PENETRATION TESTING TERHADAP DAMNVULNERABLE WEB APPLICATION (DVWA) MENGGUNAKAN METODE ZERO ENTRY HACKING (ZEH) DAN OPEN WEB APPLICATION SECURITY PROJECT (OWASP)
This study aims to test vulnerabilities to determine the security condition of the DVWA web application and describe the gaps found because information security systems are very important with advances in information technology and also to help the needs of the people who use them. The penetration t...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2021-06-29.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | repoupnvj_11657 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Leonardo Pandapotan, . |e author |
245 | 0 | 0 | |a PENETRATION TESTING TERHADAP DAMNVULNERABLE WEB APPLICATION (DVWA) MENGGUNAKAN METODE ZERO ENTRY HACKING (ZEH) DAN OPEN WEB APPLICATION SECURITY PROJECT (OWASP) |
260 | |c 2021-06-29. | ||
500 | |a http://repository.upnvj.ac.id/11657/1/ABSTRAK.pdf | ||
500 | |a http://repository.upnvj.ac.id/11657/23/AWAL.pdf | ||
500 | |a http://repository.upnvj.ac.id/11657/3/BAB%201.pdf | ||
500 | |a http://repository.upnvj.ac.id/11657/4/BAB%202.pdf | ||
500 | |a http://repository.upnvj.ac.id/11657/5/BAB%203.pdf | ||
500 | |a http://repository.upnvj.ac.id/11657/6/BAB%204.pdf | ||
500 | |a http://repository.upnvj.ac.id/11657/7/BAB%205.pdf | ||
500 | |a http://repository.upnvj.ac.id/11657/8/DAFTAR%20PUSTAKA.pdf | ||
500 | |a http://repository.upnvj.ac.id/11657/9/RIWAYAT%20HIDUP.pdf | ||
500 | |a http://repository.upnvj.ac.id/11657/24/LAMPIRAN.pdf | ||
500 | |a http://repository.upnvj.ac.id/11657/11/ARTIKEL%20KI.pdf | ||
520 | |a This study aims to test vulnerabilities to determine the security condition of the DVWA web application and describe the gaps found because information security systems are very important with advances in information technology and also to help the needs of the people who use them. The penetration testing (pentest) methodology used in this study is Zero Entry Hacking (ZEH) which has 4 (four) stages, namely Reconnaissance, Scanning, Exploitation, and Post Exploitation and Maintenance Access and takes solutions from the Open Web Application Security Project (OWASP). . The results obtained from the scanning process are in the form of warnings and vulnerabilities as well as knowing the condition of the security level of the DVWA web application system by exploiting cross-site scripting (XSS), command injection, file inclusion, file uploading, brute force attacks, and SQL injection along with solutions from Open the Web Application Security Project (OWASP). | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
690 | |a QA75 Electronic computers. Computer science | ||
690 | |a QA76 Computer software | ||
655 | 7 | |a Thesis |2 local | |
655 | 7 | |a NonPeerReviewed |2 local | |
787 | 0 | |n http://repository.upnvj.ac.id/11657/ | |
787 | 0 | |n https://repository.upnvj.ac.id | |
856 | 4 | 1 | |u http://repository.upnvj.ac.id/11657/ |z Link Metadata |