Pengujian Penetrasi Jaringan Lokal dengan Metasploit Framework
DOI:
https://doi.org/10.63822/sht2dr90Keywords:
Penetration Testing, Local Network, Metasploit Framework, Network Security, System ExploitationAbstract
Local network security is a vital component in maintaining the integrity and confidentiality of data in information systems. This study aims to identify and evaluate the vulnerability of the Windows 7 operating system through penetration testing using the Metasploit Framework. The method used is an experiment with attack si mulation in a controlled virtual environment. The test target is a Windows 7 system that has not received the MS17-010 security patch and still activates the SMBv1 protocol. The EternalBlue exploit (CVE-2017-0144) is used to exploit the vulnerability. The test results show that the exploitation was successful, marked by the acquisition of Meterpreter shell access to the target system, as well as the ability to retrieve system information and desktop screenshots. These findings confirm that systems that have not been updated are highly vulnerable to remote code execution attacks. This study recommends the application of security patches, disabling SMBv1, and configuring firewalls as crucial mitigation steps. The results of this study are expected to be a reference in the practice of evaluating local network security, especially in infrastructure that still uses old operating systems.
References
R. A. Wijayanti et al., “Analisis Perbandingan Penggunaan Kali Linux pada Windows Subsystem for Linux (WSL) dan VirtualBox terhadap OpenSSL Benchmark Testing,” J. Educ., vol. 06, no. 01, pp. 10146–10154, 2023.
M. R. Rusydianto, E. Budiman, and H. J. Setyadi, “Implementasi Teknik Hacking Web Server Dengan Port Scanning Dalam Sistem Operasi Kali Linux,” Pros. Semin. Nas. Ilmu Komput. dan Teknol. Inf. e-ISSN, vol. Vol.2 No, no. 2, 2017.
O. Dwi Prasetyo, P. Hari Trisnawan, and A. Bhawiyuga, “Uji Kinerja Host-Based Intrution Detection System WAZUH terhadap Serangan Brute Force dan Dos,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 7, no. 6, pp. 2686–2692, 2023, [Online]. Available: http://j-ptiik.ub.ac.id
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Fadhil Aditya, Andi Mahrani, Rakhmadi Rahman (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.