JITTER- Jurnal Ilmiah Teknologi dan Komputer Vol. 3, No. 2 Agustus 2022

Design and Develop Forensic Application on Client Server Network

Putu Bayu Suarnata Wahyu Putraa1, I Made Agus Dwi Suarjayaa2, Kadek Suar Wibawaa3 aProgram Studi Teknologi Informasi, Fakultas Teknik, Universitas Udayana Bukit Jimbaran, Bali, Indonesia, telp. (0361) 701806

email: 1bayusuarnatawp@gmail.com, 2agussuarjaya@it.unud.ac.id, 3suar_wibawa@unud.ac.id

Abstrak

Jaringan client server memungkinkan untuk terbentuknya efesiensi dan efektivitas dalam aktivitas kelompok yang dimiliki, seperti berbagi sumber daya. Meningkatkan perkembangan teknologi beriringan juga dengan meningkatnya tingkat kejahatan yang disebabkan dengan teknologi. Kejahatan yang menggunakan teknologi tetap meninggalkan jejak yang dapat ditelurusi sehingga dapat disebut dengan digital forensic. Digital forensic biasanya dilakukan satu persatu tiap komputer dan menyebabkan membutuhkan waktu yang lebih lama. Melihat permasalah tersebut maka penelitian ini membahas mengenai rancang bangun aplikasi forensic pada jaringan client server dengan metode live forensic dan socket programming untuk melakukan forensic dengan cara bersamaan dalam satu waktu.Aplikasi menggunakan Java socket untuk membangun hubungan antara server dengan client dan metode life forensic untuk mengumpulkan data ketika client masih dalam keadaan hidup. Hasil yang didapatkan ketika membangun aplikasi adalah aplikasi mampu untuk melakukan pengambilan data dari seluruh client yang berupa data gambar tangkapan layar, data RAM, dan snapshot disk dari client secara bersamaan.

Kata kunci: Aplikasi Client Server, Life Forensic, Akuisisi Data, Pemgrograman Socket, Pemrograman Desktop

Abstract

Client server networks allow for creating efficiency and effectiveness in doing activity with teamwork, such as sharing resources. Improving technological development goes hand in hand with increasing crime rates caused by technology. Crimes that use technology still leave a trace that can be traced so that it can be paralleled with digital forensics. Digital forensics are usually done one by one per computer and cause it to take longer time to get evidence in criminal act. Looking at the problem, this study discusses the design of forensic applications on client server networks with live forensic methods and socket programming to perform forensics at the same time. Applications use Java sockets to establish a connection between the server and the client and the elevator method. The result of this study is server can collect data, like data of RAM, captured image, and snapshot disk from clients.

Keywords: Client Server Application, Life Forensic, Data Acquisition, Socket Programming, Desktop Programming

  • 1.    Introduction

Computer networks and telecommunications are already an important part of life. The utilization of computer networks either wired or wirelessly has been improved and is easy to use [1]. The use of computer networks is useful for increasing effectiveness and efficiency, such as the existence of client and server-based network applications.

The use of client and server-based network applications is widely applied in offices on corporate networks, which makes it possible to share resources between clients [2]. The implementation of a client server network is considered to provide advantages to increase the productivity of network users, with a device that is used as a tool for receive request services sent by client devices [3]. Application creation with client server architecture, can use socket

programming technology. Socket is a terminal that connects the client with the server in order to communicate with each other [4]. Socket allows for two nodes to be able to exchange information in two directions. The exchange of information can be carried out with the help of protocols TCP (Transmission Control Protocol). The TCP protocol is a standard or data communication rule used for the process of exchanging data between interconnected computers in a network based on connection oriented [5].

The existence of applications or technologies used can open new gaps to generate risks that can arise [6]. This risk can cause damage to the computer system or computer network system, resulting an unwanted harm. Losses that occur due to the use of loopholes, can be investigated so that the cause can be known and used as a reference to improve computer security [7].

An investigation to obtain evidence when a case occurs in the computer world is called digital forensic [8]. The digital forensic stage is similar to the forensic stage in general, except that the forensic process is carried out on a computer device [9]. There are various types of digital forensics, one of which is live forensic. Live forensic makes it possible to obtain data in the state that a device is still alive, such as from volatile memory to get more evidence to solve the problem that is owned [10]. The existence of Life forensic makes it possible to collect data stored by RAM when the computer is alive, so that the data obtained by the data makes it easier to use it as evidence.

