2019
DOI: 10.29103/techsi.v11i3.1996
|View full text |Cite
|
Sign up to set email alerts
|

Evaluasi Kinerja Software Web Penetration Testing

Abstract: Website sudah menjadi bagian penting dalam setiap aspek kehidupan kita sehari-hari. Dari belanja online hingga bersosialisasi, semuanya tersedia dalam satu klik melalui gatget. Setiap website adalah unik dengan caranya sendiri, mulai dari coding hingga eksekusi, tetapi secara umum di setiap website terdapat celah keamanan yang memudahkan tersusupi oleh para hacker. Oleh karena itu perlu dilakukan scanning celah keamanan yang ada pada sebuah website. Dalam artikel ini, berbagai macam program pendeteksi celah ke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0
3

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 0 publications
0
2
0
3
Order By: Relevance
“…These application requirements are compatible with the characteristics of software that are easy to learn and available. In accordance with the opinion of information technology experts who read that One of the characteristics of good software is that it is easy to run and data can be transferred easily using technology that can be used for novice users (Ula, 2019) (Baresi & Pezzè, 2006) (Zeng, Zhang, Kwong, Sun, & Li, 2014).…”
Section: Characteristics Ung Softwarementioning
confidence: 93%
“…These application requirements are compatible with the characteristics of software that are easy to learn and available. In accordance with the opinion of information technology experts who read that One of the characteristics of good software is that it is easy to run and data can be transferred easily using technology that can be used for novice users (Ula, 2019) (Baresi & Pezzè, 2006) (Zeng, Zhang, Kwong, Sun, & Li, 2014).…”
Section: Characteristics Ung Softwarementioning
confidence: 93%
“…SQLmap is a tool used to perform penetration testing on a website by exploiting the variables contained on a website, either sent via POST or GET methods. This hacking technique that uses SQLmap is called SQLInjection [13]. POST method will send the variable value to the server separately, so the variable value is not visible [14], and GET it is a method of sending data using a query string, so all values in the form will be sent to the server/file side, and the values from you form will appear in the URL line/Address bar [15].…”
Section: Sqlmapmentioning
confidence: 99%
“…Strategi pengujian kerentanan terhadap aplikasi web absensi menggunakan metode OWASP menggunakan bentuk analisis dinamis (Dynamic Analysis) yang dilakukan pada domain dimana aplikasi web target beroperasi [14], [15], [16]. Hasil data kerentanan didapatkan melalui proses pemindaian dan penilaian kerentanan dengan alat pemindaian kerentanan dalam melakukan pengujian kerentanan aplikasi web menggunakan Netsparker [17], [18], [19], [20]. Proses pemindaian dilakukan dengan cara memasukkan alamat website target pada aplikasi netsparker dan dilakukan optimalisasi konfigurasi policy.…”
Section: Pengujian Pentestunclassified