Institutional Repository | Satya Wacana Christian University: Simulasi IP Traceback dengan Algoritma Efficient Probabilistic Packet Marking pada Spoofing Attack

Daftar Lampiran
Lampiran 1
Diagram Pohon Rekonstruksi Jalur

79

80

Lampiran 2
Konfigurasi PC dan Router untuk penelitian di
laboratorium
1. Konfigurasi PC Windows
- PC1
IP address : 192.168.1.10
Netmask

: 255.255.255.0

Gateway

: 192.168.1.1


- PC2
IP address : 192.168.2.10
Netmask

: 255.255.255.0

Gateway

: 192.168.2.1

2. Konfigurasi PC Linux
- PC1
IP address : 192.168.1.10
Netmask

: 255.255.255.0

Gateway


: 192.168.1.1

Prosedur compile Hping2 :
1.

Copy ke /usr

/local/ src

# cp hping2.0.0-rc3.tar /usr/local/src

2.

Ekstrak
# cd /usr/local/src
# tar xfv hping2.0.0-rc3.tar

3.

Compile

# cd hping2-rc3/
# ./configure && make && make install

81

3. Konfigurasi Router Cisco
a. Router 1
- Konfigurasi Dasar
Router>enable
Router#configurasi terminal
Router(config)#hostname R1
R1(config)#enable secret fti
R1(config)#line console 0
R1(config-line)#password uksw
R1(config-line)#login
R1(config-line)#logging synchronous
R1(config-line)#exec-time 0 0
R1(config-line)#exit

- Konfigurasi Interface

R1(config)# interface fa0/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#no shutdown
R1(config-if)#interface se0/0/0
R1(config-if)#ip address 12.12.12.1 255.255.255.252
R1(config-if)#no shutdown
R1(config-if)#interface se0/0/1
R1(config-if)#ip address 12.12.12.5 255.255.255.252
R1(config-if)#no shutdown

- Konfigurasi Routing
R1(config)#route eigrp 100
R1(config-router)#network 12.12.12.0 255.255.255.0
R1(config-router)#network 192.168.1.0 255.255.255.0

b. Router 2
- Konfigurasi Dasar
Router>enable
Router#configurasi terminal
Router(config)#hostname R2

R2(config)#enable secret fti
R2(config)#line console 0
R2(config-line)#password uksw
R2(config-line)#login
R2(config-line)#logging synchronous
R2(config-line)#exec-time 0 0
R2(config-line)#exit

- Konfigurasi Interface
R2(config-if)#interface se0/0/0
R2(config-if)#ip address 12.12.12.2 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#interface se0/0/1
R2(config-if)#ip address 22.22.22.1 255.255.255.252
R2(config-if)#no shutdown

82

- Konfigurasi Routing
R2(config)#route eigrp 100

R2(config-router)#network 12.12.12.0 255.255.255.0
R2(config-router)#network 22.22.22.0 255.255.255.0

c. Router 3
- Konfigurasi Dasar
Router>enable
Router#configurasi terminal
Router(config)#hostname R3
R3(config)#enable secret fti
R3(config)#line console 0
R3(config-line)#password uksw
R3(config-line)#login
R3(config-line)#logging synchronous
R3(config-line)#exec-time 0 0
R3(config-line)#exit

- Konfigurasi Interface
R3(config)# interface fa0/0
R3(config-if)#ip address 192.168.2.1 255.255.255.0
R3(config-if)#no shutdown

R3(config-if)#interface se0/0/0
R3(config-if)#ip address 22.22.22.5 255.255.255.252
R3(config-if)#no shutdown
R3(config-if)#interface se0/0/1
R3(config-if)#ip address 22.22.22.2 255.255.255.252
R3(config-if)#no shutdown

- Konfigurasi Routing
R3(config)#route eigrp 100
R3(config-router)#network 22.22.22.0 255.255.255.0
R3(config-router)#network 192.168.2.0 255.255.255.0

d. Router 4
- Konfigurasi Dasar
Router>enable
Router#configurasi terminal
Router(config)#hostname R4
R4(config)#enable secret fti
R4(config)#line console 0
R4(config-line)#password uksw

R4(config-line)#login
R4(config-line)#logging synchronous
R4(config-line)#exec-time 0 0
R4(config-line)#exit

- Konfigurasi Interface
R4(config-if)#interface se0/0/0

83

R4(config-if)#ip address 12.12.12.6 255.255.255.252
R4(config-if)#no shutdown
R4(config-if)#interface se0/0/1
R4(config-if)#ip address 22.22.22.6 255.255.255.252
R4(config-if)#no shutdown

- Konfigurasi Routing
R4(config)#route eigrp 100
R4(config-router)#network 12.12.12.0 255.255.255.0
R4(config-router)#network 22.22.22.0 255.255.255.0


Dokumen yang terkait

Institutional Repository | Satya Wacana Christian University: Analisa Brute Force Attack Menggunakan Scanning Aplikasi pada HTTP Attack

0 1 2

Institutional Repository | Satya Wacana Christian University: Analisa DNS Cache Poisoning dan DNS Spoofing pada DNS Server

0 0 13

Institutional Repository | Satya Wacana Christian University: Analisa Traceback menggunakan Metode Packet Marking IPTraceback pada IDS (Intrusion Detection System) dengan Teknik Visualisasi

0 0 1

Institutional Repository | Satya Wacana Christian University: Optimalisasi Packet Capture dengan menggunakan PF_RING Driver

0 0 6

Institutional Repository | Satya Wacana Christian University: Simulasi IP Traceback dengan Algoritma Efficient Probabilistic Packet Marking pada Spoofing Attack

0 0 14

Institutional Repository | Satya Wacana Christian University: Simulasi IP Traceback dengan Algoritma Efficient Probabilistic Packet Marking pada Spoofing Attack T1 672007282 BAB I

0 0 5

Institutional Repository | Satya Wacana Christian University: Simulasi IP Traceback dengan Algoritma Efficient Probabilistic Packet Marking pada Spoofing Attack T1 672007282 BAB II

0 0 35

Institutional Repository | Satya Wacana Christian University: Simulasi IP Traceback dengan Algoritma Efficient Probabilistic Packet Marking pada Spoofing Attack T1 672007282 BAB IV

0 0 22

Institutional Repository | Satya Wacana Christian University: Simulasi IP Traceback dengan Algoritma Efficient Probabilistic Packet Marking pada Spoofing Attack T1 672007282 BAB V

0 0 2

Institutional Repository | Satya Wacana Christian University: Analisa Serangan Bruteforce Menggunakan Metode IP Traceback

0 0 30