p-Index From 2021 - 2026
0.444
P-Index
This Author published in this journals
All Journal bit-Tech
Henni Endah Wahanani
UPN Veteran Jawa Timur

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : bit-Tech

Website Security Testing Using PTES Method and OWASP Top 10 Approach Mochammad Yoga Firnanda; Henni Endah Wahanani; Achmad Junaidi
bit-Tech Vol. 8 No. 1 (2025): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v8i1.2564

Abstract

Rapid technological advancements have greatly benefited the industrial sector, making technology essential for business operations. However, this reliance also introduces vulnerabilities, particularly in Enterprise Resource Planning (ERP) systems, which are critical for managing business processes and sensitive data. Due to their complexity and integration, ERP systems are prime targets for cyberattacks, emphasizing the need for robust security testing. This research aims to identify, evaluate, and exploit vulnerabilities in the ERP website of PT. XYZ, specifically targeting pages accessible by users with the SPV Marketing role. The Penetration Testing Execution Standard (PTES) methodology was used to guide the process from intelligence gathering to exploitation and reporting. PTES also ensures that testing is conducted legally during the pre-engagement phase. Tools such as Google Dorking, Netcraft, Wappalyzer, and Nmap were employed for intelligence gathering. For threat modeling, ISO 27005 was employed to identify vulnerabilities, while ISO 25010 served as a standard for security quality. A ZAP scan revealed 23 security vulnerabilities, including 18 that fall under the OWASP Top 10, such as Broken Access Control and Injection. Simulated attacks successfully identified Cross-Site Scripting (XSS), Session Hijacking, and Cross-Site Request Forgery (CSRF). Based on the findings, the recommendations focus on enhancing ERP system security according to the OWASP Top 10 guidelines, ensuring clarity for the development team. This study highlights the need for improved ERP security and offers a structured PTES-OWASP framework applicable across sectors. Future research may integrate multiple tools to enhance vulnerability detection.
Evaluating Web Application Security Using OWASP Top 10 and NIST SP 800-115 Farrel Tiuraka Vierino; Henni Endah Wahanani; Achmad Junaidi
bit-Tech Vol. 8 No. 3 (2026): bit-Tech - IN PROGRESS
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v8i3.3702

Abstract

Cybersecurity assurance for public-facing government websites remains critical amid accelerating digital transformation. This study adopts an exploratory–evaluative research design to systematically examine and validate the security posture of the Surabaya Public Slaughterhouse (RPH Surabaya) website through an integrated application of OWASP Top 10 (2021) as a vulnerability taxonomy and NIST SP 800-115 as a procedural testing framework. The methodology follows structured planning, discovery, attack, and reporting phases. Discovery combined reconnaissance tools (Nslookup, Whois, Nmap, Dirsearch, Wappalyzer, and Google Dorking) with OWASP ZAP scanning, while attack validation employed Burp Suite, SQLMap, and browser-based developer analysis within a controlled Kali Linux environment. Thirteen potential vulnerabilities were detected, of which ten were empirically confirmed after manual verification. Confirmed weaknesses were predominantly categorized as Security Misconfiguration, including missing Anti-CSRF protections, directory browsing exposure, absent Content Security Policy and anti-clickjacking headers, outdated JavaScript libraries, insecure cookie attributes (missing HttpOnly and SameSite), lack of Strict-Transport-Security and X-Content-Type-Options headers, and user-controllable HTML attributes. The contribution lies in demonstrating a reproducible dual-framework validation pipeline that distinguishes scanner alerts from confirmed exploitability, thereby strengthening methodological rigor in public-sector web security assessment. These findings indicate systemic configuration-level risk exposure that may elevate susceptibility to XSS, CSRF, clickjacking, and injection-related threats relative to comparable public-institution websites. However, the assessment is limited to a single institutional website and an unauthenticated testing scope, constraining generalizability and deeper application-layer analysis.