PENGUJIAN KEAMANAN DENGAN METODE PENETRATION TESTING EXECUTION STANDARD (PTES) UNTUK MENEMUKAN KERENTANAN MISCONFIGURATIONS PADA PERANGKAT JARINGAN Studi Kasus Jaringan WIFI Universitas Pendidikan Ganesha

Main Article Content

I Made Edy Listartha
Gede Arna Jude Saskara

Abstract

This study examines the security of the WiFi network at Universitas Pendidikan Ganesha using the Penetration Testing Execution Standard (PTES) method. The aim is to identify and analyze vulnerabilities caused by misconfigurations within the university's WiFi infrastructure. The PTES method is employed to conduct testing through phases including pre-engagement interactions, intelligence gathering, threat modeling, vulnerability analysis, exploitation, post-exploitation, and reporting. The testing results reveal several key vulnerabilities related to improper configurations, such as the use of vulnerable protocols and insecure settings. Further analysis exposes potential risks that could be exploited by unauthorized parties to access sensitive data or disrupt services. The study provides recommendations for configuration improvements and mitigation steps to enhance WiFi network security at the university. The findings are expected to serve as a foundation for developing more effective security policies and better protection for network infrastructure in academic environments.

Downloads

Download data is not yet available.

Article Details

How to Cite
Listartha, I. M. E., & Saskara, G. A. (2024). PENGUJIAN KEAMANAN DENGAN METODE PENETRATION TESTING EXECUTION STANDARD (PTES) UNTUK MENEMUKAN KERENTANAN MISCONFIGURATIONS PADA PERANGKAT JARINGAN. Electro Luceat, 10(2), 32-40. https://doi.org/10.32531/jelekn.v10i2.821
Section
Articles

References

[1] I. M. E. Listartha, “Pengujian Performa dan Tingkat Stress pada Website Legalisir Ijasah Online Universitas Pendidikan Ganesha,” Electro Luceat, vol. 6, no. 1, hlm. 66–73, Jul 2020, doi: 10.32531/JELEKN.V6I1.182.
[2] Mark Lukehart, “2023 Cyber Attack Statistics, Data, and Trends | Parachute,” Paracute. Diakses: 12 Maret 2023. [Daring]. Tersedia pada: https://parachute.cloud/cyber-attack-statistics-data-and-trends/
[3] H. Shemi, “Serangan Siber Meningkat, Sektor Keuangan Paling Terancam,” IDN Times. Diakses: 12 Maret 2023. [Daring]. Tersedia pada: https://www.idntimes.com/business/economy/helmi/hati-hati-sektor-keuangan-paling-terancam-nomor-2-kejahatan-siber
[4] F. C. Farisa, “Kaleidoskop 2019: Serangan Hoaks Hantam KPU,” Kompas.com. Diakses: 12 Maret 2023. [Daring]. Tersedia pada: https://nasional.kompas.com/read/2019/12/30/05472211/kaleidoskop-2019-serangan-hoaks-hantam-kpu
[5] R. Clancy, “Network Security Threats and Vulnerabilities | Types of Attacks in Network Security,” EC-Coucil. Diakses: 12 Maret 2023. [Daring]. Tersedia pada: https://www.eccouncil.org/cybersecurity-exchange/network-security/network-security-threats-vulnerabilities/
[6] A. Dizdar, “Security Misconfiguration: Impact, Examples, and Prevention,” Brightsec. Diakses: 12 Maret 2023. [Daring]. Tersedia pada: https://brightsec.com/blog/security-misconfiguration/
[7] S. Thorgren, J. Wincent, dan D. Örtqvist, “Designing interorganizational networks for innovation: An empirical examination of network configuration, formation and governance,” Journal of Engineering and Technology Management, vol. 26, no. 3, hlm. 148–166, Sep 2009, doi: 10.1016/J.JENGTECMAN.2009.06.006.
[8] A. Ambre dan N. Shekokar, “Insider Threat Detection Using Log Analysis and Event Correlation,” Procedia Comput Sci, vol. 45, no. C, hlm. 436–445, Jan 2015, doi: 10.1016/J.PROCS.2015.03.175.
[9] A. Tundis, W. Mazurczyk, dan M. Mühlhäuser, “A review of network vulnerabilities scanning tools: Types, capabilities and functioning,” ACM International Conference Proceeding Series, Agu 2018, doi: 10.1145/3230833.3233287.
[10] S. Shah dan B. M. Mehtre, “An overview of vulnerability assessment and penetration testing techniques,” Journal of Computer Virology and Hacking Techniques, vol. 11, no. 1, hlm. 27–49, Feb 2015, doi: 10.1007/S11416-014-0231-X/METRICS.
[11] Y. Stefinko, A. Piskozub, dan R. Banakh, “Manual and automated penetration testing. Benefits and drawbacks. Modern tendency,” Modern Problems of Radio Engineering, Telecommunications and Computer Science, Proceedings of the 13th International Conference on TCSET 2016, hlm. 488–491, Apr 2016, doi: 10.1109/TCSET.2016.7452095.
Abstract viewed = 37 times
PDF (Bahasa Indonesia) downloaded = 46 times