Al Firous, Rahman (2019) APLIKASI OTOMATISASI PENGUJIAN DAN PENDETEKSIAN VULNERABILITY PADA APLIKASI BERBASIS WEB. Other thesis, Universitas Amikom Purwokerto.
Preview
COVER.pdf
Download (630kB) | Preview
Preview
DAFTAR ISI.pdf
Download (440kB) | Preview
Text
ABSTRAK.pdf
Restricted to Registered users only
Download (418kB)
ABSTRAK.pdf
Restricted to Registered users only
Download (418kB)
Image
BAB I.pdf
Restricted to Registered users only
Download (690kB)
BAB I.pdf
Restricted to Registered users only
Download (690kB)
Image
BAB II.pdf
Restricted to Registered users only
Download (898kB)
BAB II.pdf
Restricted to Registered users only
Download (898kB)
Image
BAB III.pdf
Restricted to Registered users only
Download (522kB)
BAB III.pdf
Restricted to Registered users only
Download (522kB)
Image
BAB IV.pdf
Restricted to Registered users only
Download (1MB)
BAB IV.pdf
Restricted to Registered users only
Download (1MB)
Image
BAB V.pdf
Restricted to Registered users only
Download (487kB)
BAB V.pdf
Restricted to Registered users only
Download (487kB)
Image
DAFTAR PUSTAKA.pdf
Restricted to Registered users only
Download (491kB)
DAFTAR PUSTAKA.pdf
Restricted to Registered users only
Download (491kB)
Text
LAMPIRAN.pdf
Restricted to Repository staff only
Download (683kB)
LAMPIRAN.pdf
Restricted to Repository staff only
Download (683kB)
Abstract
Unsafe applications have become a threat to all aspects of infrastructure including finance, health, defense, energy, and other important infrastructure. Many events have occurred related to hacking or burglary of the system due to the lack of attention of service providers to the security of the system. Many types of attacks are generally used to find security holes on a website. SQL Injection, Broken Authentication SQL Injection, Cross-Site Scripting (XSS), Directory Listing, Autocomplete Password Fields are several types of attacks that can attack web-based applications. The purpose of this research is to create an application using PHP that can test and detect vulnerabilities in web-based applications with these five types of attacks. The data collection method used is the study of documents and secondary data with the material used is the URL or IP Address obtained from Google Dork. The results obtained from this study are the application of website security vulnerability testing can carry out testing of various types and groups of websites both Indonesia and abroad.
Item Type: | Thesis (Other) |
---|---|
Additional Information: | Dosen Pembimbing: Mohammad Imron, M.Kom. |
Uncontrolled Keywords: | application, scanner, security hole, website, vulnerability |
Subjects: | T Technology > T Technology (General) |
Divisions: | Fakultas Ilmu Komputer > Informatika |
Depositing User: | UPT Perpustakaan Pusat Universitas Amikom Purwokerto |
Date Deposited: | 01 Oct 2020 08:41 |
Last Modified: | 01 Oct 2020 08:41 |
URI: | https://eprints.amikompurwokerto.ac.id/id/eprint/259 |