Claim Missing Document
Check
Articles

Analisis Keamanan Web Aplikasi Pendidikan Berbasis Wordpress Menggunakan Pengujian Penetrasi SQLi Wijaya, Kadek Gandi Taruna; Listartha, I Made Edy
Jurnal Teknologi Sistem Informasi Vol 6 No 2 (2025): Jurnal Teknologi Sistem Informasi
Publisher : Program Studi Sistem Informasi, Universitas Multi Data Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jtsi.v6i2.13070

Abstract

Penelitian ini bertujuan untuk menganalisis keamanan sebuah aplikasi web pendidikan berbasis WordPress menggunakan metode penetration testing dengan fokus pada teknik Structured Query Language (SQL) Injection. Target pengujian adalah sebuah situs pendidikan resmi berbasis Content Management System (CMS) WordPress dengan basis data MariaDB, yang dalam penelitian ini dianonimkan untuk menjaga kerahasiaan. Pengujian dilakukan dengan pendekatan black box tanpa akses kredensial melalui beberapa tahapan, yaitu reconnaissance, scanning, exploitation, dan post-exploitation. Perangkat yang digunakan meliputi Burp Suite untuk memantau lalu lintas data, Wappalyzer untuk mengidentifikasi teknologi yang digunakan, serta SQLmap untuk mendeteksi dan mengeksploitasi kerentanan pada basis data. Hasil pengujian menunjukkan bahwa formulir login pada salah satu sub-aplikasi rentan terhadap serangan SQL Injection, yang memungkinkan penyerang memperoleh struktur tabel dan isi basis data tanpa izin resmi. Eksploitasi berhasil dilakukan menggunakan SQLmap, yang mengindikasikan kurangnya penerapan prepared statements dan validasi input pada sistem. Penelitian ini memberikan pemahaman mengenai potensi risiko keamanan pada aplikasi web pendidikan berbasis WordPress dan menekankan perlunya peningkatan pengamanan pada pengelolaan input serta konfigurasi basis data untuk mencegah akses ilegal.
Pengujian Performa, Tingkat Stres, dan Keamanan Pada Seluruh Website PPID Kabupaten Buleleng Putu Surya Ardi Bhuana; I Made Edy Listartha; Gede Arna Jude Saskara
Jurnal Ilmiah Teknik Informatika dan Komunikasi Vol. 5 No. 1 (2025): Maret-Juni : Jurnal Ilmiah Teknik Informatika dan Komunikasi
Publisher : Lembaga Pengembangan Kinerja Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/juitik.v5i1.1357

Abstract

The development of information technology has encouraged local governments to provide digital-based public services through official websites. One of these services is the website of the Information and Documentation Management Officer (PPID) of Buleleng Regency which functions as a medium for transparency and public interaction. However, until now there has been no comprehensive testing of the performance, stress levels, and security of all PPID websites in the district. This study aims to evaluate performance, measure stress levels, and identify security gaps on 26 PPID Implementing websites connected to the Main PPID of Buleleng Regency. The method used in this study is Action Research, with testing carried out using three main tools, namely GTmetrix for performance, K6.io for stress testing, and Owasp Zap Scan for security. The test results showed that several websites experienced loading delays, slow server responses during high loads, and security gaps related to SSL and DNS were found. Recommendations for improvement are focused on optimizing performance, increasing server capacity, and tighter security configurations. This study contributes to improving the quality of public information services and supports the realization of a transparent, efficient, and secure government.
MEASUREMENT OF INFORMATION SECURITY AND PRIVACY AWARENESS USING THE MULTIPLE CRITERIA DECISION ANALYSIS (MCDA) METHOD Sukariana Yasa, I Gede Agus; Listartha, I Made Edy; Pradnyana, I Made Ardwi
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.4.692

Abstract

Information security is an asset that has value so it must be protected, along with increasing assets it is undeniable that many people wish to gain access and control it so that behind the convenience in the digital world there are many risks to information assets. There are several cases that occur related to information security such as data theft, illegal access, information leakage and vandalism where this becomes the privacy of the user. So it is necessary to do research from the user's perspective to measure the level of information security and privacy awareness of students and lecturers as well as recommendations that will be suggested based on the results of measuring information security and privacy awareness. The objects in this research are students and lecturers at the XYZ University. The method used is Multiple Criteria Decision Analysis (MCDA) by measuring the dimensions of knowledge, attitude, behavior in six areas of information security and three areas of privacy. Data were obtained by distributing questionnaires using a Likert scale of 5. Based on the questionnaire from the respondents, it can be seen students and lecturers have awareness that is at a "good" level of 85% in information security while privacy is at a "good" level with a result of 89% but in the behavior dimension there are several areas that are included in the "average" level including the area passwords by 62%, mobile equipment area by 77% incident area by 70% and on privacy security on the behavior dimension there is one area namely the login activity area by 78% so this needs to be given recommendations for improvement in order to reach a "good" level by providing socialization/ training for students and lecturers
PENGUJIAN KEAMANAN DENGAN METODE PENETRATION TESTING EXECUTION STANDARD (PTES) UNTUK MENEMUKAN KERENTANAN MISCONFIGURATIONS PADA PERANGKAT JARINGAN Listartha, I Made Edy; Saskara, Gede Arna Jude
Electro Luceat Vol 10 No 2 (2024): Elektro Luceat- November 2024
Publisher : LPPM Poltek ST Paul

