Mata Kuliah: Digital Forensic for Military Purposes | 3 SKS
Setelah pertemuan ini, mahasiswa mampu:
Dua pendekatan utama (Marcus Ranum):
Forensik jaringan dalam konteks pertahanan Indonesia:
| Aspek | Forensik Komputer | Forensik Jaringan |
|---|---|---|
| Sumber Data | Hard disk, memori, registry | Packet captures, logs, flow data |
| Sifat Data | Statis (data at rest) | Dinamis (data in motion) |
| Volatilitas | Rendah-sedang | Sangat tinggi |
| Cakupan | Satu sistem/perangkat | Seluruh segmen jaringan |
| Waktu | Post-mortem analysis | Real-time / near real-time |
Komponen kunci infrastruktur forensik jaringan:
| Komponen | Fungsi | Kelebihan |
|---|---|---|
| Network TAP | Perangkat inline, kopi semua traffic | Passive, full-duplex, fail-safe |
| SPAN/Mirror Port | Fitur switch, mirror traffic ke port monitoring | Tanpa biaya tambahan, mudah dikonfigurasi |
| Inline IDS/IPS | Deteksi dan pencegahan intrusi | Alert otomatis, real-time protection |
[Internet] ── [Firewall] ── [DMZ] ── [IDS/IPS] ── [Core Switch] ── [Endpoints]
│ │ │
TAP #1 TAP #2 SPAN Port
(Perimeter) (Pre-Firewall) (Internal Traffic)
Konteks Militer: Pada jaringan pangkalan, sensor wajib dipasang minimal di gateway internet (semua traffic eksternal), antara DMZ dan LAN (lateral movement), dan segmen classified (full audit).
💡 Tips: Untuk anggaran terbatas, prioritaskan flow data — fitur bawaan router, storage minimal, cakupan memadai.
Gold standard forensik jaringan — merekam keseluruhan paket termasuk header dan payload.
Informasi yang dapat diekstrak:
⚠️ Estimasi Storage: Jaringan 100 Mbps, utilisasi 30% → ~325 GB/hari. Gunakan retention policy!
Source IP : 192.168.1.100
Destination IP : 203.0.113.50
Source Port : 49152
Destination Port: 443
Protocol : TCP (6)
Bytes : 1,245,678
Packets : 847
Start Time : 2025-01-15 08:23:45
TCP Flags : SYN, ACK, PSH, FIN
Rasio storage PCAP vs Flow ≈ 500:1 — sangat efisien untuk monitoring jangka panjang.
| Sumber | Informasi Kunci |
|---|---|
| Firewall | Koneksi allow/deny, rule terpicu |
| IDS/IPS | Alert keamanan, signature match |
| Proxy Server | URL diakses, user agent, response code |
| DNS Server | Query & response, NXDOMAIN |
| DHCP Server | IP assignment, MAC address |
| VPN Gateway | Koneksi VPN, autentikasi user |
Chain of custody tetap berlaku (Pertemuan 2) dengan adaptasi khusus:
Nomor Bukti : NF-2025-001
Jenis : Full Packet Capture (PCAP)
Sumber : TAP pada gateway utama Kodam IX/Udayana
Hash SHA-256 : 1234abcd5678efgh...
Tool Capture : tcpdump 4.9.3 / libpcap 1.10.1
Setiap layer TCP/IP memberikan informasi forensik yang berbeda:
| Layer | Protokol | Informasi Forensik |
|---|---|---|
| Application (7) | HTTP, DNS, SMTP, FTP | Konten, URL, email, file transfer |
| Transport (4) | TCP, UDP | Port number, session, flags |
| Internet (3) | IP, ICMP | IP sumber/tujuan, TTL, routing |
| Network Access (2) | Ethernet, Wi-Fi | MAC address, VLAN tags |
Client (192.168.1.100) Server (10.0.0.1:80)
| |
|---- SYN (seq=1000) -------->| ← Inisiasi
| |
|<--- SYN-ACK (seq=2000, ------| ← Konfirmasi
| ack=1001) |
| |
|---- ACK (seq=1001, -------->| ← Established
| ack=2001) |
Implikasi Forensik: Banyak SYN tanpa ACK = SYN scan/SYN flood. SYN+SYN-ACK+RST = stealth port scanning.
