IMPLEMENTASI FRAMEWORK MITM (MAN IN THE MIDDLE ATTACK) UNTUK MEMANTAU AKTIFITAS PENGGUNA DALAM SATU JARINGAN
Abstract
Keywords
Full Text:
PDF (Bahasa Indonesia)References
S. W, “BSSN dan Peta Keamanan Siber Indonesia” 05 Maret 2018.[Online]. Available: https://inet.detik.com/cyberlife/d-3899799/bssn-dan-peta-keamanan-siber-indonesia. [Diakses 10 Februari 2019]
I. Yuliana., 2019. “Adopsi Social Network Analysis (Sna) Dalam Upaya Membangun Ketangguhan Bencana Di Masyarakat,” JIKO (Jurnal Inform. dan Komputer), vol. 2, no. 2, pp. 49–54.
D. Saputra and I. Riadi, “Network Forensics Analysis of Man in the Middle Attack Using Live Forensics Method,” International Journal of Cyber-Security and Digital Forensics, vol. 8, no. 1, pp. 66–73, 2019, doi: 10.17781/p002558.
Pratama, I Putu AE, S.T., M.T.2015. Handbook Jaringan Komputer Teori dan Praktik Berbasiskan Open Source. Bandung: Informatika.
G. N. Nayak and S. G. Samaddar, 2010. “Different flavours of Man-In-The-Middle attack, consequences and feasible solutions,” Proc. - 3rd IEEE Int. Conf. Comput. Sci. Inf. Technol. ICCSIT 2010, vol. 5, pp. 491–495, 2010.
Kamajaya, Gede.E.A, Riadi,I., Prayudi.P, Imam Riadi Analisa Investigasi Static Forensics Serangan Man In The Middle Berbasis ARP Poisoning. JIKO (Jurnal Informatika dan Komputer) Akreditasi KEMENRISTEKDIKTI, Vol. 3, No. 1, April 2020, hlm. 6-12 DOI: 10.33387/jiko
Github (2019, Feb.10) Framework for Man-In-The-Middle attacks [Online]. Available: https://github.com/byt3bl33d3r/MITMF
Setiyadi, A. 2017. “Implementasi Modul Network MITM Pada Websploit sebagai Monitoring Aktifitas Pengguna dalam Mengakses Internet”.Prosiding Seminar Nasional Komputer dan Informatika (SENASKI).
Muhammad, IZ, Moch Fahru Rizal, S.T., M.T, Mia Rosmiati, S.Si, M.T.2017. “Implementasi BadUSB MITM Attacks Menggunakan Remote Penetrastion Test Pada Kali NetHunter”. e-Proceeding of Applied Science.3(3): 1902.
Shubh, T, M.Tech(CE), Shweta Sharma.2016. “Man-In-The-Middle-Attack Prevention Using HTTPS and SSL”. International Journal of Computer Science and Mobile Computing.5(6): 569-579.
DOI: http://dx.doi.org/10.30811/jim.v7i1.2966
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 Mohamad Arie Ajharie, Mulia Sulistiyono