Intel-Based Macintosh Memory Forensics: Eavesdropping Attack Analysis Through Memory Dump - Dalam bentuk buku karya ilmiah

FARHAN MUHAMMAD ALIF

Informasi Dasar

67 kali
25.04.386
000
Karya Ilmiah - Skripsi (S1) - Reference

Memory forensics plays a critical role in cybersecurity, particularly in analyzing volatile memory during cyberattacks. This paper examines memory forensics analysis on Intel-based Macintosh systems targeted by remote attacks within shared networks. The study used a controlled setup involving an Intel-based Macintosh running a vulnerable PHP-based web application, DVWA (Damn Vulnerable Web Application). The system was attacked via SQL injection, command injection, and reflected Cross-Site Scripting (XSS) from a Kali Linux device over shared Wi-Fi. The attacks exploited application vulnerabilities to compromise the system, necessitating forensic examination. Memory dumps from the Mac device were analyzed using tools like the Volatility Framework to extract artifacts such as process details, network activity, and injected code. Memory artifacts were correlated with Wireshark packet analysis to uncover network-level evidence. The findings underscored the impact of remote attacks on system integrity and the ef

Subjek

DIGITAL FORENSICS
 

Katalog

Intel-Based Macintosh Memory Forensics: Eavesdropping Attack Analysis Through Memory Dump - Dalam bentuk buku karya ilmiah
 
4p.: il,; pdf file
 

Sirkulasi

Rp. 0
Rp. 0
Tidak

Pengarang

FARHAN MUHAMMAD ALIF
Perorangan
Niken Dwi Wahyu Cahyani, Vera Suryani
 

Penerbit

Universitas Telkom, S1 Informatika
Bandung
2025

Koleksi

Kompetensi

  • CCH4D4 - TUGAS AKHIR
  • CII4E4 - TUGAS AKHIR

Download / Flippingbook

 

Ulasan

Belum ada ulasan yang diberikan
anda harus sign-in untuk memberikan ulasan ke katalog ini