| Flag | Signifikansi Forensik |
|---|---|
| SYN | Inisiasi koneksi; banyak SYN tanpa ACK = SYN scan/flood |
| ACK | Koneksi established; ACK scan untuk bypass firewall |
| FIN | Terminasi normal; FIN scan untuk stealth scanning |
| RST | Koneksi direset; port tertutup atau filtered |
| PSH | Push data; indikasi transfer data aktif |
# Wireshark: Deteksi SYN scan
tcp.flags.syn == 1 && tcp.flags.ack == 0
203.0.113.50 → 10.0.0.5:22 [SYN] → [RST,ACK] Port TERTUTUP
203.0.113.50 → 10.0.0.5:80 [SYN] → [SYN,ACK] → RST Port TERBUKA ⚠️
203.0.113.50 → 10.0.0.5:443 [SYN] → [SYN,ACK] → RST Port TERBUKA ⚠️
203.0.113.50 → 10.0.0.5:3389 [SYN] → [RST,ACK] Port TERTUTUP
203.0.113.50 → 10.0.0.5:3306 [SYN] → [SYN,ACK] → RST Port TERBUKA ⚠️
⚠️ Temuan Kritis: Port MySQL (3306) terbuka dan dapat diakses dari luar — risiko keamanan tinggi pada jaringan Kodam!
Pola: Satu IP sumber → banyak port pada satu target = TCP SYN Scan
| Elemen DNS | Nilai Forensik |
|---|---|
| Query name | Domain yang diakses oleh host |
| NXDOMAIN | Domain tidak ada — banyak NXDOMAIN = DGA malware |
| TXT records | Sering digunakan untuk DNS tunneling |
| TTL rendah | Indikator C2 fast-flux |
# Wireshark: DNS response NXDOMAIN
dns.flags.rcode == 3
# DNS TXT records (potential tunneling)
dns.qry.type == 16
Query DNS Normal:
www.example.com → 15 karakter
Query DNS Tunneling:
dGhpcyBpcyBhIHRlc3Q.data.evil.com → 34 karakter
(Base64 "this is a test" sebagai subdomain)
Indikator: ✅ Query name panjang (>30 char) ✅ Volume tinggi ke satu domain ✅ Tipe TXT/NULL ✅ Entropy tinggi ✅ Pola periodik
Query 1: www.google.com (A record) ✅
Query 2: mail.kemhan.go.id (MX record) ✅
Query 3: dGhpcyBpcyBhIHRlc3Q.data.xyz123.net (TXT) ❌
Query 4: c2VjcmV0IGZpbGUgY29udGVudA.data.xyz123.net (TXT) ❌
Query 5: www.bing.com (A record) ✅
Query 6: ZW5jcnlwdGVkIGRhdGEgaGVyZQ.data.xyz123.net (TXT) ❌
Temuan: Query 3, 4, 6 = DNS Tunneling. Base64-encoded data dalam subdomain, semua menuju xyz123.net via TXT record. Decode: "this is a test", "secret file content", "encrypted data here".
HTTP (clear-text) memberikan informasi sangat kaya:
POST /upload.php HTTP/1.1
Host: file-share.suspicious-site.net
Content-Type: multipart/form-data
Content-Length: 15728640
User-Agent: curl/7.68.0
filename="laporan_operasi_q4.xlsx"
🚨 Data Exfiltration terdeteksi!
• curl (bukan browser) → transfer disengaja
• File: "laporan_operasi_q4.xlsx" → dokumen operasional militer
• 15 MB ke domain eksternal mencurigakan
# Wireshark: SNI (domain yang diakses via HTTPS)
tls.handshake.extensions_server_name
# Certificate info
tls.handshake.certificate
Jenis IDS berdasarkan metode deteksi:
| Jenis | Metode | Pro/Con |
|---|---|---|
| Signature-based | Cocokkan pola yang diketahui | ✅ Akurat, ❌ Tidak deteksi zero-day |
| Anomaly-based | Deteksi penyimpangan dari baseline | ✅ Deteksi serangan baru, ❌ False positive tinggi |
| Hybrid | Kombinasi signature + anomaly | ✅ Cakupan luas, ❌ Kompleksitas tinggi |
[**] [1:2024217:3] ET MALWARE Trickbot CnC Beacon [**]
[Classification: A Network Trojan was Detected] [Priority: 1]
01/15/2025-08:23:45.123456
192.168.1.100:49152 -> 203.0.113.50:443
TCP TTL:128 TOS:0x0 ID:12345
Interpretasi:
• ET MALWARE Trickbot CnC Beacon — komunikasi C2 malware Trickbot
• Priority: 1 — level kritis
• Host internal 192.168.1.100 berkomunikasi dengan C2 server eksternal
08:20:00 [DNS] 192.168.1.100 → exploit-kit.malware.net
08:20:01 [FW] ALLOW → 203.0.113.50:80 (HTTP)
08:20:02 [IDS] ET EXPLOIT Kit Landing Page detected
08:20:05 [Proxy] GET /payload.exe → 200 OK
08:20:10 [FW] ALLOW → 198.51.100.25:443 (HTTPS)
08:20:11 [IDS] ET MALWARE CnC Beacon Activity
08:21:00 [FW] ALLOW → 198.51.100.25:443 (5.2 MB)
08:21:30 [IDS] ET POLICY Large Outbound Data Transfer
Kill Chain: Delivery → Exploitation → Installation → C2 → Exfiltration — dalam ~90 detik!
