p-Index From 2021 - 2026
5.231
P-Index
This Author published in this journals
All Journal Syntax Jurnal Informatika Scan : Jurnal Teknologi Informasi dan Komunikasi Proceeding International Conference on Information Technology and Business Jurnal Teknologi Informasi dan Ilmu Komputer International conference on Information Technology and Business (ICITB) Jurnal Sistem Informasi dan Bisnis Cerdas Informatika Mulawarman: Jurnal Ilmiah Ilmu Komputer INTEGER: Journal of Information Technology JIEET (Journal of Information Engineering and Educational Technology) JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Jurnal Informatika dan Rekayasa Elektronik bit-Tech Journal of Appropriate Technology for Community Services JATI (Jurnal Mahasiswa Teknik Informatika) CICES (Cyberpreneurship Innovative and Creative Exact and Social Science) Jurnal Layanan Masyarakat (Journal of Public Service) Jifosi Nusantara Science and Technology Proceedings International Journal Of Computer, Network Security and Information System (IJCONSIST) KERNEL: Jurnal Riset Inovasi Bidang Informatika dan Pendidikan Informatika Abdimas Altruis: Jurnal Pengabdian Kepada Masyarakat Jurnal Informatika Dan Tekonologi Komputer (JITEK) East Asian Journal of Multidisciplinary Research (EAJMR) Jurnal Teknik Informatika dan Teknologi Informasi Jurnal Krisnadana JUSIFOR : Jurnal Sistem Informasi dan Informatika Jurnal Ilmiah Teknik Informatika dan Komunikasi Jurnal Krisnadana Jurnal Informatika Polinema (JIP) Router : Jurnal Teknik Informatika dan Terapan Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi Repeater: Publikasi Teknik Informatika dan Jaringan Router : Jurnal Teknik Informatika dan Terapan Jurnal Informatika Dan Tekonologi Komputer
Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : bit-Tech

Website Security Testing Using PTES Method and OWASP Top 10 Approach Firnanda, Mochammad Yoga; Henni Endah Wahanani; Achmad Junaidi
bit-Tech Vol. 8 No. 1 (2025): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v8i1.2564

Abstract

Rapid technological advancements have greatly benefited the industrial sector, making technology essential for business operations. However, this reliance also introduces vulnerabilities, particularly in Enterprise Resource Planning (ERP) systems, which are critical for managing business processes and sensitive data. Due to their complexity and integration, ERP systems are prime targets for cyberattacks, emphasizing the need for robust security testing. This research aims to identify, evaluate, and exploit vulnerabilities in the ERP website of PT. XYZ, specifically targeting pages accessible by users with the SPV Marketing role. The Penetration Testing Execution Standard (PTES) methodology was used to guide the process from intelligence gathering to exploitation and reporting. PTES also ensures that testing is conducted legally during the pre-engagement phase. Tools such as Google Dorking, Netcraft, Wappalyzer, and Nmap were employed for intelligence gathering. For threat modeling, ISO 27005 was employed to identify vulnerabilities, while ISO 25010 served as a standard for security quality. A ZAP scan revealed 23 security vulnerabilities, including 18 that fall under the OWASP Top 10, such as Broken Access Control and Injection. Simulated attacks successfully identified Cross-Site Scripting (XSS), Session Hijacking, and Cross-Site Request Forgery (CSRF). Based on the findings, the recommendations focus on enhancing ERP system security according to the OWASP Top 10 guidelines, ensuring clarity for the development team. This study highlights the need for improved ERP security and offers a structured PTES-OWASP framework applicable across sectors. Future research may integrate multiple tools to enhance vulnerability detection.
Co-Authors Abdi, Harris Cipta Abiyan Naufal Hilmi Achmad Junaidi Aditia Mieka Darminta Adityawati, Dewi Agung Mustika Rizki Agung Mustika Rizki, Agung Mustika Agussalim, Agussalim Akbar, Fawwaz Ali Al Hamda, Veqqy Aniisah Eka Rahmawati Arif Saifudin, Muhamad Arrosyid, Muhammad Habib Arum Prabowo, Galih Bagaskara, Bregas Arya Bariq Satrio Yudoko Basuki Rahmat Masdi Siduppa Budi Nugroho Budianto Budianto Chystia Aji Putra Darminta, Aditia Mieka Eka Zuni Selviana Erlangga Wicaksono, Dewa Erlina Diah Karisma Eva Yulia Puspaningrum Fadhilasari, Annisa Fetty Tri Anggraeny Fikri Dwilaksono Firnanda, Mochammad Yoga Firza Prima Aditiawan Fitriansyah, Muhammad Daffa Hamzah Dimas Syah Reza Hermawan, Oky I Made Suartana I Nyoman Sujana idhom, Mohammad IMANDAYANTI, NUR EZA Intan Yuniar Purbasari inthan anggraini, dieas Islah Rachmawati Kristiawan, Kiki Yuniar Lina Nurlaili, Afina Made Hanindia Prami Swari Mandyartha, Eka Prakarsa Mohamad Ilham Prasetyo Raharjo Mohammad Idhom Muhammad Idhom Muhammad Rizki Alamsyah Muhammad, rizal Muttaqin, Faisal Nafa Nabila El Indri naufal firdaus, ahmad Nugroho, Budi Nugroho, Budi Nugroho, Budi Nur Firmansyah, Taufik Nurlaili, Afina Lina Phitria, Shaum Prakoso, Galih Indo Putra, Chrystia Aji Putra, Chystia Aji Putri, Della Atika Rahmawati, Aniisah Eka Rayhan Rizal Mahendra Retno Mumpuni Retno Mumpuni Sandy Rizkyando Sandy, Aditya Noor Saputra, Wahyu S.J. Saputro, Fajar Arif Eko Shabika Aqmarina, Azzuraa Soedarto, Teguh Suartana, I Made Sugiarto Sugiarto - SUGIARTO - Sukirmiyadi, Sukirmiyadi TATI NURHAYATI Thohir, A. Zaki Thomas Andrew Imanzaghi Vita Via, Yisti Wahono, Bari Hade Variant Yudha Asmara, I Wayan Zaim, Mohammad Syarifuz