Supriyono et al in a previous study discussed the use of life forensics to collect digital evidence on smart routers [11]. Life forensic is used to conduct investigations to obtain digital evidence on processes occurring on the network through smart routers. Larasati et al in a previous study discussed the use of life forensics to compare conversational applications on the Windows 10 operating system. Evidence was obtained by analyzing RAM data when using conversational applications [6]. Khurniawan et al in a previous study discussed network monitoring tools using Java autonomous agents [12]. The research discussed the formation of applications aimed at monitoring clients with the Java programming language and assistance from the SNMP (Simple Network Management Protocol) protocol. Cordova in previous research discussing designing applications with socket programming [13]. Applications are formed with socket programming technology and Java programming language. The application formed is the OBS (Optel Billing Service) client server application.

Based on previous research and problems regarding the investigation of problems that occur in computer networks that have not been able to carry out investigations of all network devices. The author wants to form a client server-based application to be able to perform live forensics on the client using Java, Java Swing and MySQL server. Java is one of the popular programming languages that can be used to create any kind of application, such as desktop, mobile, IOT [14], Java Swing Java Swing is a Java technology intended to be able to create GUI-based Java applications for the development of desktop applications that can be run crossplatform [15], and MySQL is a DMS (Database Management System) that uses SQL (Structured Query Language) commands to be able to manage database servers to store data [16]. The purpose of forming the application is to be able to collect evidence thoroughly and at the same time and can be controlled from the server.

  • 2.    Research Method

Research methods for the formation of applications consist of several stages. An overview of the research method can be seen in Figure 1.

Figure 1 shows the stages in the formation of an application that is used as a research methodology. The stages of formation of the application consist of five stages. The first stage is the analysis stage, which is the stage of analyzing the needs of the application. The design stage is a stage for designing workflows or process flows and display design for applications. The coding stage is a stage to implement the results of the design into the form of program code and into an application. The testing stage is the stage to try the application when the application has been completed, the type of testing used is black box testing. The last stage is maintenance, the stage of maintaining the application so that it can always be used, if there are additional features or bugs in the application, the stages will repeat to the analysis stage and so on.

  • 3.    Material and Method

The analysis and design process produces a method that will be applied to form the application. A general description is an overview that displays the process flow of the application in general. An overview can be seen in Figure 2.

Clients

Administrator

Figure 2 General Overview

The server application serves as a control unit to receive administrator requests and send commands to the entire client, and save data to disk or into a database server. The workflow of the application can be seen in Figure 3.

Figure 3 Flowchart Getting Data from Client

  • 4.      Result and Discussion

    4.1     System Implementation

The implantation of the system consists of several parts, such as the main menu section, the online client viewing menu, the menu of viewing disk snapshots, viewing the collected data, and viewing log data of activities carried out by the admin.

Figure 4 Main Menu

Figure 4 shows the main menu of the application. The main menu consists of several components that serve to make it easier for administrators to use the application. The online client button serves to see the client connected to the server. The collected RAM and collected SS buttons serve to see the data that has been collected. Show logs button to view data collection activity log and show path button to view and configure excluded path data.

Figure 5 Online Client

Figure 5 shows the online client menu. The online client menu consists of several constituent components that aim to display clients connected to the server. There is a table that displays the number information, the name of the client, the IP address of the client and the action button to perform disk snapshot commands on the selected client. There is a home button that functions to return to the main menu, a collect RAM button which functions to collect

RAM data from all clients connected to the server, and a collected SS button to collect screenshot data from all clients connected to the server.

m DATAC - ADMIN PANEL - SHOW SNAPSHOT DISK CLIENT

bayus -0:0:0:0:0:0:0:1

Home 11 Back

Snapshot This Disk

Name

Path

Owner

Creation Time

Last Access Time

Last Modified Time

Is Directory

Action

SRecycIe1Bin

CASRecycIe1Bin

NT AUTHORITYiSYST111

2018-09-15T07:33:50...

2022-06-13T08:10:34„ .

2019-11-18T00:24'14„

true

Q

Snapshot Disk

SSysReset

CASSysReset

BUILTINiAdministrators

2019-11-16T04:34:25..„

2022-06-11T03:15:13....

2019-11∙16T22 23 54

true

O

Snapshot Disk

SWinREAgent

CASWinREAgent

BUILTINiAdministrators

2022-05-13T02:20:38.„.

2022-06-11T03:15:13....

