ANALISIS FILE UPLOAD VULNERABILITY DANPENCEGAHAN DENGAN FILE CONTENT VALIDATION
File Upload Vulnerability is a vulnerability found on a website caused by the imperfect writing of program code. Wherewith these vulnerabilities, it is possible for people who do not have the authority to upload malicious files such as backdoors into the system or website server. The purpose of this...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2021-07-22.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | repoupnvj_11176 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Jose Alnevo Theora, . |e author |
245 | 0 | 0 | |a ANALISIS FILE UPLOAD VULNERABILITY DANPENCEGAHAN DENGAN FILE CONTENT VALIDATION |
260 | |c 2021-07-22. | ||
500 | |a http://repository.upnvj.ac.id/11176/10/Abstrak.pdf | ||
500 | |a http://repository.upnvj.ac.id/11176/12/AWAL.pdf | ||
500 | |a http://repository.upnvj.ac.id/11176/2/BAB%201.pdf | ||
500 | |a http://repository.upnvj.ac.id/11176/3/BAB%202.pdf | ||
500 | |a http://repository.upnvj.ac.id/11176/4/BAB%203.pdf | ||
500 | |a http://repository.upnvj.ac.id/11176/5/BAB%204.pdf | ||
500 | |a http://repository.upnvj.ac.id/11176/6/BAB%205.pdf | ||
500 | |a http://repository.upnvj.ac.id/11176/7/DAFTAR%20PUSTAKA.pdf | ||
500 | |a http://repository.upnvj.ac.id/11176/8/DAFTAR%20RIWAYAT%20HIDUP.pdf | ||
500 | |a http://repository.upnvj.ac.id/11176/11/LAMPIRAN.pdf | ||
500 | |a http://repository.upnvj.ac.id/11176/9/Artikel%20KI.pdf | ||
520 | |a File Upload Vulnerability is a vulnerability found on a website caused by the imperfect writing of program code. Wherewith these vulnerabilities, it is possible for people who do not have the authority to upload malicious files such as backdoors into the system or website server. The purpose of this study is to be able to find out things related to File Upload Vulnerability, Can create website-based applications that can prevent backdoor entry into the system, Can make references for related research. So to prevent this, it is necessary to prevent File Upload Vulnerability by doing File Content Validation where this method will select files to be uploaded to the website. Where the file filtering process is done by filtering the file extension, and then the contents of the file will be checked, whether it contains a string that is usually found in the backdoor. If the file is indicated as a backdoor because of a match in the string, then the file will not be able to enter or uploaded, and if the file is safe, then the file will be able to enter or be uploaded to the system. From the results of the File Content validation experiment by uploading 150 files, the results obtained are, as many as 30 executable files and 6 PHP backdoor files cannot enter the server that has been provided. So using File Content Validation can prevent the entry of executable files and PHP backdoor files into the server. | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
690 | |a QA75 Electronic computers. Computer science | ||
690 | |a QA76 Computer software | ||
655 | 7 | |a Thesis |2 local | |
655 | 7 | |a NonPeerReviewed |2 local | |
787 | 0 | |n http://repository.upnvj.ac.id/11176/ | |
787 | 0 | |n https://repository.upnvj.ac.id/ | |
856 | 4 | 1 | |u http://repository.upnvj.ac.id/11176/ |z Link Metadata |