| Waktu | Event | Kill Chain |
|---|---|---|
| 08:20:00 | DNS resolve exploit kit | Delivery |
| 08:20:02 | Exploit kit landing page | Exploitation |
| 08:20:05 | Download payload.exe | Installation |
| 08:20:10 | Koneksi HTTPS ke C2 | Command & Control |
| 08:21:00 | Transfer 5.2 MB keluar | Actions on Objectives |
Tantangan khusus forensik jaringan nirkabel:
| Tantangan | Penjelasan |
|---|---|
| Broadcast medium | Sinyal bisa ditangkap siapa saja dalam jangkauan |
| Encryption | WPA2/WPA3 mengenkripsi payload |
| Attribution | MAC address dapat di-spoof |
| Legal issues | Intersepsi wireless perlu otorisasi |
Device MAC: 11:22:33:44:55:66
Probe for SSID: "HOTEL-WIFI-FREE"
Probe for SSID: "AIRPORT-GUEST"
Probe for SSID: "KODAM-INTERNAL" ← Pernah di jaringan militer
Probe for SSID: "HOME-NETWORK-Admin"
Implikasi: Probe request mengungkap riwayat koneksi perangkat — pernah di hotel, bandara, Kodam, dan rumah. Informasi pergerakan pemilik!
Scan Wi-Fi di area markas:
============================================================
SSID BSSID CH Encryption
KODAM-WIFI-SECURE AA:BB:CC:DD:EE:FF 6 WPA2-Enterprise ✅
KODAM-WIFI-SECURE 11:22:33:44:55:66 1 WPA2-PSK ⚠️ ROGUE!
GUEST-NETWORK AA:BB:CC:DD:EE:01 11 WPA2-PSK ✅
FREE-WIFI-KODAM 99:88:77:66:55:44 6 Open ⚠️ ROGUE!
Indikator Rogue AP:
• SSID sama tapi BSSID berbeda ← Evil Twin
• Enkripsi berbeda (PSK vs Enterprise)
• AP Open di area keamanan ← Honeypot
| Teknik | Menu/Filter | Kegunaan |
|---|---|---|
| Follow TCP Stream | Klik kanan → Follow → TCP | Lihat keseluruhan sesi |
| Export Objects | File → Export Objects | Ekstrak file yang ditransfer |
| Conversations | Statistics → Conversations | Ringkasan semua komunikasi |
| IO Graph | Statistics → I/O Graph | Visualisasi volume traffic |
| Expert Info | Analyze → Expert Info | Warning & error otomatis |
# Port Scanning (SYN Scan)
tcp.flags.syn == 1 && tcp.flags.ack == 0
# SSH Brute Force
tcp.dstport == 22 && tcp.flags.syn == 1
# HTTP Login Brute Force
http.request.method == "POST" && http.request.uri contains "login"
# DNS Exfiltration
dns.qry.name.len > 50
# ICMP Tunneling
icmp.type == 8 && data.len > 64
# C2 Beaconing (HTTP)
http.user_agent == "" || http.user_agent contains "curl"
| Metode | Teknik | Deteksi |
|---|---|---|
| DNS Tunneling | Data encoded dalam subdomain | Query panjang, volume tinggi |
| ICMP Tunneling | Data dalam payload ping | Payload > 64 bytes |
| HTTP Tunneling | Data dalam header/URL kustom | Header non-standar |
| Steganography | Data dalam gambar/file | Analisis statistik file |
Temuan: Host 192.168.1.50 mengirim 200 ICMP echo request/menit ke 203.0.113.100, payload rata-rata 512 bytes.
| Parameter | Normal Ping | Temuan Ini |
|---|---|---|
| Frekuensi | 1-4/siklus | 200/menit |
| Payload | 32-64 bytes | 512 bytes |
| Durasi | Beberapa detik | 24 jam terus-menerus |
Estimasi Exfiltration: 512 bytes × 200/menit × 60 × 24 = ~140.6 MB dalam 24 jam!
