Prayudi, Yudi
Program Studi Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia Jl. Kaliurang Km. 14,5 Yogyakarta

Published : 12 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 12 Documents
Search

ANALISIS KELAYAKAN INTEGRATED DIGITAL FORENSICS INVESTIGATION FRAMEWORK UNTUK INVESTIGASI SMARTPHONE Ruuhwan, Ruuhwan; Riadi, Imam; Prayudi, Yudi
Jurnal Buana Informatika Vol 7, No 4 (2016): Jurnal Buana Informatika Volume 7 Nomor 4 Oktober 2016
Publisher : Universitas Atma Jaya Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (273.959 KB) | DOI: 10.24002/jbi.v7i4.767

Abstract

Abstract. The handling of digital evidence each and every digital data that can proof a determination that a crime has been committed; it may also give the links between a crime and its victims or crime and the culprit. How to verify a valid evidence is to investigate using the approach known as the Digital Forensic Examination Procedures. Integrated Digital Forensic Investigation Framework (IDFIF) is the latest developed method, so that it is interesting to further scrutinize IDFIF, particularly in the process of investigation of a smartphone. The current smartphone devices have similar functions with computers. Although its functions are almost the same as the computer, but there are some differences in the process of digital forensics handling between computer devices and smartphones. The digital evidence handling process stages need to overcome the circumstances that may be encountered by an investigator involving digital evidence particularly on electronic media and smartphone devices in the field. IDFIF needs to develop in such a way so it has the flexibility in handling different types of digital evidence.Keywords: digital evidence, IDFIF, investigation, smartphone Abstrak. Penanganan bukti digital mencakup setiap dan semua data digital yang dapat menjadi bukti penetapan bahwa kejahatan telah dilakukan atau dapat memberikan link antara kejahatan dan korbannya atau kejahatan dan pelakunya. Cara pembuktian untuk mendapatkan bukti valid adalah dengan melakukan investigasi dengan pendekatan Prosedur Pemeriksaan Digital Forensic. Integrated Digital Forensics Investigation Framework (IDFIF) merupakan metode terbaru sehingga IDFIF ini menarik untuk diteliti lebih lanjut terutama dalam proses investigasi smartphone. Saat ini perangkat smartphone memiliki fungsi yang sama dengan komputer. Meskipun demikian, ada beberapa perbedaan dalam proses penanganan digital forensics diantara perangkat komputer dan smartphone. Tahapan proses penanganan barang bukti digital seharusnya dibuat untuk mengatasi keadaan umum yang mungkin dihadapi oleh investigator yang melibatkan barang bukti digital terutama pada perangkat smartphone dan media elektronik terkait di lapangan. IDFIF perlu dikembangkan sehingga memiliki fleksibilitas dalam menangani berbagai jenis barang bukti digital. Kata Kunci: bukti digital, IDFIF, investigasi, smartphone
Penerapan Metode ISSAF dan OWASP versi 4 Untuk Uji Kerentanan Web Server Dirgahayu, Raden Teduh; Prayudi, Yudi; Fajaryanto, Adi
Network Engineering Research Operation [NERO] Vol 1, No 3 (2015): Nero
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Untuk mengamankan web server dariserangan hacker maka sebaiknya para pemilik web server melakukan self test terhadap server mereka sendiri. Melalui self test ini, para pemilik web server akan mengetahui letak kerentanan dari sistem yang ada. Salah satu metode self test ini adalah penetration test. Metode ini sama dengan aktivitas hacking namun dilakukan secara legal. Penelitian ini, metode implementasi penetration test yang akan digunakan adalah ISSAF (Information Systems Security Assessment Framework) dan OWASP versi 4. IKIP PGRI Madiun sebagai salah satu instansi pendidikan sudah mempunyai web server sendiri sejak tahun 2010. Berdasarkan wawancara dengan pengelola web server IKIP PGRI Madiun, sejak pertama kali web server online sampai saa tini web server berhasil dibobol oleh hacker beberapa kali dalam setahun dan belum pernah dilakukan penetration test pada web servernya. Hasil pengujian dan analisa dengan metode ISSAF menunjukkan bahwa sistem web server IKIP PGRI Madiun masih dapat ditembus dan mengambil alih hak akses administrator, sedangkan dengan metode OWASP versi 4 menunjukkan bahwa manajemen otentifikasi, otorisasi dan manajemen sesi belum diimplementasikan dengan baik. Kata kunci: webserver, pentest, owasp, issaf, framework.
INVESTIGASI LIVE FORENSIK DARI SISI PENGGUNA UNTUK MENGANALISA SERANGAN MAN IN THE MIDDLE ATTACK BERBASIS EVIL TWIN Ahmad, Muhammad Sabri; Riadi, Imam; Prayudi, Yudi
ILKOM Jurnal Ilmiah Vol 9, No 1 (2017)
Publisher : Program Studi Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1139.929 KB)

