based attacks: replay attack and relay attack. Using the Penetration Testing Execution Standard (PTES) methodology, the study establishes a seven-stage testing procedure, from pre-engagement to reporting. Experiments were conducted using Flipper Zero as the main device, supported by GNU Radio, Software Defined Radio (SDR), and Universal Radio Hacker (URH). Each type of attack was tested 25 times. The results showed a 44% Success rate for the replay attack and 48% for the relay attack. Further analysis revealed that Success occurred not only on repeated frequencies but also on single-occurrence frequencies, with effectiveness rates of 50% and 45%, respectively. These findings indicate the absence of security mechanisms such as rolling code, time or location-based validation, and frequency hopping, allowing intercepted signals to be accepted by the vehicle. The study concludes that the Honda PCX 150's keyless entry system has significant security gaps, potentially exploitable using passive tools. It recommends the implementation of dynamic authentication mechanisms and cryptographic technologies to enhance the security of vehicular radio signal transmissions.