Abstract

The advancement of technology development makes it easier to find and share any information using computer networks. Computer networks have been widely applied in homes and offices. The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats. On a computer network, the device which has the vulnerability is a router. A router is the outermost device that connects the Local Area Network (LAN) to the internet so that it can be easily attacked by irresponsible parties. The Mikrotik router is a product that is widely used as a gateway router that connects LANs and the Internet. There are so many tools that can be used to carry out attacks on Mikrotik routers such as Hping3 (DoS), Hydra (Brute-Force), and Exploitation Script (Winbox Exploitation). To find out the security loop in Mikrotik routers, this study uses penetration testing methods and attack techniques such as Winbox Exploit, Brute-force, and DoS. After knowing the security gap, the next step is to provide and implementation recommendations so that similar attacks do not occur any more in the future.

Highlights

  • Perangkat infrastruktur jaringan seperti router digunakan dalam interkoneksi jaringan

  • Computer networks have been widely applied in homes and offices

  • The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats

Read more

Summary

PENDAHULUAN

Perangkat infrastruktur jaringan seperti router digunakan dalam interkoneksi jaringan. Router berbiaya rendah adalah router yang murah dapat digunakan sebagai router rumah atau sebagai router inti pada infrastruktur jaringan dengan fitur perutean yang lebih canggih [1]. Dapat melakukan pengaturan keamanan pada router Mikrotik. Untuk pengaturan keamanan ada banyak cara yang dapat di lakukan seperti menerapkan Intrusion Detection System (IDS) dengan aplikasi pihak ketiga seperti snort dan melakukan implelentasi firewall [12], namun untuk memastikan pengaturan yang benar maka harus di lakukan pengujian. Penetration testing adalah metode yang banyak digunakan untuk melakukan pengujian sistem keamanan, termasuk kemanan jaringan. Ini bertujuan agar untuk mempermudah administrator atau pemilik jaringan dalam melakukan pencegahan secara dini sebelum adanya serangan pada perangkat router Mikrotik yang dapat menimbulakan kerusakan maupun kerugian pada pengguna [15]

METODOLOGI PENELITIAN
HASIL DAN PEMBAHASAN
Pengumpulan Informasi dan Perencanaan
Mencari celah keamanan
Melakukan Serangan
Brute-Force
Winbox
KESIMPULAN

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.