2022-05- 13T02 20 38

true

O

Snapshot Disk

SWINRE BACKUP PA...

CASWINRE BACKUP ...

NT AUTHORITYiSYST...

2020-06-26T13:43:01.„.

2020-06-26T13:43:01.„.

2020-06-26T13 43 01

false

O

GetFiIe

.rnd

CA.rnd

BUlLTINiAdministrators

2020-11-10T02:16:54....

2022-06-12T02:27:49....

2020-11-10T02 ' 6 54

false

1024

Get File

andromeda

CAandromeda

S-1-5-21-2517403935-...

2019-10-18T05:24:00....

2022-06-11T08:00:38....

2019 IO '8105 58 24

true

O

Snapshot Disk

belajar Iaravel

C:\belajar Iaravel

BUILTINiAdministrators

2019-12-13T03:04:11...

2022-06-12T16:32:26...

2019-10∙24T14 24 55

true

O

Snapshot Disk

belajar IaraveLrar

C:\belajar IaraveLrar

BUILTINiAdministrators

2019-12-13T03:04:02....

2022-06-12T16:10:25....

2019-12-04T18 53 50Z

false

8810610

Get File

Capure-SS-CIient

CACapure-SS-CIient

DESKT0P-KH1K1K3ib...

2022-04-24T03:51:52.„.

2022-06-11T08:07:02....

2022-04-24T03:51:52....

true

O

Snapshot Disk

Documents and Settings

CADocuments and Setti...

NT AUTHORITYiSYST...

2019-12-07T09:03:44....

2022-06-13T09:02:21....

2021∙03∙20T04 44 54

true

4096

Snapshot Disk

DRIVERS

Cadrivers

BUILTINiAdministrators

2021-11-15T01:05:44..„

2022-06-11T09:37:39.„.

2021-11-1570i C5 44

true

O

Snapshot Disk

eSupport

CAeSupport

NT AUTHORITYiSYST...

2018-12-07T05:03:22....

2022-06-11T08:07:02....

2019-07-C5T04 58 30

true

O

Snapshot Disk

g≡

CAgs

DESKT0P-KH1K1K3ib...

2021-03-31T15:35:06....

2022-06-13T09:02:16...

2021-03-31T15 35 34

true

49152

Snapshot Disk

Intel

CAlntel

BUILTINiAdministrators

2019-07-05T04:56:53....

2022-06-11T08:06:59....

2022 05 3010- C6 08

O

Snapshot Disk

Iaragon

CAIaragon

BUILTINiAdministrators

2021-11-26T01:29:41....

2022-06-13T09:01:25...

2022-06∙C6T09 CO 04

true

4096

Snapshot Disk

msdia80.dll

C:\msdia80.dll

NT AUTHORITYiSYST...

2006-12-01T15:37:14Z

2022-06-11T08:30:19...

2006-12∙01T15 37 14Z

false

904704

Get File

MSOCache

CAMSOCache

BUILTINiAdministrators

2019-08-07T05:24:51....

2022-06-11T14:49:21...

2019-08-C7T05 24 51

true

O

Snapshot Disk

node modules

CAnode modules

DESKT0P-KH1K1K3ib...

2021-10-25T00:30:56....

2022-06-11T03:15:15....

2021∙10∙25T00 30 57

true

32768

Snapshot Disk

Offering Letter Bayu - E...

CAOffering Letter Bayu ...

BUILTINiAdministrators

2022-06-11T14:49:20....

2022-06-12T13:14:29....

2 022-04- 15T02 13 09

false

499086

Get File

OneDriveTemp

CAOneDriveTemp

S-1-5-21-2517403935-...

2019-09-02T05:07:58.„.

2022-06-11T14:49:12.„.

2020-05∙03T03 54 48

true

O

Snapshot Disk

Program Files

CAProgram Files

NT SERVICEiTrustedIn...

2019-12-07T09:14:52....

2022-06-13T09:02:20...

2022-06-10T12 41 35

true

20480

Snapshot Disk

Program Files (×86)

CAProgram Files (x86)

NT SERVICEiTrustedln...

2019-12-07T09 14 52

2022 06 13108 36 56

2022∙03∙09T03 51 30

true

16384

Snapshot Disk

ProgramData

CAProgramData

NT AUTHORITYiSYST...

2O19-12-O7TO9 14 52

2022-06-13T07 34 25

2022-04-13TO8 '4 28

true

49152

Snapshot Disk

Recovery

CARecovery

NT AUTHORITYiSYST...