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32531/jelekn.v10i2.821

Abstract

This study examines the security of the WiFi network at Universitas Pendidikan Ganesha using the Penetration Testing Execution Standard (PTES) method. The aim is to identify and analyze vulnerabilities caused by misconfigurations within the university's WiFi infrastructure. The PTES method is employed to conduct testing through phases including pre-engagement interactions, intelligence gathering, threat modeling, vulnerability analysis, exploitation, post-exploitation, and reporting. The testing results reveal several key vulnerabilities related to improper configurations, such as the use of vulnerable protocols and insecure settings. Further analysis exposes potential risks that could be exploited by unauthorized parties to access sensitive data or disrupt services. The study provides recommendations for configuration improvements and mitigation steps to enhance WiFi network security at the university. The findings are expected to serve as a foundation for developing more effective security policies and better protection for network infrastructure in academic environments.
Penerapan Analisis Kerentanan XSS dan Rate Limiting pada Situs Web MTsN 3 Negara Menggunakan OWASP ZAP Dewangkara, Bagus Indra; Santi, Kadek Satwitri; Putri, Vany Adelia; Listartha, I Made Edy
Jurnal Informatika UPGRIS Vol 8, No 1: Juni 2022
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/jiu.v8i1.10266

Abstract

Indonesia yang sudah memasuki era digitalisasi membuat sektor pendidikan diharapkan mampu beradaptasi. Learning Daring kini menjadi salah satu metode pembelajaran di Indonesia. Dengan adanya kondisi dan situasi tersebut, situs web memiliki peran penting dalam penunjang pendidikan di era digital saat ini. Hal tersebut memicu perlunya analisis terhadap kerentanan situs-situs web sekolah yang ada di Indonesia. Sasaran penerapan analisis ini ada pada situs web MTsN 3 Negara. Analisis kerentanan cross site scripting (XSS) serta rate limitingbekerja untuk mencegah peretasan yang merugikan situs web MTsN 3 Negara. Penerapan analisis ini menggunakan salah satu perangkat lunak bernama OWASP sebagai media pendukungnya. Adapun hasil dari analisis keamanan situs web MTsN 3 Negara ini terdapat kerentanan pada rate limiting serta percobaan analisis cross-site scripting (XSS) yang tidak ditemukan. Selain itu, terdapat juga solusi-solusi terhadap kerentanan yang ada pada situs web MTsN 3 Negara.
DDoS Attack Using GoldenEye, DAVOSET, and PyLoris Tools Mahadiv Wikrama, Kadek Sudewo; Firdaus, Rangga; Medes Mendrofa, Linda Zal; Jude Saskara, Gede Arna; Edy Listartha, I Made
Jurnal CoreIT: Jurnal Hasil Penelitian Ilmu Komputer dan Teknologi Informasi Vol 9, No 2 (2023): December 2023
Publisher : Fakultas Sains dan Teknologi, Universitas Islam Negeri Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24014/coreit.v9i2.20020

Abstract

Perbandingan Tools Vulnerability Scanning Pada Pengujian Sebuah Website Suputri, Komang Ayu; Maharani, Made Donita; Pratama, Gede Ade; Sudiasta Putri, Nyoman Dinda Indira; Listartha, I Made Edy; Saskara, Gede Arna Jude
Informatik : Jurnal Ilmu Komputer Vol 18 No 3 (2022): Desember 2022
Publisher : Fakultas Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52958/iftk.v18i3.5133

