Implementation of Regular Expressions for CLI and WEB-based Backdoor Scanners

Implementasi Regular Expression Untuk Backdoor Scanner Berbasis CLI dan WEB

  • Nikko Enggaliano Pratama Universitas Muhammadiyah Sidoarjo
  • Senja Universitas Muhammadiyah Sidoarjo
Keywords: Security, injection, Backdoor, regular expression

Abstract

The author realizes that in this era, information systems are increasingly developing, there are so many system developers who can develop great and useful applications. But not many of these developers care about data security issues or information systems. The more an application that is running and is also being developed will have an impact along with the increasing number of cybercrime or hacktivists attacking the application or a server. The actors not only carried out attacks and then ignored the servers, many of them left a backdoor, to facilitate future actions. Many of the information system developers do not understand what a backdoor is and what a backdoor looks like, because many of the backdoor is developed with complicated techniques or with common syntax that the developer considers reasonable. Here the author developed a backdoor scanner application that can run on any OS, Windows or Unix with the same results, and can run in CLI (Command Line Interface) or in Web mode. Testing of the backdoor scanner application has been carried out by various elements ranging from government, private sector and the Open Source community who can still detect all tested backdoors with 100% accuracy even though the results issued are still False Positive. The backdoor tested is a backdoor that has been developed and has been in circulation before or is called a well-know backdoor.

References

[1] Enggaliano, N., 2020. Basic Secure Server Nikko Enggaliano. [online] Nikkoenggaliano.github.io. Available at: [Accessed 3 November 2020].
[2] Sopaheluwakan, C. R., & Chandra, D. W. (2020). Anti-WebShell PHP Backdoor Scanner pada Linux Server. ILKOM Jurnal Ilmiah, 12(2), 143–153. https://doi.org/10.33096/ilkom.v12i2.596.143-153
[3] Yogi, I. R. (2019). Analisa Log Web Server untuk Mengetahui Pola Perilaku Pengunjung Website Menggunakan Teknik Regular Expressions. Jurnal Komputer dan Aplikasi, 122-123.
[4] Jhon Nicolas Siahaan, Y. M. (2013). Aplikasi SMS Gateway Di PT. Mercava Globe Sphere. Jurnal Teknologi Informatika, 4-5.
[5] Oktaviani.J. (2018). 済無No Title No Title. Sereal Untuk, 51(1), 51.
[6] Symantec. (2019). Internet Security Threat Report Volume 21, February 2019. Network Security, 21(February). https://doi.org/10.1016/S1353-4858(05)00194-7
[7] Russell L. Jones & Abhinav Rastogi (2004) Secure Coding: Building Security into the Software Development Life Cycle. Information Systems Security, 13:5, 29-39, DOI: 10.1201/1086/44797.13.5.20041101/84907.5
[8] Gandhi Pranoto, R. D. (2016). Rancang Bangun Aplikasi Terpadu. Jurnal Sistem dan Teknologi Informasi, 2.
[9] Novianty, C. (2017). Review Konsep Responsive Design dengan Framework. InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) , 42.
[10] Syaifudin Ramadhani, Urifatun Anis, Siti Tazkiyatul Masruro. (2013). Rancang Bangun Sistem Informasi Geografis Layanan Kesehatan Di. Jurnal Teknika, 480.
[11] ElisaUsada, Y. R. (2012). Rancang Bangun Sistem Informasi. Jurnal Infotel, 43.
[12] Fauzan Masykur, F. P. (2016). Aplikasi Rumah Pintar (Smart Home) Pengendali Peralatan Elektronik Rumah Tangga Berbasis Web. Jurnal Sains, 95.
Published
2021-03-29