2019-03-07’08 16 39

2022-06-11’08 C9 02

2021-03-20T16 '8 36

true

O

Snapshot Disk

Users

CAUsers

NT AUTHORITYiSYST...

2019-12-07 T09 03 44

2022-06-13T09 02 21

2021-03-20T04 44 54

true

4096

Snapshot Disk

Windows

CAWindows

NT SERVICEiTrustedIn...

2019∙12∙07T09 03 44

2022-06-13’09 02 19

2022-06- 13T0' 46 02

true

16384

Snapshot Disk

xampp

C:\xampp

BUILTINiAdministrators

2019-08-05701 40 45

2022-06-11708 16 12

202C-06-22T06 C4 48

true

O

Snapshot Disk

Figure 6 Snapshot Disk

Figure 6 shows a menu for performing a disk snapshot process on one of the clients that connect to the server. The disk snapshot menu is a menu that functions to view and collect file data owned by the selected client directly. The disk snapshot menu displays the client name and IP address accompanied by file or directory information owned by the client. The information displayed is the name of the file or directory (file), the path the file was saved, the owner of the file or directory, the time the file was formed, the last time to access the file, the last time to modify the file, whether the file is a directory, the size of the file in bytes and the action buttons to enter the directory or take the file to be used as evidence. There is also a snapshot this disk button that functions to store a log of directory information displayed by the disk snapshot menu.

[SlDATAc-ADMlNPANEL-SHOWCOLLECTEDFiAM                                                 -    □ X

2022-6-4 Home Back

NO

ID PROCESS

Proccess name

PATH

TIME START

DURATION (minutes)

171

21436

explorer.exe

C:\WINDOWS\Explor...

15:07:28

22.0

172

11068

SVChostexe

C:\WINDOWS\system...

15:07:30

22.0

173

20968

StartMenuExperienc...

C:\WINDOWS\Syste...

15:07:39

23.0

174

17388

RuntimeBroker.exe

C:\Windows\System3...

15:07:39

23.0

175

7908

SearchAppexe

C:\WINDOWS\Syste...

15:07:39

23.0

176

11132

RuntimeBroker.exe

C:\Windows\System3...

15:07:40

23.0

177

7528

ShelIExperienceHost...

C:\WINDOWS\Syste...

15:07:40

23.0

178

18880

TextInputHost1 exe

C:\WINDOWS\Syste...

15:07:40

23.0

179

12920

YourPhone.exe

C:\Program FiIesWin...

15:07:41

23.0

180

5520

SettingSyncHost.exe

C: WlNDOWSIsystem...

15:07:41

23.0

181

22472

LockApp.exe

C: WlNDOWSISyste...

15:07:41

23.0

182

21960

RuntimeBroker.exe

C: WindowsISystemS...

15:07:41

23.0

183

13176

RuntimeBroker.exe

C: WindowsISvstemS...

15:07:43

23 O

Figure 7 Collected Data RAM

Figure 7 is a menu to view RAM data from one of the clients on a certain date that has been collected previously. The menu displaying RAM data is intended to show RAM data information that has been successfully collected by the server. The information displayed on the menu is the number of service, the process id of the running application service, the name of the process, where the process was run, the time the process was run, and the length of time the process ran in units of minutes.