Abstract

MITM based Evil twin menjadi suatu ancaman yang berbahaya bagi para pengguna jaringan Wifi. Pelaku penyerangan ini memanfaatkan AP (Access Point) palsu dengan konfigurasi gateway yang berbeda dengan legitimate AP, sehingga jenis serangan ini menjadi cukup sulit untuk dideteksi, disisi lain proses pengungkapan kasus serangan MITM based Evil Twin hanya sebatas mendeteksi aktivitas serangan dan belum ada pembahasan lebih lanjut terkait digital forensik. Penelitian ini dilakukan dengan menerapkan pendekatan metode Live forensik dan pendekatan dari sisi user, untuk mendeteksi aktivitas ilegal yang terjadi di dalam jaringan Wifi, Proses investigasi MITM Based Evil dibagi menjadi empat tahapan, dimulai dari proses collection, examination, analysis dan reporting dan analisa Forensik, selain itu penelitian ini difokuskan pada dua proses penelitian yaitu proses analisa Wifi scanning dan analisa network trafik untuk proses penemuan barang bukti digital berupa informasi traffik data dari serangan mitm based evil twin.
PENERAPAN SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) DALAM MENGEMBANGKAN FRAMEWORK AUDIO FORENSIK Inggi, Rahmat; Sugiantoro, Bambang; Prayudi, Yudi
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (642.451 KB)

Abstract

An audio recorder is one of the multimedia content that is often found at the crime scene and is used as evidence in the trial process. Audio recorders that can be made as legal evidence in court must follow the rules and audio forensic standards that apply in the process of obtaining the evidence, this is because audio digital evidence is very easy to manipulate. The forensic audio investigation process requires a framework that can be used as a reference in the investigation process. However, at present, the developing audio forensic focus more on analyzing audio forensic techniques and does not provide more specific stages in handling forensic audio from the scene of the case to the trial process. This research focuses on developing the audio forensic framework by implementing the Systems Development Life Cycle (SDLC) in the process of developing the forensic audio framework. Systems Development Life Cycle (SDLC) has stages of planning, analysis, design, implementation, and maintenance that are often used as references in the process of making and developing systems. In other words, the implementation of this method will enable researchers to develop an audio forensic framework that can be used as a standard in conducting the forensic audio investigation process.Keywords—Audio Recorder, Audio Forensics, Framework, SDLCDOI : 10.5281/zenodo.2528444
Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone Ruuhwan, Ruuhwan; Riadi, Imam; Prayudi, Yudi
JEPIN (Jurnal Edukasi dan Penelitian Informatika) Vol 2, No 1 (2016): Volume 2 No 1
Publisher : Program Studi Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1033.501 KB) | DOI: 10.26418/jp.v2i1.14369

Abstract

Perkembangan teknologi yang semakin pesat, dapat menimbulkan permasalahan bagi pengguna teknologi itu sendiri, semakin maju kehidupan masyarakat, maka kejahatan juga ikut semakin maju. Smartphone merupakan salah satu bentuk teknologi yang digunakan untuk melakukan penipuan melalui fasilitas Short Message Service (SMS). Pada saat smartphone yang digunakan untuk melakukan kejahatan maka smartphone tersebut dapat disita oleh aparat penegak hukum sebagai salah satu barang bukti. Cara pembuktian untuk mendapatkan bukti yang valid adalah dengan melakukan investigasi menggunakan pendekatan penanganan bukti digital yang dikenal dengan istilah Framework. Integrated Digital Forensics Investigation Framework versi 2 (IDFIF v2) merupakan framework terbaru yang telah dikembangkan sehingga dapat digunakan untuk proses investigasi smartphone.Kata kunci— Barang Bukti, Framework, IDFIF v2, Smartphone
EKSPLORASI BUKTI DIGITAL PADA SMART ROUTER MENGGUNAKAN METODE LIVE FORENSICS Supriyono, Abdul Rohman; Sugiantoro, Bambang; Prayudi, Yudi
Infotekmesin Vol 10, No 2 (2019): Infotekmesin: Juli 2019
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (554.582 KB) | DOI: 10.35970/infotekmesin.v10i2.48

Abstract

Network devices as media file sharing and can be used as file servers have begun to appear, just as smart router devices can be used as file servers by adding USB Thumb drive as storage media. With the diversity of router devices, it becomes a challenge in digital forensic science when a case occurs by utilizing a smart router device related to file-sharing services. Then it is necessary to study the right method in investigating smart router devices. This paper discusses the use of the live forensics acquisition method in investigating smart router devices, against system log files related to file-sharing activities. In identifying the process of searching, recognizing, and documenting potential things as digital evidence of processing devices and digital media storage. The acquisition process uses two methods, namely the live acquisition method on the router device and physical acquisition on the device that is used as storage media on the smart router.
PENERAPAN METODE COMPOSITE LOGIC UNTUK PERANCANGAN FRAMEWORK PENGUMPULAN BUKTI DIGITAL PADA MEDIA SOSIAL Al Jumah, Muhammad Naim; Sugiantoro, Bambang; Prayudi, Yudi
ILKOM Jurnal Ilmiah Vol 11, No 2 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (615.256 KB) | DOI: 10.33096/ilkom.v11i2.442.135-142

