International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 185 - Number 26 |
Year of Publication: 2023 |
Authors: Richa Retno Rahmadhani Sembiring, Imam Riadi |
10.5120/ijca2023922042 |
Richa Retno Rahmadhani Sembiring, Imam Riadi . Wireless Implementation on Fake Wifi using Network Forensic Development Life Cycle Method. International Journal of Computer Applications. 185, 26 ( Aug 2023), 1-8. DOI=10.5120/ijca2023922042
Internet technology is growing rapidly, making use of more and more internet networks. From the rapid use of the internet, many attacks or criminal acts committed to attack Internet network aims to steal personal information data. An example of one internet network attack, namely fake wifi where the attack has away the work of duplicating a wifi network with the same SSID name aims gets information from the original wifi by using fluxion tools based on Kali Linux OS. Therefore, to ensnare the perpetrators of crimes against Internet attacks carried out the process of finding evidence and analyzing it. This research uses the Network Forensics Development Life method Cycle (NFDLC) with several stages, namely Initiations, Acquisition, Implementation, Operations, and Disposition. This research uses tools Wireshark for the monitoring process and for further analysis using Network Miner tools that can analyze traffic or files suspiciously. The research results obtained from the NFDLC method are starting with analyzing the equipment used, attack flowcharts and investigation, attack simulation, and monitoring analysis results. Analysis results the last one shows that there are some suspicious files such as HTML files and CSS. The last analysis is how the difference between real and fake wifi is for example in terms of security and also the victim is directed to the website page enter wifi if victim access fake wifi