LOGS


this log

Get RAM from bayus ___________________________________

Get Screenshot from bayus_______________________________

Get Snapshot from bayus

Get File Offering Letter Bayu - Extend Kontralcpclf from bayus

Get RAM from bayus

Get RAM from bayus____________________________________

Get RAM from bayus_____________________________________

Get RAM from bayus_____________________________________

Get RAM from bayus________________________________

Get RAM from bayus____________________________________

Get RAM from bayus_____________________________________

Get RAM from bayus


Get Screenshot from bayus

Get RAM from bayus

Get RAM from bayus

Get RAM from bayus

Get RAM from bayus

Get File belajar IaraveLrar from bayus

Get RAM from bayus________________

Get RAM from bayus

Get RAM from bayus


Get Screenshot from bayus

Get RAM from bayus______

Get RAM from bayus

Get RAM from bayus

Get RAM from bayus

Get RAM from bayus

Get RAM from bayus_____

Get RAM from bayus

Get RAM from bayus

Get RAM from bayus

Get RAM from bayus______

Get Snapshot from bayus

Get File ads.txt from bayus

Get RAM from bayus

Get Screenshot from bayus


Figure 8 Log Activity


O


2022-06-12 20:39:19.0

2022-06-12 21:13:52.0

2022-06-12 21:13:57.0

2022-06-12 21:14:14.0

2022-06-12 21:14:30.0

2022-06-12 23:23:51 0


2022-06-12 23:28:08.0

2022-06-12 23:39:37 0

2022-06-12 23:46:29.0


2022-06-12 23:47:46.0


CREATED AT


π


12022-06-12 23:50:12.0



2022-06-13 00:15:22.0

2022-06-13 00:18:21.0

2022-06-13 00:21:52.0

2022-06-13 00:21:57.0

2022-06-13 00:23:51.0


2022-06-13 00:25:02.0



2022-06-13 00:40:00.0

2022-06-13 00:42:44.0

2022-06-13 00:42:48.0

2022-06-13 00:42:49.0

2022-06-13 00:42:49.0


2022-06-13 10:30:56.0

2022-06-13 10:31:48.0

2022-06-13 10:32:35.0


2022-06-1310:33:14.0


Figure 8 is a menu to show logs of data collection activities from clients carried out by the admin. The logs feature is intended to show the history of admin activities when retrieving data, so that the data retrieved can be accounted for and the admin does not retrieve data arbitrarily. The logs are stored in a database that stores data on RAM data ownership activities, screenshots, disk snapshots, and one of the files obtained from the client.

  • 4.2    Testing

Testing is a process to try applications that have been made. Testing is aimed at ensuring that the application is running properly. The type of testing used in this study was using black box testing. Testing is done by connecting several clients on the server and trying to run the features possessed by the application. The following are the results of testing and scenarios from the process of trying the application that has been created.


, ⅛ DATAC - ADMIN PANEL - SHOW ONLINE CLIENTS

Home

Collected SS

Collect RAI

NO

CLIENT NAME

IPADDRESS

Action

1

aldiw

0:0:0:00:0:0:1

Snapshot Disk

2

bayus

0:0:0:0:0:0:0:1

Snapshot Disk

3

asus

0:0:0:0 0:0:0:1

Snapshot Disk

4

FireRex

0:0:0:0 0:0:0:1

Snapshot Disk

5

FireRex

0:0:0:0:0:0:0:1

Snapshot Disk

6

ADMIN

127.0.0.1

Snapshot Disk

Figure 9 All Client Connected to Server

  • Figure 9    shows several clients that have successfully connected to the server. The image shows five clients connected to the server that the data will be tried to retrieve as digital evidence.

APP                  E+ E^ O S

7 IjJ .vsc□de

> B bin

> M Capture-RAM-CIient

v ri Capture-SS-Client

> ri 2022-04-24

> M 2022-04-25

> M 2022-04-27

> M 2022-04-28

> ri 2022-04-29

> ri 2022-05-24

> ri 2022-06-12

* ri 2022 ⅛13

Ki aldiwA655114534106.zipU

B asus-1655114533571.zipU

B bayus-1655107533910zipU

B bayus-1655114536746.zipU

B FireRex-1655114533385.zipU

  • Figure 10    Collected Images

Figure 10 shows that it has successfully collected image data obtained from all clients at the same time. Image data collection is carried out by pressing the SS collect button. Image data is grouped into a directory called from the date of capture of the image data and is named according to the client who owns the image data. Image data is compressed into a zip file so that it is easier to send data from the client to the server because the number of images collected is more than one.

) File Edit Selection View Go Run Terminal Help


1655114654140-image_2022-05-12.12-14-23.png -App - Visual StudioCode


C Q LD I OS


, ECIientHandIerjava :: ∣∣


O Ov t.java


■ 1655TT4654140-ιmage 2022-05-12 T2-U-23.png U ×


P

0?

S


> OPEN EDITORS

^ APP                 C+ E+ 6 θ

} B⅝ .vscode

  • >    B bin

  • >    M Capture-RAM-CIient

  • >    ■! Capture-SS-CIient

v f£ File-From-Clinet

v M aldiw 2022-06-13              ∙

■ 165511465414G-image 2022-0... U

> M bayus

> * Iib


File-From-Clinet > aldiw > 2022-06-13 > ■ 1655114654140-image_2022-05-12.12-14-23.png



