This Author published in this journals
All Journal bit-Tech
Achmad Junaidi
UPN Veteran Jawa Timur

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Website Security Testing Using PTES Method and OWASP Top 10 Approach Mochammad Yoga Firnanda; Henni Endah Wahanani; Achmad Junaidi
bit-Tech Vol. 8 No. 1 (2025): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v8i1.2564

Abstract

Rapid technological advancements have greatly benefited the industrial sector, making technology essential for business operations. However, this reliance also introduces vulnerabilities, particularly in Enterprise Resource Planning (ERP) systems, which are critical for managing business processes and sensitive data. Due to their complexity and integration, ERP systems are prime targets for cyberattacks, emphasizing the need for robust security testing. This research aims to identify, evaluate, and exploit vulnerabilities in the ERP website of PT. XYZ, specifically targeting pages accessible by users with the SPV Marketing role. The Penetration Testing Execution Standard (PTES) methodology was used to guide the process from intelligence gathering to exploitation and reporting. PTES also ensures that testing is conducted legally during the pre-engagement phase. Tools such as Google Dorking, Netcraft, Wappalyzer, and Nmap were employed for intelligence gathering. For threat modeling, ISO 27005 was employed to identify vulnerabilities, while ISO 25010 served as a standard for security quality. A ZAP scan revealed 23 security vulnerabilities, including 18 that fall under the OWASP Top 10, such as Broken Access Control and Injection. Simulated attacks successfully identified Cross-Site Scripting (XSS), Session Hijacking, and Cross-Site Request Forgery (CSRF). Based on the findings, the recommendations focus on enhancing ERP system security according to the OWASP Top 10 guidelines, ensuring clarity for the development team. This study highlights the need for improved ERP security and offers a structured PTES-OWASP framework applicable across sectors. Future research may integrate multiple tools to enhance vulnerability detection.
Aplikasi OMR untuk Pemeriksaan Lembar Jawaban menggunakan DexiNed Kus Dwi Prastyo; Achmad Junaidi; Firza Prima Aditiawan
bit-Tech Vol. 8 No. 3 (2026): bit-Tech - IN PROGRESS
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v8i3.3425

Abstract

Digital image processing is a field of computer science that focuses on analyzing and interpreting digital images to extract meaningful information. One of its applications is Optical Mark Recognition (OMR), a technology used to detect marks on documents. OMR is commonly utilized for evaluating answer sheets. However, conventional OMR systems typically rely on specialized scanners that are expensive and lack flexibility. Although Computer-Based Testing (CBT) offers the convenience of automated scoring, its implementation heavily depends on the availability of technological infrastructure such as computers, internet connectivity, and a stable power supply. This study develops a real-time Optical Mark Recognition (OMR) application capable of performing answer sheet assessment directly on the client side. The system utilizes the DexiNed method for edge detection of the answer areas. The application is web-based and built using JavaScript and OpenCV.js to process images directly from the user's device camera. Testing was carried out under various scenarios, including different lighting intensities, scanner positions, pencil types, and shading quality. The results show that the application can detect marked answers with an accuracy up to 100%, although some limitations were observed under certain technical conditions. Weaknesses were found in low lighting conditions using a 5 watt lamp at a distance of 3 meters, light reflections, and the camera angle was not aligned with the answer sheet. Overall, the application provides an efficient and flexible alternative for answer sheet assessment without requiring dedicated scanning devices, making it suitable for educational institutions with limited infrastructure.
Evaluating Web Application Security Using OWASP Top 10 and NIST SP 800-115 Farrel Tiuraka Vierino; Henni Endah Wahanani; Achmad Junaidi
bit-Tech Vol. 8 No. 3 (2026): bit-Tech - IN PROGRESS
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v8i3.3702

Abstract

Cybersecurity assurance for public-facing government websites remains critical amid accelerating digital transformation. This study adopts an exploratory–evaluative research design to systematically examine and validate the security posture of the Surabaya Public Slaughterhouse (RPH Surabaya) website through an integrated application of OWASP Top 10 (2021) as a vulnerability taxonomy and NIST SP 800-115 as a procedural testing framework. The methodology follows structured planning, discovery, attack, and reporting phases. Discovery combined reconnaissance tools (Nslookup, Whois, Nmap, Dirsearch, Wappalyzer, and Google Dorking) with OWASP ZAP scanning, while attack validation employed Burp Suite, SQLMap, and browser-based developer analysis within a controlled Kali Linux environment. Thirteen potential vulnerabilities were detected, of which ten were empirically confirmed after manual verification. Confirmed weaknesses were predominantly categorized as Security Misconfiguration, including missing Anti-CSRF protections, directory browsing exposure, absent Content Security Policy and anti-clickjacking headers, outdated JavaScript libraries, insecure cookie attributes (missing HttpOnly and SameSite), lack of Strict-Transport-Security and X-Content-Type-Options headers, and user-controllable HTML attributes. The contribution lies in demonstrating a reproducible dual-framework validation pipeline that distinguishes scanner alerts from confirmed exploitability, thereby strengthening methodological rigor in public-sector web security assessment. These findings indicate systemic configuration-level risk exposure that may elevate susceptibility to XSS, CSRF, clickjacking, and injection-related threats relative to comparable public-institution websites. However, the assessment is limited to a single institutional website and an unauthenticated testing scope, constraining generalizability and deeper application-layer analysis.