OSAMA, PUTRA and Stiawan, Deris (2024) ANALISIS FORENSIK MOBILE TROJAN METASPLOIT DENGAN PENDEKATAN NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST). Undergraduate thesis, Sriwijaya University.
Text
RAMA_56201_09011282025049.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (5MB) | Request a copy |
|
Text
RAMA_56201_09011282025049_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (4MB) | Request a copy |
|
Text
RAMA_56201_09011282025049_0003047905_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (1MB) |
|
Text
RAMA_56201_09011282025049_0003047905_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (466kB) | Request a copy |
|
Text
RAMA_56201_09011282025049_0003047905_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (832kB) | Request a copy |
|
Text
RAMA_56201_09011282025049_0003047905_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (2MB) | Request a copy |
|
Text
RAMA_56201_09011282025049_0003047905_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (361kB) | Request a copy |
|
Text
RAMA_56201_09011282025049_0003047905_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (433kB) | Request a copy |
|
Text
RAMA_56201_09011282025049_0003047905_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (427kB) | Request a copy |
Abstract
The increasing number of APKs in mobile technology each year often coincides with the emergence of APKs containing malware. Through the Metasploit framework, threat actors are able to embed payloads into benign APKs. To address this issue, forensic investigation on mobile devices becomes crucial. This research aims to conduct forensic analysis on Android devices infected with Trojan APKs, applying NIST SP 800-101 methodology and utilizing forensic tools such as Magnet ACQUIRE, Mobile Verification Toolkit (MVT), Autopsy, and SQLite DB Browser. The research results include the identification of various digital evidence such as Trojan APK files, WhatsApp databases, activity timelines, deleted files, and network traffic datasets. This study provides deep insights into attack mechanisms and potential mitigation strategies to protect Android devices from similar threats in the future.
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Mobile Forensic, APK, Trojan, Metasploit, NIST SP 800-101 |
Subjects: | T Technology > T Technology (General) > T57.6-57.97 Operations research. Systems analysis > T57.85 Network systems theory Including network analysis Cf. TS157.5+ Scheduling T Technology > T Technology (General) > T61-173 Technical education. Technical schools > T65 General works > T65.5.C65 Computer-assisted instruction |
Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) |
Depositing User: | Putra Osama |
Date Deposited: | 24 Jul 2024 04:39 |
Last Modified: | 24 Jul 2024 04:39 |
URI: | http://repository.unsri.ac.id/id/eprint/153124 |
Actions (login required)
View Item |