Implementasi Peretasan Dan Pengamanan Ssid Pada Jaringan Mikrotik RB941-2ND Dengan Metode Deauther dan Evil Twin
Keywords:
Hacking, Network Security, Mikrotik RB941-2ND, Deauther and Evil Twin MethodsAbstract
The internet and websites have become a very important need for individuals, organizations, companies and government agencies. Because of the world's great need for the internet and websites, as well as the influence it has on all groups, understanding the benefits of the internet and websites is very important. Information technology security is very important nowadays. This is intended to ensure the security of all information sent or stored via the internet and cannot be accessed carelessly by irresponsible parties. The internet is accessed by many people, including hackers and crackers. For certain reasons, they carry out intrusions that can harm server and computer network owners. The sophistication of attacks and tools on computer networks is inversely proportional to knowledge about intrusions on computer networks. The researcher tries to make useful research, this hack uses the deauther and evil twin method in hacking WiFi networks. The design of this research is microcontroller based, the tool used by the author is NodeMCU for the hacking target using the MikroTik RB941-2ND, then implementing the Hacking and Network Security Simulation of the Mikrotik Rb941-2nd Using the Deauther and Evil Twin Method. The results of this research show that both are techniques that can be used to threaten the security of wireless networks. Preventing Evil Twin attacks involves being aware of the networks you connect to and avoiding unknown wireless networks. Meanwhile, preventing Deauther attacks may involve using additional security tools or protections that can detect and
respond to such attacks to maintain the connectivity of your devices. Based on the results of the research that has been carried out, the conclusion that can be concluded is that the researcher was able to hack and carry out security on the internet network in the RT 001 environment with or without a strong password, implemented the assembly of microcontroller tools which are currently easily available on the market, and was able to prevent hacking. RT.001 network with a MikroTik RB941-2ND router and research efforts regarding the use of human error in hacking wireless networks while educating the public about cyber security and how to respond to hacker intrusions.
References
Adiguna, Adhari, Mochamad, Widagdo, Wisnu, Bambang. (2022). Analisis Keamanan Jaringan Wpa2-Psk Menggunakan Metode Penetration Testing (Studi Kasus: Router Tp-Link Mercusys Mw302r). Jurnal Sistem Komputer dan Kecerdasan Buatan, Vol.5 No.2, Maret
Dwiyatno, Saleh, Sari, Purnama, Ayu, Irawan, Agus, Safig. (2019). Pendeteksi Serangan Ddos (Distributed Denial of Service) Menggunakan Honeypot Di Pt. Torini Jaya Abadi. Jurnal SIMIKA, Vol. 2 No. 2 Tahun 2019.
Ferianto, Kusno, Hidayati, Nurul, Uci. (2019). Efektifitas Pelatihan Penanggulangan Bencana Dengan Metode Simulasi Terhadap Perilaku Kesiapsiagaan Bencana Banjir Pada Siswa Sman 2 Tuban. Jurnal Kesehatan Mesencephalon, Vol.5 No.2, Oktober 2019, Hal: 88-94.
Jaya, Budi, Yunus, Yuhandri, Sumijan. (2020). Peningkatan Keamanan Router Mikrotik Terhadap Serangan Denial of Service (DoS). Jurnal Sistim Informasi dan Teknologi, Vol. 2 No. 4, Hal: 115-123, E-ISSN: 2686-3154.
Kurniawan, Adi, Turkhamun. (2020). Analisa Keamanan Jaringan Wifi Terhadap Serangan Packet Sniffing. Jurnal Ilmiah Fakultas Teknik LIMIT’S, Vol.16 No 2 September 2020, ISSN: 02161184.
Maharani, Dewi, Helmiah, Fauriatun, Rahmadani, Nurul. (2021). Penyuluhan Manfaat Menggunakan Internet dan Website Pada Masa Pandemi Covid-19. ABDIFORMATIKA (Jurnal Pengabdian Masyarakat Informatika), Vol. 1, No. 1 - May 2021, Hal. 1-7.
Santoso, Adhi, Nugroho, Affandi, Bagus, Khaediar, Kurniawan, Dwi, Rifki. (2022). Implementasi Keamanan Jaringan Menggunakan Port Knocking. Jurnal Janitra Informatika dan Sistem Informasi, Vol. 2, No. 2 Oktober 2022, Hal. 90-95, E-ISSN: 2775-9490.