APLIKASI OTOMATISASI PENGUJIAN DAN PENDETEKSIAN VULNERABILITY PADA APLIKASI BERBASIS WEB

Al Firous, Rahman (2019) APLIKASI OTOMATISASI PENGUJIAN DAN PENDETEKSIAN VULNERABILITY PADA APLIKASI BERBASIS WEB. Other thesis, Universitas Amikom Purwokerto.

[thumbnail of COVER.pdf]
Preview
Text
COVER.pdf

Download (630kB) | Preview
[thumbnail of DAFTAR ISI.pdf]
Preview
Text
DAFTAR ISI.pdf

Download (440kB) | Preview
[thumbnail of ABSTRAK.pdf] Text
ABSTRAK.pdf
Restricted to Registered users only

Download (418kB)
[thumbnail of BAB I.pdf] Image
BAB I.pdf
Restricted to Registered users only

Download (690kB)
[thumbnail of BAB II.pdf] Image
BAB II.pdf
Restricted to Registered users only

Download (898kB)
[thumbnail of BAB III.pdf] Image
BAB III.pdf
Restricted to Registered users only

Download (522kB)
[thumbnail of BAB IV.pdf] Image
BAB IV.pdf
Restricted to Registered users only

Download (1MB)
[thumbnail of BAB V.pdf] Image
BAB V.pdf
Restricted to Registered users only

Download (487kB)
[thumbnail of DAFTAR PUSTAKA.pdf] Image
DAFTAR PUSTAKA.pdf
Restricted to Registered users only

Download (491kB)
[thumbnail of LAMPIRAN.pdf] Text
LAMPIRAN.pdf
Restricted to Repository staff only

Download (683kB)

Abstract

Unsafe applications have become a threat to all aspects of infrastructure including finance, health, defense, energy, and other important infrastructure. Many events have occurred related to hacking or burglary of the system due to the lack of attention of service providers to the security of the system. Many types of attacks are generally used to find security holes on a website. SQL Injection, Broken Authentication SQL Injection, Cross-Site Scripting (XSS), Directory Listing, Autocomplete Password Fields are several types of attacks that can attack web-based applications. The purpose of this research is to create an application using PHP that can test and detect vulnerabilities in web-based applications with these five types of attacks. The data collection method used is the study of documents and secondary data with the material used is the URL or IP Address obtained from Google Dork. The results obtained from this study are the application of website security vulnerability testing can carry out testing of various types and groups of websites both Indonesia and abroad.
Item Type: Thesis (Other)
Additional Information: Dosen Pembimbing: Mohammad Imron, M.Kom.
Uncontrolled Keywords: application, scanner, security hole, website, vulnerability
Subjects: T Technology > T Technology (General)
Divisions: Fakultas Ilmu Komputer > Informatika
Depositing User: UPT Perpustakaan Pusat Universitas Amikom Purwokerto
Date Deposited: 01 Oct 2020 08:41
Last Modified: 01 Oct 2020 08:41
URI: https://eprints.amikompurwokerto.ac.id/id/eprint/259

Actions (login required)

View Item
View Item