STRING (Satuan Tulisan Riset dan Inovasi Teknologi)
Latest Publications


TOTAL DOCUMENTS

221
(FIVE YEARS 125)

H-INDEX

1
(FIVE YEARS 1)

Published By Universitas Indraprasta Pgri

2549-2837, 2527-9661

2021 ◽  
Vol 6 (2) ◽  
pp. 158
Author(s):  
Muhammad Syam Firdaus ◽  
Aji Primajaya ◽  
Asep Jamaludin

2021 ◽  
Vol 6 (2) ◽  
pp. 203
Author(s):  
Fauzan Natsir

<p><em>The Tiktok application is one of the social media platform applications that often finds many loopholes to get the identity of the application's users. TikTok has experienced tremendous growth by reaching 1.5 billion users in 2019. This research uses </em><em>an</em><em> Open-Source Intelligence (OSINT) method as a standard in the research phase to reveal the timestamps obtained from the TikTok application. The method used in this research is the National Institute of Standard Technology (NIST). Th</em><em>e</em><em> research uses forensic tools, namely Browser History Capture/Viewer, Video Cache Viewer, Unfurl and Urlebird. The result of this research show</em><em>s </em><em>a complete description of all digital artifacts and timestamps obtained from TikTok content. Furthermore, </em><em>by </em><em>using the results of the analysis in th</em><em>e research</em><em>, it is </em><em>expected</em><em> that </em><em>the research</em><em> can </em><em>help to </em><em>reconstruct the content and </em><em>to </em><em>search for keywords from the timestamp in th</em><em>e</em><em> TikTok application.</em></p>


2021 ◽  
Vol 6 (2) ◽  
pp. 210
Author(s):  
Rudi Hermawan

<p><em>In recent years cases of cyber attacks that lead to website security have increased. The most widely used website hacking threat is sql injection. By using the sqlmap tool that runs on the Kalilinux  operating system, attackers can easily take over very important user authentication data with their passwords. Attackers only use a special SQL query script using the python programming language will force the web server to output database information, tables, columns and data contents. This sql injection technique is not difficult, knowing how sql injection works is expected to be useful for web admins and web application developers to be able to secure user access from attackers. This attack simulation uses a virtual machine, by creating two virtual computers that are scripted as the attacker and the target server. By testing through this simulation, we can find out how the attack process and the consequences of attacks carried out by attackers.</em></p>


Sign in / Sign up

Export Citation Format

Share Document