Claim Missing Document
Check
Articles

Found 4 Documents
Search

Analisis Forensik Jaringan Terhadap Serangan Spoofing Menggunakan Metode Network Forensic Development Life Cycle Latifah Iriani; Muhammad Nasir Hafizh
Jurnal Adijaya Multidisplin Vol 1 No 05 (2023): Jurnal Adijaya Multidisiplin (JAM)
Publisher : PT Naureen Digital Education

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penelitian ini bertujuan untuk menemukan informasi bukti serangan Address Resolution Protocol (ARP) Spoofing berupa alamat MAC address penyerang dan korban beserta waktu terjadinya serangan. Penelitian ini menggunakan tools wireshark untuk melihat lalu lintas jaringan, terutama pada protokol ARP dan menggunakan metode Network Foresnics Development Life Cycle (NFDLC) sebagai kerangka kerja selama proses simulasi sampai dengan pembuatan laporan barang bukti. Serangan ARP Spoofing dapat mengakibatkan terjadinya serangan lain, seperti Denial of Service dan Man in The Middle Attack, yang mana serangan ini memungkinkan pengguna tidak dapat mengakses kedalam jaringan dan terjadinya pencurian data. Pada tahapan simulasi dilakukan serangan kepada router dan komputer yang terhubung sehingga komunikasi data antara 2 perangkat ini akan melewati penyerang terlebih dahulu. Berdasarkan hasil pengujian yang dilakukan, berhasil ditemukan semua serangan ARP Spoofing yang terjadi pada jaringan dan diperoleh identitias IP Address dan MAC Address pelaku
Application of Data Recovery Tools in Flash Drive Forensic Data Acquisition Muhammad Immawan Aulia; Panggah Widiandana; Latifah Iriani; Muhammad Fauzan Gustafi; Muhammad Azam Hasani
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 2 No. 1 (2024): Multimedia Integration and computer networks in the Development of Modern Infor
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/mdcze668

Abstract

In this fast-paced digital era, flash drives have become one of the most popular storage methods. At times, flashdrive data can be lost, and losing this data can have significant consequences both professionally and personally. In this study, an example of data recovery from an inaccessible flashdrive after being forcibly removed during the data transfer process is discussed. Static forensic methods and the Disk Drill application succeeded in finding 7626 files from unallocated partitions with a total size of 17.3 GB. The digital evidence that has been recovered is 49 files which are presented in the form of files with various extensions, such as images, audio, documents and archives. Advanced data recovery tool capabilities enable recovery of various types of files, which increases the chances of rescuing lost data.  
Analisis forensik jaringan serangan ARP Spoofing menggunakan metode National Institute of Justice (NIJ) Latifah Iriani; Muhammad Nasir Hafizh; Khairina Eka Setyaputri
IT Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi Vol 4 No 2 (2025): IT-Explore Juni 2025
Publisher : Fakultas Teknologi Informasi, Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/itexplore.v4i2.2025.pp150-160

Abstract

This study aims to identify evidence of Address Resolution Protocol (ARP) Spoofing attacks in the form of the attacker's and victim's Media Access Control (MAC) addresses, as well as the time of the attack. With the increasing use of computer networks, ARP Spoofing attacks have become a serious threat that can lead to data theft, communication interception, and service disruption. ARP Spoofing can serve as a means to launch more complex attacks, such as Denial of Service (DoS) and Man in the Middle (MITM), which can cripple network systems and steal sensitive information. This study utilizes the Wireshark tool to monitor network traffic, specifically ARP, and applies the National Institute of Justice (NIJ) method as a framework for forensic investigation. The NIJ method was chosen because it provides a systematic approach to identifying, collecting, analyzing, and reporting digital evidence, enabling enhanced attack mitigation and supporting legal aspects in network security investigations. The specific approaches used in this forensic analysis include log analysis, packet capture and analysis using Wireshark, and traffic correlation to identify attack patterns based on time and involved devices. The attack simulation was conducted on Personal Computer (PC) 1 and a routerboard, where communication between these two devices was redirected through the attacker. Based on the test results, it was found that every device in the network experienced ARP Spoofing attacks, which could be detected and analyzed using the NIJ method. The contribution of this study is to provide a more systematic approach to forensic network investigations using the NIJ method, which not only aids in attack detection but also establishes a strong foundation for mitigation actions and legal enforcement in computer network security.
Application of Data Recovery Tools in Flash Drive Forensic Data Acquisition Muhammad Immawan Aulia; Panggah Widiandana; Latifah Iriani; Muhammad Fauzan Gustafi; Muhammad Azam Hasani
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 2 No. 1 (2024): Multimedia Integration and computer networks in the Development of Modern Infor
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v2i1.17

Abstract

In this fast-paced digital era, flash drives have become one of the most popular storage methods. At times, flashdrive data can be lost, and losing this data can have significant consequences both professionally and personally. In this study, an example of data recovery from an inaccessible flashdrive after being forcibly removed during the data transfer process is discussed. Static forensic methods and the Disk Drill application succeeded in finding 7626 files from unallocated partitions with a total size of 17.3 GB. The digital evidence that has been recovered is 49 files which are presented in the form of files with various extensions, such as images, audio, documents and archives. Advanced data recovery tool capabilities enable recovery of various types of files, which increases the chances of rescuing lost data.