Claim Missing Document
Check
Articles

Found 1 Documents
Search

Implementasi Pengamanan Jaringan Dengan Teknik Penetration Testing Menggunakan Metode Deauther Dan Evil Twin Pada Wireless Tl-WR840N Eka Rahmat Mauluddin; Teti Desyani
OKTAL : Jurnal Ilmu Komputer dan Sains Vol 3 No 04 (2024): OKTAL : Jurnal Ilmu Komputer Dan Sains
Publisher : CV. Multi Kreasi Media

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computer networks are growing very rapidly, both in commercial institutions, in the academic world, and even in people's homes that need internet access. The internet is accessed by many people without exception to hackers and crackers. Various network security issues are currently very important and deserve attention. A network connected to the internet is basically insecure and can always be exploited by hackers, both wired LAN and wireless LAN networks. During the process of sending data, it will pass through several terminals to arrive at the destination, which means it will provide an opportunity for other users who are not responsible to intercept or change the data. In this case, it is necessary to implement network security with penetration testing techniques using the Deauther and evil twin methods on the Tl-WR840N wireless. The results of the analysis obtained after testing with the Deauther and Evil twin methods are that this method is very effective in hacking Wi-Fi networks that are not encrypted or protected with weak passwords. In testing the Deauther and Evil Twin methods managed to hack the Wi-Fi network with a fairly high success rate. Therefore, it is very important for WiFi network users to maintain their security by using the right security technologies, such as using strong passwords and data encryption.