Implementasi Peretasan Jaringan Menggunakan Alat ESP8266 Dengan Teknik Penetration Testing Metode Deauther Dan Beacon Pada Wireless Tenda F3

Authors

  • Andrian Fakhrizal Universitas Pamulang
  • Yudi Kurniawan Universitas Pamulang

Keywords:

Network Hack, Penetration Testing, Deauther, Beacon

Abstract

The internet is very important and has become an important need for people around the world, especially in the current situation. The internet network can be used as a concept where several computers in a university can communicate with each other and can share data and information connected to world connections. Lecturers, employees, and students (users) at one time complained because internet usage was very slow when it was full of users. Due to the excessive use of bandwidth and the lack of proper management of network traffic, it is detrimental to other users. (Prihantoro et al, 2021). YMIK VOCATIONAL SCHOOL had experienced problems with the internet and used the Tenda F3 router and then explained something like the network suddenly dropping and the internet suddenly being slow. According to the statement, the interference was caused by possibly trying to crack the password. From the background description above, the author tries to make a useful research, this hack uses the deauther and beacon methods in hacking wifi networks. The design of this research is based on a microcontroller, the tool used by the author is NodeMCU ESP8266 for hacking targets using Tenda F3. In research methods to obtain data and information, the methods used in the process of collecting data from various sources are observation, interviews and literature studies with the Deauther and Beacon methods, because the use of these methods is for illegal and unethical purposes. However, researchers can provide information about the results of tests that have been carried out related to this method. Research has been conducted using the Deauther and Beacon methods to test the security of Wi-Fi networks. The results show that this method is very effective in hacking Wi-Fi networks that are not encrypted or protected with weak passwords. Deauther attacks can make devices on a Wi-Fi network disconnect from the network, while beacon attacks can make devices connect to fake networks controlled by attackers. The conclusion obtained in this study is that Deauther and Beacon are two techniques used by researchers to carry out hacking attacks on the Tenda F3 Wireless network. Deauther is an attack that utilizes the WiFi protocol feature to force devices to leave the wireless network, while beacon is a technique for creating fake wireless networks that have the same name and configuration as the original wireless network. There are several conclusions and suggestions that can be conveyed by the author as a result of evaluating the development of the system and this final report.

References

Vinka, Maria, Angela, Nicoline, Michele. (2021). Pengaruh Teknologi Internet Terhadap Pengetahuan Masyarakat Jakarta Seputar Informasi Vaksinasi Covid-19. TEMATIK (Jurnal Teknologi Informasi dan Komunikasi), Vol. 8, No. 1, Juni 2021, E-ISSN : 2443-3640.

Prihantoro, Cahyo, Hidayah, Kharisma, Agung, Fernandez, Sandhy.(2021). Analisis Manajemen Bandwidth Menggunakan Metode Queue Tree pada Jaringan Internet Universitas Muhammadiyah Bengkulu. JUST TI (Jurnal Sains Terapan Teknologi Informasi), Vol. 13, No. 2, Juli 2021, 2021): 81-86 E-ISSN: 2579-4510 ISSN: 2085-6458.

Rachmie, Synthiana. (2020). Peranan Ilmu Digital Forensik Terhadap Penyidikan Kasus Peretasan Website. Jurnal Litigasi, Vol. 21 April 2020, e-ISSN: 2442-2274.

Zulfitria, Ansharullah , Fadhillah, Rastia. Penggunaan Teknologi Dan Internet Sebagai Media Pembelajaran Di Masa Pandemi Covid-19. Prosiding Seminar Nasional Penelitian LPPM UMJ, 7 Oktober 2020, E-ISSN: 2745-6080.

Wicaksana, Hasan, Sahrial, Saedudin, Rohmat, Fathinuddin, Muhammad. (2022). Perancangan Infrastruktur Teknologi Informasi Adaptif Dengan Metode Ppdioo Untuk Mendukung Implementasi Sistem Informasi Manajemen Puskesmas. e-Proceeding of Engineering, Vol.9, No.2 April 2022, ISSN : 2355-9365.

Hidayat, Nur, Muhammad, Andi. (2021). Sistem Deteksi Intrusi Dan Prevensi Berbasis Open Source. Jurnal INSTEK (Informatika Sains dan Teknologi), Volume 6 Nomor. 1, April 2021, E-ISSN : 2581-1711.

Dasanty, Vriella, Laras, Dermawan, Arwin, Dodik. (2020). Studi Literatur Monitoring Manajemen Jaringan Internet Dengan Konsep Snmp Terhadap Akses Siswa. Jurnal IT-EDU. Volume 5 Nomor 1 Tahun 2020, 38-48, E-ISSN : 2540-9263.

Najib, Warsun, Sulistyo, Selo, Widyawan. (2020). Tinjauan Ancaman dan Solusi Keamanan pada Teknologi Internet of Things. Jurnal Nasional Teknik Elektro dan Teknologi Informasi, Vol. 9, No. 4, November 2020, ISSN 2301 – 4156.

Manuaba, Hendrawan, Verry, Bagus, Ida, Hidayat, Risanuri, Kusumawardani, Suning, Sri. (2012). Evaluasi Keamanan Akses Jaringan Komputer Nirkabel (Kasus : Kantor Pusat Fakultas Teknik Universitas Gadjah Mada). JNTETI, Vol. 1, No. 1, Mei 2012, ISSN 2301 – 415613.

Saputro, Ardiyansyah, Vian, Raharjo, Suwanto. (2022). Pengaruh Penggunaan Beacon Interval Dalam Meningkatkan Throughput Jaringan Wireless IEEE 802.11ax. Jurnal Sistem Komputer dan Kecerdasan Buatan, Vol.VI No.1 September Tahun 2022, ISSN: 2621 – 2927.

Additional Files

Published

05-05-2024

How to Cite

Andrian Fakhrizal, & Yudi Kurniawan. (2024). Implementasi Peretasan Jaringan Menggunakan Alat ESP8266 Dengan Teknik Penetration Testing Metode Deauther Dan Beacon Pada Wireless Tenda F3. OKTAL : Jurnal Ilmu Komputer Dan Sains, 3(05), 1276–1292. Retrieved from https://journal.mediapublikasi.id/index.php/oktal/article/view/2581

Most read articles by the same author(s)