PENGUJIAN KEAMANAN SISTEM WEBSITE DENGAN TEKNIK PENETRATION TESTING DENGAN METODE OPEN WEB APPLICATION SECURITY PROJECT (OWASP) (STUDI KASUS : SUB DOMAIN UPNJATIM.AC.ID)

NATANAEL, NICO (2023) PENGUJIAN KEAMANAN SISTEM WEBSITE DENGAN TEKNIK PENETRATION TESTING DENGAN METODE OPEN WEB APPLICATION SECURITY PROJECT (OWASP) (STUDI KASUS : SUB DOMAIN UPNJATIM.AC.ID). Undergraduate thesis, UNIVERSITAS PEMBANGUNAN NASIONAL "VETERAN" JAWA TIMUR.

[img]
Preview
Text (Cover)
19081010023-cover.pdf

Download (676kB) | Preview
[img]
Preview
Text (Bab 1)
19081010023-bab1.pdf

Download (262kB) | Preview
[img] Text (Bab 2)
19081010023-bab2.pdf
Restricted to Registered users only until 28 November 2025.

Download (365kB)
[img] Text (Bab 3)
19081010023-bab3.pdf
Restricted to Registered users only until 28 November 2025.

Download (893kB)
[img] Text (Bab 4)
19081010023-bab4.pdf
Restricted to Registered users only until 28 November 2025.

Download (6MB)
[img]
Preview
Text (Bab 5)
19081010023-bab5.pdf

Download (47kB) | Preview
[img]
Preview
Text (Daftar Pustaka)
19081010023-daftarpustaka.pdf

Download (177kB) | Preview

Abstract

The use of websites is increasingly widespread in various fields, often forget about evaluating website security. To evaluate security the website contains a technique called Penetration Testing. This technique is still very allows it to be used in evaluating website security. There is Previous research explains how evil cyber crime is. Which, in testing website weaknesses uses the same technique namely Web Penetration Testing. Several steps to carry out are explained Penetration Testing in testing website security. And outlined several tools which is used to carry out Penetration Testing. This research explains how to identify vulnerabilities vulnerabilities that exist on a website using testing methods penetration to reveal Website weaknesses. With various stages will go through such as Pre-Engagement Interactions, Intelligence Gathering, Vulnerability Testing, Exploitation, Repotting, and Recommendations. Get a security hole that can be exploited general. It can be said that after going through the stages of penetration testing with the existing case study targets, penetration testing techniques are still feasible and allows it to be used. It contains the results of security gaps presented, and the results of exploitation that has been carried out. Don't forget either provide a recommendation and report on the test results.

Item Type: Thesis (Undergraduate)
Contributors:
ContributionContributorsNIDN/NIDKEmail
Thesis advisorIDHOM, MOHAMMADNIDN0010038305idhom@upnjatim.ac.id
Thesis advisorJUNAIDI, ACHMADNIDN0710117803UNSPECIFIED
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Computer Science > Departemen of Informatics
Depositing User: Nico Natanael
Date Deposited: 28 Nov 2023 06:59
Last Modified: 28 Nov 2023 06:59
URI: http://repository.upnjatim.ac.id/id/eprint/18853

Actions (login required)

View Item View Item