Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal of Technopreneurship and Information System (JTIS)

PENERAPAN FRAMEWORK MAN IN THE MIDDLE MENGGUNAKAN LINUX PADA LEMBAGA PENYIARAN PUBLIK RRI BENGKULU Panjaitan, Anggiat Faisal; Supardi, Reno; Al Akbar, Abdussalam
Journal of Technopreneurship and Information System (JTIS) Vol 4, No 3 (2021): Journal Of Techoprenership and Information System
Publisher : Fakultas Teknik Universitas Muhammadiyah Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36085/jtis.v4i3.2316

Abstract

AbstrackThe development of very advanced technology has resulted in the level of need for network security being very important.  Conditions like this require network technicians to provide security for internet use by finding out many things that make them understand how network security works, information theft can be done in several ways, one of which is by monitoring the network using software and recording information in clear text.  The purpose of this study is to understand how the MITM (Man In The Middle) Framework works. The method used is the Network Development Life Cycle (NDLC) method, a cycle of network design stages that can guide a network design, which depends on the size of the project to be implemented and the objectives of the project.  Wireless security testing using MITM which is used to find information and security analysis using the arp spoofing technique method, which will be described in the MITM Framework application.  Packet sniffing is a process for capturing packets passing through a computer network. Based on the analysis and attack experiments carried out, it still needs improvement, this is with the airodamp-ng application detecting nearby WiFi and packet snoofing attacks can display website address, username and password information using the MITM Framework application. Keywords: Framework, MITM, wifi,  internet 
PENERAPAN FRAMEWORK MAN IN THE MIDDLE MENGGUNAKAN LINUX PADA LEMBAGA PENYIARAN PUBLIK RRI BENGKULU Anggiat Faisal Panjaitan; Reno Supardi; Abdussalam Al Akbar
JTIS: Journal of Technopreneurship and Information System Vol. 4 No. 3 (2021): Journal Of Techoprenership and Information System
Publisher : Fakultas Teknik Universitas Muhammadiyah Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36085/jtis.v4i3.2316

Abstract

AbstrackThe development of very advanced technology has resulted in the level of need for network security being very important.  Conditions like this require network technicians to provide security for internet use by finding out many things that make them understand how network security works, information theft can be done in several ways, one of which is by monitoring the network using software and recording information in clear text.  The purpose of this study is to understand how the MITM (Man In The Middle) Framework works. The method used is the Network Development Life Cycle (NDLC) method, a cycle of network design stages that can guide a network design, which depends on the size of the project to be implemented and the objectives of the project.  Wireless security testing using MITM which is used to find information and security analysis using the arp spoofing technique method, which will be described in the MITM Framework application.  Packet sniffing is a process for capturing packets passing through a computer network. Based on the analysis and attack experiments carried out, it still needs improvement, this is with the airodamp-ng application detecting nearby WiFi and packet snoofing attacks can display website address, username and password information using the MITM Framework application. Keywords: Framework, MITM, wifi,  internetÂ