Meskipun payload terenkripsi, metadata tetap bernilai:
JA3 Hash Examples:
Malware Trickbot : e7d705a3286e19ea42f587b344ee6865
Cobalt Strike : 72a589da586844d7f0818ce684948eea
Chrome Browser : b32309a26951912be7dba376398abc3b
Firefox Browser : 839bbe3ed07fed922ded5aaf714d6842
curl tool : 456523fc94726331a4d5a2e1d40b2cd7
Kegunaan: Identifikasi malware yang menyamar sebagai browser, deteksi tool otomatis, dan membedakan tipe klien berdasarkan implementasi TLS.
Latar Belakang: Anomali terdeteksi di jaringan Kodam XII/Tanjungpura — IDS alert berkala dari satu workstation, outbound traffic meningkat di luar jam kerja.
[IDS] 02:00:03 ET MALWARE CnC Activity 192.168.10.45 → 185.100.87.XXX
[IDS] 02:05:02 ET MALWARE CnC Activity 192.168.10.45 → 185.100.87.XXX
[IDS] 02:10:04 ET MALWARE CnC Activity 192.168.10.45 → 185.100.87.XXX
Pola Beaconing: Alert setiap ~5 menit pada jam 02:00 dini hari → komunikasi C2 terjadwal.
| Temuan | Detail |
|---|---|
| Malware | Cobalt Strike beacon (JA3 match) |
| C2 Server | 185.100.87.XXX (cloud-sync[.]net) |
| Beaconing | Interval 5 menit via HTTPS |
| Exfiltration | ~45 MB data pada jam 02:30 |
| Host | WS-INTEL-007 (unit Intelijen Kodam) |
| Certificate | Self-signed, CN=localhost ← Red flag! |
| Tool | Tipe | Keunggulan |
|---|---|---|
| Wireshark | GUI Analyzer | Visual, interaktif, fitur lengkap |
| tcpdump | CLI Capture | Ringan, cepat, semua Linux |
| TShark | CLI Analyzer | Scriptable, automatable |
| NetworkMiner | NFAT | Auto-extract files & credentials |
| Zeek | NSM Framework | Log terstruktur, analisis mendalam |
tcpdump → Capture (ringan, cepat)
↓
NetworkMiner → Quick Triage (auto-extract)
↓
Zeek → Automated Logs (conn, dns, http, ssl)
↓
TShark → Scripted Extraction (batch processing)
↓
Wireshark → Deep Analysis (per-paket, Follow Stream)
💡 Pro Tip: Untuk PCAP besar (>1 GB), jangan langsung buka di Wireshark! Gunakan Zeek/TShark terlebih dahulu untuk filtering, baru analisis subset di Wireshark.
Regulasi monitoring jaringan di Indonesia:
| Regulasi | Ketentuan |
|---|---|
| UU No. 1/2024 (ITE) | Intersepsi perlu perintah pengadilan/penegak hukum |
| UU No. 3/2002 | Wewenang pertahanan dalam pengamanan informasi |
| PP No. 71/2019 | Kewajiban logging pada penyelenggaraan sistem elektronik |
Konteks Militer: Monitoring pada jaringan TNI memerlukan otorisasi komandan, prinsip proporsionalitas, banner login yang menginformasikan monitoring, dan penyimpanan sesuai tingkat klasifikasi.
Quick Quiz: Sebutkan tiga jenis covert channel yang dapat digunakan untuk data exfiltration, dan jelaskan bagaimana masing-masing dapat dideteksi menggunakan Wireshark!
Hint: Pikirkan tentang DNS tunneling, ICMP tunneling, dan HTTP tunneling — masing-masing memiliki pola anomali yang unik.
Pertemuan 10: Forensik Jaringan
Ada pertanyaan?