> Ml Snapshot-Disk-Client


PROBLEMS OUTPUT TERMINAL JUPYTER DEBUG CONSOLE


^∙ Run: Server 4-


  • Figure 11    Result Image from Client

Figure 11 shows the results of one of the images successfully received by the server. The image indicates that the server has succeeded in asking the client to collect data according to the administrator's request which will later be used as digital evidence. The result of the collection of disk snapshots can be seen in Figure 12

flb>y<ιs-1658a4S1βl4β1M-NoUfXd                                                                                                                                                                                                            - O

File Edit FOrmet View Help

NanecPathcOwnercCreation Tiie1Iast Access Tiiie1Last Modified TinecIs OirectorycSizet

SRecycle.BincCASRecycle.BlncHT AUTHORITYSYSTEMc2018-09-15T07:33:50.299936Z»2022-07-25T15:46:30.29169072'2019-11-18100:24:14.8435079Zctruec0

SSysResetcC ASSysResetcBUILTIH\Adninlstrators"2019-ll-16T04:34:25.4483669Zc2022-06-llT03:15:13.6806561Zc2019-ll-16T22:23:54.1745521Zctruec0

SWinREAgentcC ASWinREAgentcBUILTIHAdministratorsc2022-07-15T03i23:39.7711462Zc2022-07-lST03l23l39.7731471Zc2022-07-15T03l23l39.7731471Zctruec0

SwiHRE-BAcKup-PARTlTioH-MARKERcCAswiNRE-BACKUP-PARTITiorLMARKERcHT AUTHORITYXSYSTEM-IOIO-ae-ieTia:43:01.9283111Zc2θ2θ-06-26T13:43:01.9283111Zc202θ-06-26T13:43:01.9283ailZ∙false∙0 .rnd-CA.rndcBUILTIN\Adrninistrators-2020-ll-10T02:16:54.5696356Z-2022-07-26T13:36:49.0193863Z-2020-ll-10T02:16:54.5696356Z-falsec1024

and ronιeda-C Aand romeda"S-l-5-21-2517403935-1864186000-2444467795-1001-2019-10-18105:24:00.6207657Z-2022-07-09102:31:02.5161986Z-2019-10-18T05:58:24.1956839Z-true"0

Belajar_laravel-C:\belajar_laravel-8UILTIH\A<tainistrators-2019-12-13T03:04:ll.21919652-2022-07-09102:31:02.S161986Z-2019-10-24T14:24:S5.9142409Z"truec0

Bela jar.laravel.rarcC Abelajar-Iaravel. rarcBUILTINAdministrators "2019-12-13103:04:02.1193976Zc2022-07-2ST14:39:Sl. 7S267822c2019-12-04T18: S3 A0Zcfalsec8810610

Capure-SS-ClienfCACapure-SS-ClientcOESKTOP-KHlKlK3Bayusc2022-04-24T03:51:52.644S002Zc2022-07-09T02:31:02.5161986Zc2022-04-24T03:51:52.6448002Zctruec0

Docunents and SettlngscCADocuments and SettingscNT AUTHORITY\SYSTEMc2019-12-07T09:03:44.5394998Z"2022-07-26T14:19:17.7202839Zc2021-03-20T04:44:54.5550915Zctruec4096

DRIVERScCAORIVERSc8ILTINAdministratorsc2021-ll-15T01:05:44.2448028Zc2022-07-09T02:31:02.5161986Zc2021-ll-15T01:05:44.2458003Z"truec0

eSupport"CAeSupportcHT AUTHORITY\SYSTEM-2018-12-07T05:03:22.6230476Z-2022-07-09T02:31:02.5161986Z-2019-07-05T04:58:30.7578755Zctruec0

extract"CAextractcDESKTOP-KHlKlK3\Bayus"2022-06-20T02:10:53.10Θ3491Z"2022-Θ7-09T02:31:02.5151938Zc2022-06-20102:10:S3.1013483Zctruec0

Extract-FilecC:\Extract-FilecDESKTOP-KHlKlK3\Bayus-2022-06-20T02:12:01.4279772Zc2022-07-09T02:31:02.51S1988Zc2022-06-20T02:12:01.42997SZctrue-0

gscC:\gscOESKTOP-KHlKlK3\Bayusc2021-03-31TlS:3S:06.9S13442Zc2022-07-26T14:02:22.4783742Zc2021-03-31T15:35:34.7325614Zctruec491S2

IntelcC :\Intel-8UILTIH\Adminlstratorsc2019-07-05T04:S6:S3.9481S31Zc2022-07-24T13:01:04.9062288Zc2022-07-24T13:01:04.9062288Zctruec0

