Implementation of Penetration Testing on the Website Using the Penetration Testing Execution Standard (PTES) Method

Bagus Kurniawan, Ikhwan Ruslianto, Syamsul Bahri

Abstract


Indonesia merupakan salah satu negara yang memiliki tingkat kejahatan siber yang sangat tinggi di dunia. Masalah tersebut timbul akibat sumber daya manusia yang kurang memadai dan kurangnya perawatan berkala pada sistem digital di Indonesia. Salah satu perawatan yang dapat dilakukan adalah Penetration Testing sebagai evaluasi sistem digital agar lebih baik dan terhindar dari serangan siber. Metode yang dapat membantu dalam melakukan Penetration Testing adalah dengan metode Penetration Testing Execution Standard (PTES). Hasil yang didapatkan dari penelitian ini bahwa website https://k*****.go.id memiliki tiga belas kerentanan. Sehingga dari tiga belas kerentanan yang didapatkan dilakukan dengan tiga jenis serangan yang berbeda yaitu Clickjacking, SQL Injection, dan Cross Site Scripting (XSS). Ketiga jenis serangan tersebut hanya serangan Clickjacking yang berhasil dilakukan pada website https://k*****.go.id. Diperoleh kesimpulan bahwa website memiliki risiko kerentanan dan terjadinya serangan bernilai sedang dilihat berdasarkan OWASP ZAP Risk Rating Methodology.

Indonesia is a country that has a very high cybercrime rate in the world. This problem arises due to inadequate human resources and a lack of regular maintenance of digital systems in Indonesia. One of the treatments that can be done is Penetration Testing as an evaluation of digital systems to make them better and avoid cyber attacks. A method that can assist in carrying out Penetration Testing is the Penetration Testing Execution Standard (PTES) method. The results obtained from this research are that the website https://k*****.go.id has thirteen vulnerabilities. So that the thirteen vulnerabilities found were carried out with three different types of attacks, namely Clickjacking, SQL Injection, and Cross Site Scripting (XSS). The only three types of attacks are clickjacking attacks that were successfully carried out on the https://k*****.go.id website. It is concluded that the website has a risk of vulnerability and the occurrence of attacks is worth being seen based on the OWASP ZAP Risk Rating Methodology.


Keywords


Penetration Testing; Cyber Security; Clickjacking; SQL Injection; Cross Site Scripting (XSS); Website; Kerentanan

Full Text:

PDF

References


“CNN Indonesia,” “Rentetan Kasus Dugaan Kebocoran Data Kesehatan Pemerintah Baca artikel CNN Indonesia "Rentetan Kasus Dugaan Kebocoran Data Kesehatan Pemerintah,” 3 September 2021. https://www.cnnindonesia.com/teknologi/20210903142047-185-689370/rentetan-kasus-dugaan-kebocoran-data-kesehatan-pemerintah/2 (diakses 3 Oktober 2022).

Kominfo, “Indonesia kekurangan Bakat Cyber Security,” 27 Desember 2016. https://www.kominfo.go.id/content/detail/8574/indonesia-kekurangan-bakat-cyber-security/0/sorotan_media (diakses 4 Juni 2023).

S. Utoro dkk., “Analisis Keamanan Website E-Learning SMKN 1 Cibatu Menggunakan Metode Penetration Testing Execution Standard,” 2020.

T. Revolino Syarif dan D. Andri Jatmiko, “Analisis Perbandingan Metode Web Security PTES, ISSAF dan Owasp di Dinas Komunikasi Dan Informasi Kota Bandung,” 2019.

A. Arbi, “Penetration Testing Untuk Mengetahui Kerentanan Keamanan Aplikasi Web Menggunakan Standar OWASP 10 pada domain Web Perusahaan,” Nov 2020.

S. U. Sunaringtyas, D. Surya Prayoga, J. K. Siber, P. Siber, dan S. Negara, “Edu Komputika Journal Implementasi Penetration Testing Execution Standard Untuk Uji Penetrasi Pada Layanan Single Sign-On,” 2021. [Daring]. Tersedia pada: http://journal.unnes.ac.id/sju/index.php/edukom

ZAP Dev Team, “OWASP Risk Rating Methodology,” 2023.




DOI: https://doi.org/10.24114/cess.v8i2.47096

Article Metrics

Abstract view : 368 times
PDF - 286 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

CESS (Journal of Computer Engineering, System and Science)

Creative Commons License
CESS (Journal of Computer Engineering, System and Science) is licensed under a Creative Commons Attribution 4.0 International License