Muhammad Ridwan Fazli, . (2022) ANALISIS KERENTANAN INSECURE DESIGN DAN SERVER SIDE REQUEST FORGERY (SSRF) DENGAN METODE PTES (Studi Kasus Objek Buggy Web Application). Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.
Text
ABSTRAK.pdf Download (179kB) |
|
Text
AWAL.pdf Download (574kB) |
|
Text
BAB 1.pdf Download (337kB) |
|
Text
BAB 2.pdf Restricted to Repository UPNVJ Only Download (374kB) |
|
Text
BAB 3.pdf Restricted to Repository UPNVJ Only Download (340kB) |
|
Text
BAB 4.pdf Restricted to Repository UPNVJ Only Download (3MB) |
|
Text
BAB 5.pdf Download (209kB) |
|
Text
DAFTAR PUSTAKA.pdf Download (218kB) |
|
Text
RIWAYAT HIDUP.pdf Restricted to Repository UPNVJ Only Download (150kB) |
|
Text
HASIL PLAGIARISME.pdf Restricted to Repository staff only Download (37kB) |
|
Text
ARTIKEL KI.pdf Restricted to Repository staff only Download (1MB) |
Abstract
At present the development of technology is increasingly advanced and sophisticated, starting from a storage system that no longer requires a hardware such as hard disk, flash disk, etc. So that all important data that we have can be stored online. But the development of technology also has a negative impact such as the data stolen on the site that we use to store data by hackers or hackers that are not responsible. But every stolen data is not always important data, this is because hackers do not look indiscriminate in hacking. The reason for hackers that steals all types of data is because as long as the data has a value and can produce, the hackers will try to steal the data for their own benefits or other people who need the data. With the existence of online crime or commonly called cybercrime, a security system is needed that can prevent the crime. One of the actions that can be taken in preventing cybercrime on a site by conducting a vulnerability scanning that aims to find out security gaps on a vulnerable site to be attacked by hackers. In addition, a penetration testing is also carried out, a simulation process of attack carried out on a system to ascertain whether there is a vulnerability to a system and can damage the system. In the study an analysis of the impact caused if a site is infected by attacks that utilize vulnerability or vulnerability in the form of insecure design, and server side request forgery (SSRF). The two types of vulnerability to be analyzed are selected based on the new type of vulnerability or risk added to the Owasp Top Ten 2021. In this testing the Penetration Testing Execution Standard (PTES) method is used. This method has 5 (five) stages, namely intelligence gathering, vulnerability analysis, exploitation, post-exploitation, and report. The results that will be obtained in the form of an impact that will occur on a system on an attack and solution that can be given based on Owasp Top Ten 2021.
Item Type: | Thesis (Skripsi) |
---|---|
Additional Information: | [No.Panggil: 1710511060] [Pembimbing 1: Henki Bayu seta] [Pembimbing 2: Bayu Hananto] [Penguji 1: Jayanta] [Penguji 2: Yuni Widiastiwi] |
Uncontrolled Keywords: | cybercrime, bWAPP, OWASP Top Ten, PTES |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software T Technology > T Technology (General) U Military Science > U Military Science (General) |
Divisions: | Fakultas Ilmu Komputer > Program Studi Informatika (S1) |
Depositing User: | Muhammad Ridwan Fazli |
Date Deposited: | 22 Sep 2022 08:45 |
Last Modified: | 23 Sep 2022 03:32 |
URI: | http://repository.upnvj.ac.id/id/eprint/20800 |
Actions (login required)
View Item |