PENETRATION TESTING TERHADAP DAMNVULNERABLE WEB APPLICATION (DVWA) MENGGUNAKAN METODE ZERO ENTRY HACKING (ZEH) DAN OPEN WEB APPLICATION SECURITY PROJECT (OWASP)

This study aims to test vulnerabilities to determine the security condition of the DVWA web application and describe the gaps found because information security systems are very important with advances in information technology and also to help the needs of the people who use them. The penetration t...

Full description

Saved in:
Bibliographic Details
Main Author: Leonardo Pandapotan, (Author)
Format: Book
Published: 2021-06-29.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_11657
042 |a dc 
100 1 0 |a Leonardo Pandapotan, .  |e author 
245 0 0 |a PENETRATION TESTING TERHADAP DAMNVULNERABLE WEB APPLICATION (DVWA) MENGGUNAKAN METODE ZERO ENTRY HACKING (ZEH) DAN OPEN WEB APPLICATION SECURITY PROJECT (OWASP) 
260 |c 2021-06-29. 
500 |a http://repository.upnvj.ac.id/11657/1/ABSTRAK.pdf 
500 |a http://repository.upnvj.ac.id/11657/23/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/11657/3/BAB%201.pdf 
500 |a http://repository.upnvj.ac.id/11657/4/BAB%202.pdf 
500 |a http://repository.upnvj.ac.id/11657/5/BAB%203.pdf 
500 |a http://repository.upnvj.ac.id/11657/6/BAB%204.pdf 
500 |a http://repository.upnvj.ac.id/11657/7/BAB%205.pdf 
500 |a http://repository.upnvj.ac.id/11657/8/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/11657/9/RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/11657/24/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/11657/11/ARTIKEL%20KI.pdf 
520 |a This study aims to test vulnerabilities to determine the security condition of the DVWA web application and describe the gaps found because information security systems are very important with advances in information technology and also to help the needs of the people who use them. The penetration testing (pentest) methodology used in this study is Zero Entry Hacking (ZEH) which has 4 (four) stages, namely Reconnaissance, Scanning, Exploitation, and Post Exploitation and Maintenance Access and takes solutions from the Open Web Application Security Project (OWASP). . The results obtained from the scanning process are in the form of warnings and vulnerabilities as well as knowing the condition of the security level of the DVWA web application system by exploiting cross-site scripting (XSS), command injection, file inclusion, file uploading, brute force attacks, and SQL injection along with solutions from Open the Web Application Security Project (OWASP). 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a QA75 Electronic computers. Computer science 
690 |a QA76 Computer software 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/11657/ 
787 0 |n https://repository.upnvj.ac.id 
856 4 1 |u http://repository.upnvj.ac.id/11657/  |z Link Metadata