Abstract

Cyber Attack adalah suatu upaya mencuri, mengubah, mengekspos informasi melalui akses tidak sah ke sistem komputer. Terdapat ancaman cyber attack yaitu Phishing, SQL Injection, Man In The Middle, DDOS Attack, Password Attack, XSS, Vulnerability Scanning dan Ransomware Attack. vulnerability Scanning adalah suatu proses mengidentifikasi dan menemukan kelemahan atau kerentanan dalam sebuah sistem. Dalam vulnerability scanning terdapat tiga tools yaitu RedHawk, WebKiller, dan Rapidscan. pengujian ini bertujuan untuk membandingkan setiap tools untuk mencari kerentanan pada suatu website. Pada penelitian ini, setiap tools dilakukan percobaan sebanyak 3 kali percobaan dan hasil celah keamanan yang ditemukan pada setiap tool yaitu pada RedHawk dan WebKiller sejumlah 8 dan pada RapidScan sejumlah 12.
Analisis Perbandingan Kinerja Tool Website Directory Brute Force dengan Target Website DVWA Utama, I Made Putra; Putri, Kadek Rosila; Wirayuda, Anak Agung Eka; Herlambang, Varelly Arletta Tyora Putri; Listartha, I Made Edy; Saskara, Gede Arna Jude
Informatik : Jurnal Ilmu Komputer Vol 18 No 3 (2022): Desember 2022
Publisher : Fakultas Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52958/iftk.v18i3.5256

Abstract

Seiring dengan perkembangan teknologi yang semakin meningkat, banyak ditemukan penemuan baru yang dapat mempermudah kehidupan manusia, salah satunya yaitu situs website. Banyaknya situs website di internet mengakibatkan tingkat keamanannya semakin menurun. Hal tersebut mengakibatkan website menjadi rentan untuk diretas dan diambil alih orang yang tidak bertanggung jawab. Salah satu cara peretas untuk menyerang website adalah dengan mencari direktori web yang memiliki celah keamanan. Serangan tersebut dikenal dengan website directory brute force. Penelitian ini menggunakan metode eksperimental dengan membandingkan kinerja dari tools Gobuster, FFUF, dan Dirb dengan tujuan menemukan tool yang memiliki kinerja paling baik untuk melakukan serangan web directory brute force dengan target serangan website DVWA. Aspek yang diuji dari ketiga tools tersebut yaitu kecepatan, kemampuan, dan efektivitas. Hasil penelitian menunjukkan bahwa tool Gobuster memiliki kinerja paling baik jika aspek kecepatan menjadi prioritas, sedangkan tool FFUF menjadi tool dengan kinerja terbaik jika aspek kemampuan yang menjadi prioritas.
ANALISIS EFEKTIVITAS DAN EFISIENSI METODE ENCODING DAN DECODING ALGORITMA BASE64 Mochammad Syahrul Kurniawan; I Gede Ardi Sukaryadi Putra; I Made Agastya Maheswara; Reynaldus Yoseph Maria Neto Labamaking; I Made Edy Listartha; Gede Arna Jude Saskara
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 3 No. 1 (2023): Maret : Jurnal Informatika dan Tekonologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v3i1.897

Abstract

This study discusses the methods of encoding and decoding the base64 cryptographic algorithm. The term encoding means a process of converting plaintext into ciphertext. While decoding is a term that means the process of turning ciphertext back into plaintext. In general, classical cryptography has been abandoned because of its logic which can be easily solved, so now it has switched to modern cryptography which operates in bit-binary mode which is formed from ASCII code. The base64 algorithm is a form of modern cryptography which is included in the modern type of block cipher cryptography. This study aims to obtain a comparison between 3 types of tools in carrying out a cryptographic encode and decode process on the base64 algorithm. The 3 types of tools include the Base64 Python Program, Bash Base64 Kali Linux, and CyberChef which are online tools. This type of research method uses qualitative methods because it tends to use analysis in research. Where the results of the first comparison are used to make it easier to see the accuracy of the encoding and decoding processes and the results of the second comparison are used to compare in terms of time efficiency when encoding the three tools using 1,000 words which will continue to be added by 4,000 words, up to a total of 9,000 words . These words are taken using dummy text (lorem ipsum).
ANALISA EVALUASI KINERJA SOFTWARE PASSWORD ATTACKER PADA BERKAS FILE ZIP Irhan Hisyam Dwi Nugroho; Kadek Pebriawan; Ketut Gede Tegar Maranom Jati; I Gede Cipta Aphila Diptha; I Made Edy Listartha; Gede Arna Jude Saskara
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 3 No. 1 (2023): Maret : Jurnal Informatika dan Tekonologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v3i1.899