Abstract

Social media has become a major part of society. But most of the time social media is used as a way people commit the crime. Due to numerous crimes that use social media, it is essential to design a framework to gather digital evidence on social media. This study develops the design of Framework by implementing Composite Logic Model.  A logic Composite model can be used to determine the role model of any variable or pattern that need to collaborate. Composite Logic Model will produce a role model that has a role to produce patterns so that it can produce the same goal. A method of Composite Logic will collaborate with the Digital Forensics Investigation framework to produce a Digital Evidence Collection Framework on Social Media. Based on data and facts, this study has been producing a new framework of gathering digital evidence on social media. The framework has four main stages in the process of collecting digital evidence on social media including pre-process, collection, analysis, and report.
DATA VISUALISASI SEBAGAI PENDUKUNG INVESTIGASI MEDIA SOSIAL Pomalingo, Suwito; Sugiantoro, Bambang; Prayudi, Yudi
ILKOM Jurnal Ilmiah Vol 11, No 2 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (889.489 KB) | DOI: 10.33096/ilkom.v11i2.443.143-151

Abstract

Social media is an application that can make everyone interact with each other and can consume information by sharing content quickly, efficiently and real time. Various kinds of information about someone's activities that we can find on social media, making social media can help to conduct investigations. Some research, using visualization with several graph methods to facilitate the process of analyzing data on social media that is so abundant. But the data used only comes from one social media, while there is still a lot of information on other social media that can be used as data sources for analysis purposes. In this study visualization using the directed graph method will be carried out, then calculate the value of network property and the value of centrality to find out which nodes have many activities which will be carried out in depth searches to find patterns of interaction or activity. Based on the results of the calculated centrality, it is found that on Twitter and Instagram accounts there are many interactions, this can be seen in the value of the indegree and outdegree node. Based on the results of the analysis in this study, information that is important for investigating social media is obtained, such as information about user profiles, posts, comments, preferred social media pages, location, and timestamp, all of which are connected by a line that shows the relationship between the node.
PENGGUNAAN METODE STATIS DAN LIVE FORENSIK PADA UAV UNTUK MENDAPATKAN BUKTI DIGITAL Arrochman, Ibnu Fajar; Fudholi, Dhomas Hatta; Prayudi, Yudi
ILKOM Jurnal Ilmiah Vol 11, No 2 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (719.417 KB) | DOI: 10.33096/ilkom.v11i2.444.152-158

Abstract

In recent years, the use of drones by civilians is increasing rapidly by the presentation of total sales continued to increase rapidly every year. With the increasing possibility of Unmanned Aerial Vehicle (UAV) abuse, crime in the use of UAVs to be larger. Through forensic analysis of data using static forensic and live forensic to obtain data that allows it to be used as digital evidence. To dig up information that could be used as digital evidence in the UAV and controllers, as well as to know the characteristics of digital evidence on a UAV. The results showed that digital evidence on a UAV, the smartphone is used as a controller UAV has a very important role in the investigation. The findings in aircraft has a percentage of 50% and a camera memory card with 16.6%. DJI Phantom 3 Advanced GPS coordinates always store data in flight LOG; the data is always stored even when the flight mode is used does not use GPS signals to stability. Due to DJI Phantom 3 Advanced always use GPS on flights, file, image or video captured by the camera has the best GPS location coordinates to the metadata therein.
Detection of Metasploit Attacks Using RAM Forensic on Proprietary Operating Systems Prakoso, Danar Cahyo; Riadi, Imam; Prayudi, Yudi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 2, May 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (288.564 KB) | DOI: 10.22219/kinetik.v5i2.1037

Abstract

Information technology has become an essential thing in the digital era as it is today. With the support of computer networks, information technology is used as a medium for exchanging data and information. Much information is confidential. Therefore, security is also essential. Metasploit is one of the frameworks commonly used by penetration testers to audit or test the security of a computer system legally, but it does not rule out the possibility that Metasploit can also be used for crime. For this reason, it is necessary to carry out a digital forensic process to uncover these crimes. In this study, a simulation of attacks on Windows 10 will be carried out with Metasploit. Then the digital forensics process uses live forensics techniques on computer RAM, where the computer RAM contains information about the processes running on the computer. The live forensic technique is important because information on RAM will be lost if the computer is off. This research will use FTK Imager, Dumpit, and Magnet RAM Capture as the RAM acquisition tool and Volatility as the analysis tool. The results of the research have successfully shown that the live forensics technique in RAM is able to obtain digital evidence in the form of an attacker's IP, evidence of exploits/Trojans, processes running on RAM, operating system profiles used and the location of the exploits/Trojan when executed by the victim.