IaragoncC : laragoncBUILTINAdmlnistratorsc2021-ll-26T01:29:41.8382493Zc2022-07-26T14:19:19.3638249Zc2022-07-25T16:08:12.5060429Zctruec4096

msdia80.dllcCAnsdiaS0.dllcNT AUTHORITYSYSTEMc200β-12-01TlS:37:14Zc2022-07-2ST02:31:20.338061SZc2006-12-θlT15:37:14Zcf≡lsec904704

MSOCachecC: MSOCachecBUILTIHAd"lnlstratorsc2019-08-07T05: 24:51.0571508Zc2022-06-llT14:49:21.1018716Zc2019-08-07T05:24:51.0571S08Zctruec0

node_modulescCAnode_nodulescOESKTOP-KHlKlK3\Bayusc2021-10-25T00:30:56.1648649Zc2022-07-25T13:21:08.3489918Zc2021-10-25T00:30:57.5454512Zctruec32768

Offering Letter 8ayu - Extend Kontrak-PdfcCAOffering Letter Bayu - Extend Kontrak.pdfBUILTIH\Ad">inistrators"2022-06-llT14:49:20.3188704Zc2022-06-15T05:53:01.3664917Z-2022-04-lST02:13:09.2940983Zcfalsec499086

OneDriveTenpcC AOneDriveTenrpcS-l-5-21-2517403935-1864186000-2444467795-1001-2019-09-02T05:07:58.4097715Z-2022-06-11114:49:12.9561S24Z-2020-05-03T03:54:48.8179628Z"true-0

Program FilescCAPrograni FilescNT SERVICE\TeustedInstaller-2019-12-07T09:14:52.1474171Z-2022-07-26T14:19:17.3228485Z-2022-07-08T0S:28:0S.884159Z"true-20480

Program Files (x86)cCAProgram Files (x86)cNT SERVICE\TrustedInstaller"2019-12-07T09:14:S2.18974062-2022-07-26T14:18:36.62646652-2022-03-09103:51:30.4384779Z-true-16384

ProgramDatacCAProgranOatacHT ATHORITYSYSTEMc2019-12-07T09:14:52.20629442-2022-07-26113:12:43.77S7079Zc2022-04-13108:14:28.488S067Zctruec491S2

RecoverycC:XRecovery-HT ATHORITYSYSTEMc2019-03-07T08:16:39.9742882Z"2022-Θ6-11TΘ8:09:02.0678273Zc2021-03-20T16:18:36.3429046Zctruec4096

UserscCAUserscHT AUTHORITY\SYSTEMc2019-12-07T09:03:44.5394998Zc2022-07-26T14:19:17.7202839Zc2021-03-20T04:44:54.5550915Zctruec4096

WindowscCAWindowscNT SERVICE\TrustedInstallerc2019-12-07T09:03:44.539499SZ"2022-07-26T14:18:52.966522Zc2022-07-26T13:04:02.7887032Zctruec16384

×amppcC A×amppc8UILTIHAdmlnlstratorsc2019-08-05T01l40i45.6427765Zc2022-07-2ST13:21:47.5799425Z"2020-06-22T06:04:48.4454675Zctrue-12288

The result of the disk snapshot is in the form of file or directory name information in a path that collected. The purpose of taking a disk snapshot is to record the activity of a file or directory owned by the client. Information that is felt to be strange, such as strange activity dates, can be stored and used as evidence. The testing scenarios carried out can be seen in Table 1.

Table 1 Scenario Testing

Testing Activities

Test Scenarios

Expected results

Test Results

Conclusion

View client data connected to the server

Enter the Show Client Online menu

Can see all clients connected to the server along with personal data from the client

Can see all clients connected to the server along with personal data from client

Fulfilled

Retrieve screen capture data that has been collected by each Client

Pressing the Collect SS button

Get all the screenshot data that has been collected by each client

Get all the screenshot data that has been collected by each client

Fulfilled

Take a disk snapshot data from one of the clients

Pressing the Snapshot This Disk button

Get information about the specified disk path from one of the clients

Get information about the specified disk path from one of the clients

Fulfilled

  • 5.    Conclusion

The conclusion of this study is that the application can provide information about the client connected to the server accompanied by name and IP address information. The server through the application is able to collect RAM data, screenshots, and disk snapshots owned by the connected client. Administrators can view data that has been collected by the server through the application or is arranged by the application to a predefined directory for the data that has been stored. The results of data collection carried out by the server are expected to be able to be used as digital evidence in digital forensic activities.