Abstract

As we know, in this era of rapid technological progress, we cannot avoid threats to cyber security, cyber security itself is an effort to protect computer systems and data from various threats. In Indonesia alone, as of September 13, 2022, there have been recorded as many as 12.74 million accounts that have experienced leaks, and this makes Indonesia the 3rd country with the most number of data leaks in the world. One solution that can be done to protect the data that is owned is to put it in an archive such as ZIP, ZIP functions to combine several rice into one and reduce the size. And to secure the data in a ZIP file, you can set a password. The password is a combination of letters, numbers and symbols, with this combination it will be difficult for hackers to carry out their actions.
Co-Authors Ali Djamhuri Alit Alit Juniska Anak Agung Istri Callysta Athalia Aprilia Monica Sari Arijaya Kusuma, Kadek Angga Cahyadi, Kadek Wawan Decky Pratama Putra Dewa Ayu Deby Cintiya Dewa Ketut Alit Maha Putra Dewa Made Julijati Putra Dewangkara, Bagus Indra Dharma Putra, I Gede Wira Dharma Putra, I Putu Surya Diva Ananda Putra Driya, Putu Dhanu Dwi Cahyani, Desi Fransesko Indrajid G. Indrawan Gede Aditra Pradnyana Gede Agus Supriatmaja Gede Ananta Cahya Maheswara Gede Arna Jude Saskara Gede Bagus Parmadi Wijaya Gede Indrawan Gede Saindra Santyadiputra Gede Saindra Santyadiputra, Gede Saindra Gusti Ayu Mas Ekayanti Gusti Kade Surya Aditya Putra Herlambang, Varelly Arletta Tyora Putri I G. K. K. Putra I G. W. Pramartha I Gede Agus Krisna Perdana I Gede Ardi Sukaryadi Putra I Gede Bagastia Widi Atmaja I Gede Cipta Aphila Diptha I Gede Mahendra Darmawiguna I Gede Pasek Wedana I Gede Wahyu Parama Sucipta I Gusti Agung Ayu Ananda Dewi I Gusti Lanang Agung Raditya Putra I Ketut Pratista Tri Pramana I Ketut Resika Arthana I Km. Wahyu Yuda Arimika I Made Agastya Maheswara I Made Ardha Premana Mitha I Made Ardwi Pradnyana I Made Panji Prayoga I Md. Dendi Maysanjaya I Nyoman Namo Yoga Anantra I Nyoman Tri Anindia Putra I Putu Mas Yuda Pratama I W. S. Nirawana I Wayan Ari Pramana Putra Ida Ayu Mas Putri Mahalini Ida Bagus Kusuma Dewantara Ida Bagus Nyoman Pascima Ilham Ramdhani Irfanda, Achmad Irhan Hisyam Dwi Nugroho Jaya Deva K. F. Apriyana K. Y. E. Aryanto Kadek Dwika Darma Widyaputra Kadek Erik Diatmika Kadek Ferdy Andika Kadek Karisma Bramanda Kadek Pebriawan Kadek Sukma Jayanti Kadek Yota Ernanda Aryanto Ketut Gede Tegar Maranom Jati Komang Mahendra Komang Widhi Dharma Pratiwi Kusumadewi, Ni Made Ayu Mita Laurensius Patrick Made Diva Putera Ananta Made Wahyu Aditya Arta Mahadiv Wikrama, Kadek Sudewo Maharani, Made Donita Mahardika, Ngurah Manik Maheswara, Gede Ananta Cahya Medes Mendrofa, Linda Zal Mita Dewi, Ni Luh Listiana Putri Mochammad Syahrul Kurniawan Muhamad Bintang Haekal Ngurah Manik Mahardika Ni Ketut Rika Suryani Ni Luh Listiana Putri Mita Dewi Ni Made Gita Ayu Padmasari Ni Putu Ana Rainita Ni Putu Diah Ratih Rakasiwi Pande Putu Januraga Prameswara, Putu Buddhi Pratama, Gede Ade Putra, Decky Pratama Putra, Dewa Made Julijati Putra, Diva Ananda Putra, I Wayan Ari Pramana Putri Charly Putri, Kadek Rosila Putri, Vany Adelia Putu Adhitya kusuma Putu Candra Ariani Putu Damar Jagat Pratama Putu Setiari, Gusti Ayu Putu Surya Ardi Bhuana Putu Yoga Suartana Putu Yudia Pratiwi Rama Ngurah Putera Pinatih Rama Suryadi, Kadek Dika Ramdhani, Ilham Rangga Firdaus Reynaldus Yoseph Maria Neto Labamaking S. Rusditya Santi, Kadek Satwitri Sucipta, I Gede Wahyu Parama Sudiasta Putri, Nyoman Dinda Indira Sukariana Yasa, I Gede Agus Suputri, Komang Ayu Trihana Santhi Utama, I Made Putra Walhidayah, Irfan Wijaya, Kadek Gandi Taruna Windy Puspita Dewi, Luh Putu Wirayuda, Anak Agung Eka Yasa, I Gede Agus Sukariana Zulvan Avito Anwari