Pengujian dan Analisis Keamanan Website Menggunakan Acunetix Vulnerability Scanner
Main Article Content
Abstract
The Covid-19 pandemic indirectly accelerated the 4.0 Industrial Revolution where technology became an important point in the industrial movement. Changes that are forced quickly, sometimes release some application developers to test the product to be implemented, because it is required quickly to compensate for the change. Padang Institute of Technology (ITP) also made rapid changes to its official website, to provide actual information of campus activities during this pandemic. Conduct testing and analysis of the extent of itp website security and provide troubleshooting advice from the results of the analysis. Testing is done using the Acunetix Vulnerability Scanner tool against the ITP website. The method used is descriptive analysis, which is the data obtained presented in the form of sentences described, thus providing clarity from the results of the analysis carried out.The results obtained from this study are ITP websites with acunex threat at level 3 which includes High theory and scanning time used for 2 Hours 5 minutes. In this study there were 714 alerts or gaps found consisting of 94 at high level, 25 at medium level, 46 at low level and 549 at informational level. Here is an explanation of the alert or loopholes found in the scanning website. From the analysis data it was concluded that in testing using acunetix itp website is at level 3, after improvement of itp website is at level 1.
Article Details

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
[2] J. N. Goel and B. M. Mehtre, “Vulnerability Assessment & Penetration Testing as a Cyber Defence Technology,” Procedia Comput. Sci., vol. 57, pp. 710–715, 2015, doi: 10.1016/j.procs.2015.07.458.
[3] F. Al Fajar, “Analisis Keamanan Aplikasi Web Prodi Teknik Informatika Uika Menggunakan Acunetix Web Vulnerability,” Inova-Tif, vol. 3, no. 2, p. 110, 2020, doi: 10.32832/inova-tif.v3i2.4127.
[4] I. Riadi, A. Yudhana, and Y. W, “Analisis Keamanan Website Open Journal System Menggunakan Metode Vulnerability Assessment,” J. Teknol. Inf. dan Ilmu Komput., vol. 7, no. 4, p. 853, 2020, doi: 10.25126/jtiik.2020701928.
[5] Ade Bastian, Harun Sujadi, and Latiful Abror, “ANALISIS KEAMANAN APLIKASI DATA POKOK PENDIDIKAN (DAPODIK) MENGGUNAKAN PENETRATION TESTING DAN SQL INJECTION,” INFOTECH J., vol. 6, pp. 65–70, 2020, doi: 10.31949/infotech.v6i2.848.
[6] U. Gupta, S. Raina, P. Verma, P. Singh, and M. M. Aggarwal, “Web Penetration Testing,” Web Penetration Test., vol. 8, no. 5, pp. 56–60, 2020, doi: doi.org/10.22214/ijraset.2020.5011.
[7] B. W. Retna Mulya and A. Tarigan, “Pemeringkatan Risiko Keamanan Sistem Jaringan Komputer Politeknik Kota Malang Menggunakan Cvss Dan Fmea,” Ilk. J. Ilm., vol. 10, no. 2, pp. 190–200, 2018, doi: 10.33096/ilkom.v10i2.311.190-200.
[8] E. Irawadi Alwi and F. Umar, “Analisis Keamanan Website Menggunakan Teknik Footprinting dan Vulnerability Scanning,” 2020. doi: https://doi.org/10.19184/isj.v5i2.18941.
[9] F. Wibowo and A. Purwo Wicaksono, “Uji Vulnerability pada Website Jurnal Ilmiah Universitas Muhammadiyah Purwokerto Menggunakan OpenVAS dan Acunetix WVS,” J. Inform., vol. 6, no. 2, pp. 212–218, 2019, doi: 10.31294/ji.v6i2.5925.
[10] A. Priandoyo, “Vulnerability Assessment untuk Meningkatkan Kesadaran Pentingnya Keamanan Informasi,” J. Tek. Inform. dan Sist. Inf., vol. 1, no. 2, pp. 73–83, 2006.
[11] I. Riadi, Herman, and A. Z. Ifani, “Optimasi Keamanan Web Server terhadap Serangan Broken Authentication Menggunakan Teknologi Blockchain,” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 6, no. 3, pp. 139–148, 2021, doi: 10.14421/jiska.2021.6.3.139-148.
[12] Y. A. Pohan, “Meningkatkan Keamanan Webserver Aplikasi Pelaporan Pajak Daerah Menggunakan Metode Penetration Testing Execution Standar,” J. Sistim Inf. dan Teknol., vol. 3, pp. 1–6, 2021, doi: 10.37034/jsisfotek.v3i1.36.
[13] I. Syarifudin, “Pentesting dan Analisis Keamanan Web Paud Dikmas,” Pentesting Dan Anal. Keamanan Web Paud Dikmas, no. April, p. 2, 2018, doi: 10.5281/zenodo.1211847.
[14] R. Mayasari, A. A. Ridha, D. Juardi, and K. A. Baihaqi, “Analisis Vulnerability pada Website Universitas Singaperbangsa Karawang menggunakan Acunetix Vulnerability,” 2020. doi: 10.35706/sys.v2i1.3450.
[15] M. Orisa and M. Ardita, “VULNERABILITY ASSESMENT UNTUK MENINGKATKAN KUALITAS KEMANAN WEB,” 2021. doi: 10.36040/mnemonic.v4i1.3213.
[16] G. S. T and Sasikala D, “Vulnerability Assessment of Web Applications using Penetration Testing,” Int. J. Recent Technol. Eng., vol. 8, no. 4, pp. 1552–1556, Nov. 2019, doi: 10.35940/ijrte.b2133.118419.
[17] M. Ula, “Evaluasi Kinerja Software Web Penetration Testing,” TECHSI - J. Tek. Inform., vol. 11, no. 3, p. 336, 2019, doi: 10.29103/techsi.v11i3.1996.