SIMULASI SERANGAN SIBER MAC ADDRESS DAN IP ADDRESS SPOOFING PADA JARINGAN HTTP DI KALI LINUX

Authors

  • Muhammad Rizki Andrian Fitra Universitas Negeri Medan
  • Neysa Talitha Jehian Universitan Negeri Medan
  • Lastri Elisabet Butarbutar Universitas Negeri Medan
  • Dedy Kiswanto Universitas Negeri Medan

DOI:

https://doi.org/10.36002/jutik.v11i2.3766

Keywords:

ARP Spoofing, HTTP, Kali Linux, MAC Address Spoofing, Network Security

Abstract

The rapid development of information technology presents a big challenge in terms of network security, especially against cyber-attacks. This research simulates MAC Address Spoofing attack on HTTP network using Kali Linux operating system. The purpose of this research is to understand how the attack process is carried out and evaluate its impact on communication security in an unencrypted network. The attacker impersonated a gateway through ARP Spoofing technique and successfully infiltrated the communication path between the victim and the server. The captured data shows that sensitive information such as usernames and passwords can be easily retrieved when the victim accesses HTTP sites. The results show that spoofing has been successfully carried out, as evidenced by the acquisition of usernames and passwords when victims access HTTP sites.

References

[1] F. Dedi, “Penerapan Teknologi Blockchain Untuk Mengatasi Serangan Man In The Middle,” JCT (Journal Science Infomatica and Robotics), vol. 1, no. 1, pp. 73–80, Sep. 2023.

[2] F. J. Al Fajar, D. Nurani, and R. F. A. Aziza, “Implementation of Telegram Bot for MikroTik Monitoring at Planets Network Solution,” JUTIK (Jurnal Teknologi Informasi dan Komputer), vol. 9, no. 6, pp. 274-284, Oct. 2023.

[3] I. Riadi, A. Fadlil, and M. N. Hafizh, “Analisis Bukti Serangan Address Resolution Protocol Spoofing menggunakan Metode National Institute of Standard Technology,” Edumatic: Jurnal Pendidikan Informatika, vol. 4, no. 1, pp. 21–29, Jun. 2020.

[4] J. Suhada and M. Tukiyat, "Analisis keamanan jaringan lokal pada Media Access Control address spoofing dengan metode Address Resolution Protocol (Studi kasus: SMK Prisma Depok)," Jurnal Penelitian Ilmu Komputer, vol. 2986, no. 030x, 2023.

[5] R. M. S. A. Awalsyah, P. S. Harahap, and. Dono, “Implementasi Caesar Cipher Dalam Mengenkripsikan Pesan Pada Serangan Man In The Middle Attack,” JCT (Journal Science Infomatica and Robotics), vol. 1, no. 1, pp. 64–72, Sep. 2023.

[6] G. Prakoso and A. K. Heikmakhtiar, "Analisis keamanan jaringan: ARP spoofing dan DNS spoofing dengan metode National Institute of Standards and Technology," Journal on Education, vol. 6, no. 02, pp. 12895–12902, 2024.

[7] A. Arini, M. Luthfi Arsalan, and H. Teja Sukmana, “Keamanan Jaringan Wi-Fi Terhadap Serangan Packet Sniffing Menggunakan Firewall Rule (Studi Kasus: Pt. Akurat.Co),” Cyber Security dan Forensik Digital, vol. 6, no. 2, pp. 30–38, Feb. 2024.

[8] A. P. Walidin, F. P. Putri, and D. Kiswanto, "Kali Linux sebagai alat analisis keamanan jaringan melalui penggunaan Nmap, Wireshark, dan Metasploit," JATI (Jurnal Mahasiswa Teknik Informatika), vol. 9, no. 1, pp. 1188-1196, 2025.

[9] Z. M. Luthfansa and U. D. Rosiani, "Pemanfaatan Wireshark untuk sniffing komunikasi data berprotokol HTTP pada jaringan internet," Journal Information Engineering and Educational Technology, vol. 5, no. 1, pp. 34-39, 2021, ISSN 2549-869X.

[10] M. Katoningati, I. G., “Analisis Layer Aplikasi (Protokol HTTP) menggunakan Wireshark,” JES (Jurnal Elektro Smart), pp. 13–15, 2021

Downloads

Published

2025-10-10

How to Cite

Muhammad Rizki Andrian Fitra, Neysa Talitha Jehian, Lastri Elisabet Butarbutar, & Dedy Kiswanto. (2025). SIMULASI SERANGAN SIBER MAC ADDRESS DAN IP ADDRESS SPOOFING PADA JARINGAN HTTP DI KALI LINUX. Jurnal Teknologi Informasi Dan Komputer, 11(2), 139–149. https://doi.org/10.36002/jutik.v11i2.3766

Most read articles by the same author(s)

Similar Articles

<< < 2 3 4 5 6 7 8 > >> 

You may also start an advanced similarity search for this article.