A defacement attack on the official website of the Ministry of Home Affairs (Kemendagri) demonstrates that government web applications still contain serious security gaps that can be exploited by malicious actors, indicating insufficient implementation of best-practice security standards. This study aims to analyze the security level of the Kemendagri website using the OWASP Web Security Testing Guide (WSTG) methodology. The research applies the OWASP WSTG testing framework to identify vulnerabilities related to authentication, authorization, input validation, server configuration, and system update management. The analysis compares field findings with WSTG testing categories to determine the most significant risk points. Supporting data were obtained from the reported defacement incident, which helps strengthen the threat context and illustrate the exploitation patterns involved. The results indicate that weaknesses in administrative access and suboptimal server configuration were the primary factors enabling the defacement attack. The application of OWASP WSTG proved effective in identifying critical vulnerabilities that could be exploited in government web applications. This study provides important contributions to government institutions by offering practical guidance for improving web application security through standardized testing, ongoing system maintenance, and the implementation of stronger security controls.
Copyrights © 2025