Reference

  • [1]    A. Fadlil, I. Riadi, and A. Nugrahantoro, “Data Security for School Service Top-Up Transactions Based on AES Combination Blockchain Technology,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 11, no. 3, p. 155, 2020.

  • [2]    C. Rizal, M. Zen, and M. Eka, “Perancangan Server Kantor Desa Tomuan Holbung Berbasis Client Server,” vol. 3, no. 1, pp. 27–33, 2022.

  • [3]    R. A. Yusda, “Rancang Bangun Jaringan Client Server Berbasis Linux Debian 6.0,” Semin. Nas. R., vol. 1, no. 1, p. 311, 2018.

  • [4]    U. M. Wahyuni and F. Fitrilina, “Implementasi Client-Server Pada Sistem Informasi Pengolahan Nilai Siswa Menggunakan Object-Oriented Programming,” J. Amplif. J. Ilm. Bid. Tek. Elektro Dan Komput., vol. 10, no. 1, pp. 26–32, 2020.

  • [5]    I. F. Anshori, “Implementasi Socket Tcp/Ip Untuk Mengirim Dan Memasukan File Text Kedalam Database,” Responsif, vol. Vol 1 No 1, no. 1, pp. 1–5, 2019.

  • [6]    N. R. Maulana, P. Dewonoto, L. Santoso, and R. D. Fajri, “Edukasi Bahaya Software Bajakan Serta Pengenalan Aplikasi Freewere Sebagai Alternatif,” vol. 2, pp. 301–303, 2021.

  • [7]    V. Rosalina and D. Herli, “Pengembangan Model Tahapan Digital Forensic Untuk

Mendukung Serang Sebagai Kota Bebas Cybercrime,” Semin. Nas. Ris. Terap., vol. 12, pp. 0–5, 2015.

  • [8]    T. E. WIJATMOKO, “DIGITAL FORENSIC READINES INDEX (DiFRI) UNTUK MENGUKUR KESIAPAN PENANGGULANGAN CYBERCRIME PADA KANTOR WILAYAH KEMENTERIAN HUKUM DAN HAM DIY,” Cyber Secur. dan Forensik Digit., vol. 4, no. 1, pp. 18–23, 2021.

  • [9]    I. Zuhriyanto, A. Yudhana, and I. Riadi, “Perancangan Digital Forensik pada Aplikasi Twitter Menggunakan Metode Live Forensics,” Semin. Nas. Inform. 2008 (semnasIF 2008), vol. 2018, no. November, pp. 86–91, 2018.

  • [10]    T. D. Larasati and B. C. Hidayanto, “Analisis Live Forensics Untuk Perbandingan Aplikasi Instant Messenger Pada Sistem Operasi Windows 10,” Sesindo, vol. 6, no. November, pp. 456–256, 2017.

  • [11]    A. R. Supriyono, B. Sugiantoro, and Y. Prayudi, “Eksplorasi Bukti Digital Pada Smart Router Menggunakan Metode Live Forensics,” Infotekmesin, vol. 10, no. 2, pp. 1–8, 2019.

  • [12]    E. S. Khurniawan, L. A. S. I. A, and I. B. K. Widiartha, “Perancangan Network Monitoring Tools Menggunakan Autonomous Agent Java,” vol. 7, no. 2, pp. 115–121, 2016.

  • [13]    R. Cordova, “Design and Implementation of Client-Server Based Application using Socket Programming in a Distributed Computing Environment,” no. January 2018, 2017.

  • [14]    A. P. C. Udaksana and W. R. Kusaeri, “Rancang Bangun Aplikasi Digital School Dengan Java NetBeans IDE 8.1,” Irons, pp. 332–336, 2018.

  • [15]    A. R. Ni Luh Ayu Widary, Halimatus Sa’diah, “RANCANG BANGUN SISTEM INFORMASI ADMINISTRASI MANAJEMEN PADA SALON CAPTUS BERBASIS JAVA,” Syntax Idea, vol. 2, no. August, pp. 458–470, 2020.

  • [16]    M. S. Novendri, A. Saputra, and C. E. Firman, “Aplikasi Inventaris Barang Pada MTS Nurul Islam Dumai Menggunakan PHP Dan MySQL,” Lentera Dumai, vol. 10, no. 2, pp. 46–57, 2019.