ANALISA DAN PROBLEM SOLVING KEAMANAN ROUTER MIKROTIK RB750RA DAN RB750GR3 DENGAN METODE PENETRATION TESTING (STUDI KASUS: WARNET AULIA.NET, TANJUNG HARAPAN LAMPUNG TIMUR)

Authors

  • Arif Hidayat Universitas Muhammadiyah Metro Kota Metro, Indonesia
  • Ismail Puji Saputra UPT. PUSTIK, Universitas Muhammadiyah Metro

DOI:

https://doi.org/10.31598/jurnalresistor.v1i2.323

Keywords:

security mikrotik, winbox POC, mikrotik router, hacking, penetration testing

Abstract

Information and communication technology is something that is difficult to separate from human life in the present era. One example of information and communication technology is a network of proxy routers. This study uses the penetration testing method, which aims to analyze the security system of the proxy router that has been applied to Warnet Aulia.net. In analyzing network security, the Mikrotik Router is done by the method of penetration testing where the form of attacks on the network is simulated. In this study Python and Winboxpoc.py were successfully run on the Windows 10 operating system. The results of this study indicate that the network security owned by the Aulia.net cafe network still has many gaps to exploit. As for the results of some attacks, it shows serious things in terms of exploitation, such as the output of getting a proxy router password and username. Therefore, this study also provides a solution on how to prevent the mikrotik router from being exploited. Problem solving is explained using several alternative solutions, so that practitioners or network technicians are expected to be able to utilize knowledge related to the results of this study in order to secure the router.

Downloads

Download data is not yet available.

References

[1] Satwika, I. K. S., & Sukafona, I. M. (2018). Analisis Coverage Dan Quality Of Service Jaringan WiFi 2, 4 GHz Di STMIK STIKOM Indonesia. Jurnal RESISTOR (Rekayasa Sistem Komputer), 1(1), 1-7.

[2] Arta, Y., Syukur, A., & Kharisma, R. (2018). Simulasi Implementasi Intrusion Prevention System (IPS) Pada Router Mikrotik. IT JOURNAL RESEARCH AND DEVELOPMENT, 3(1), 94-104.

[3] Prayudi, Y., Si, S., & Kom, M. (2018). SIMULASI UNTUK PENINGKATAN KEAMANAN DATA PADA METAROUTER YANG SUDAH TEREKSPLOITASI (Master's thesis, Universitas Islam Indonesia).

[4] Amarudin, A. (2018). Desain Keamanan Jaringan Pada Mikrotik Router OS Menggunakan Metode Port Knocking. Jurnal Teknoinfo, 12(2), 35-38.

[5] Shaifullah, S. M. (2018). DESAIN FIREWALL TERHADAP SERANGAN DDOS PADA ROUTER MIKROTIK (Doctoral dissertation, Universitas Mercu Buana Yogyakarta).

[6] Kustanto, D., & Daniel, S. (2008). Membangun Server Internet Dengan Mikrotik OS. Yogyakarta: Gava Media Yogyakarta.

[7] Hidayat, A. (2017). BUILDING A EXPERT SYSTEM APPLICATION FOR HELP PROBLEM SOLVING NETWORK ON MIKROTIK ROUTER. MIKROTIK: Jurnal Manajemen Informatika, 6(1).

[8] Komputer, Wahana, (2009). Administrasi Jaringan dengan Ubuntu 9, Andi Offset, Yogyakarta.

[9] Lukas, Jonathan. (2006). Jaringan Komputer, Graha Ilmu, Jakarta.

[10] Hidayat, A. (2016). Panduan Belajar Mandiri Administrasi Server Jaringan Menggunakan Linux Ubuntu. Laduni Alifatama. Lampung (ISBN: 978-602-1397-56-5)

[11] Winarno dan Smitdev, (2014). Membuat Jaringan Komputer di Windows dan Linux, PT. Elex Media Komputindo, Jakarta.

[12] Hidayat, A. (2016). Implementasi Control Panel Hosting dengan VestaCP pada Server Intranet LAB Multimedia D-III Manajemen Informatika UM Metro. MIKROTIK: Jurnal Manajemen Informatika, 6(2).

[13] Norton Peters. (1999). Complete Guide to Networking. Sams, India.

[14] Sinarmata, Janner, (2006). Teknologi Komputer dan Informasi, Andi Offset, Yogyakarta.

[15] Hidayat, A. (2018). SISTEM PROTEKSI FAIL OVER DENGAN RSTP PADA SERVER ROUTER INTERNET FIKOM UM METRO BERBASIS MIKROTIK. SEMNASTEKNOMEDIA ONLINE, 6(1), 1-1.


[16] Sugeng, Winarno, (2015). Jaringan Komputer dengan TCP/IP, Modula.

[17] Hidayat, A. (2017). Konfigurasi Server Cloud Storage pada Jaringan LAN pada LAB Diploma III Manajemen Informatika UM Metro. MIKROTIK: Jurnal Manajemen Informatika, 7(1).

[18] Komputer, Wahana, (2013). Internet Aman & Sehat, Andi Offset, Yogyakarta.

[19] Hidayat, A., & Saputra, I. P. (2018). IMPLEMENTATION VOICE OVER INTERNET PROTOCOL (VOIP) AS A COMMUNICATION MEDIA BETWEEN UNIT AT UNIVERSITY MUHAMMADIYAH METRO. IJISCS (International Journal Of Information System and Computer Science), 2(2), 59-66.

[20] Sutanta, Edy, (2005). Komunikasi Data dan Jaringan, Graha Ilmu, Yogyakarta.

Downloads

Published

2018-10-28

How to Cite

Hidayat, A., & Saputra, I. P. (2018). ANALISA DAN PROBLEM SOLVING KEAMANAN ROUTER MIKROTIK RB750RA DAN RB750GR3 DENGAN METODE PENETRATION TESTING (STUDI KASUS: WARNET AULIA.NET, TANJUNG HARAPAN LAMPUNG TIMUR). Jurnal RESISTOR (Rekayasa Sistem Komputer), 1(2), 118-124. https://doi.org/10.31598/jurnalresistor.v1i2.323