SECURITY TESTING (WHITE BOX PENETRATION TESTING) PADA AUTHENTICATION SISTEM LOGIN WEBSITE
DOI:
https://doi.org/10.33884/jif.v13i02.10660Keywords:
Autentication, MD5, Penetration\, SecurityAbstract
In 2024, according to the 2024 Indonesian Cybersecurity Landscape by the National Cyber Security Agency (BSSN), Indonesia experienced a total of 330,527,636 anomalous traffic. The highest traffic occurred in December with 112,085,045 traffic, and the lowest in May with 12,273,078 traffic. The impact of this leak is very broad, causing the risk of phishing, account hijacking, identity theft, ransomware attacks on companies, and misuse of business email. Based on this background, this study aims to minimize the many attacks that occur in the cyber world, especially on website applications. By using the Security Testing method (White Box Penetration Testing). The MD5 algorithm is still effective in protecting passwords in databases from SQL injection attacks that use common username and password combinations and on websites that use PHP without JavaScript is proven safe from Cross-Site Scripting attacks.
References
Badan Siber dan Sandi Negara (BSSN). (2024). LANSKAP KEAMANAN SIBER 2024. https://www.bssn.go.id/wp-content/uploads/2025/02/LANSKAP-KEAMANAN-SIBER-2024-1.pdf
CSIRT Indonesia. (2025). Alarm Siber Global: 16 Miliar Username & Password Bocor. https://csirt.or.id/berita/siber-global-16-miliar-password-bocor
Erdogan, G. (2009). Security Testing of Web Based Applications. July.
Κωνσταντίνου, Δ. Χ. (2024). Penetration Testing Methodology Μεθοδολογία Δοκιμών Διείσδυσης. February. https://doi.org/10.26262/heal.auth.ir.356613
Hasibuan, M., & Elhanafi, A. M. (2022). Penetration Testing Sistem Jaringan Komputer Menggunakan Kali Linux untuk Mengetahui Kerentanan Keamanan Server dengan Metode Black Box. Sudo Jurnal Teknik Informatika, 1(4), 171–177. https://doi.org/10.56211/sudo.v1i4.160
Widi Linggih Jaelani, Yanto, Y., & Khoirunnisa, F. (2023). Penetration Testing Website Dengan Metode Black Box Testing Untuk Meningkatkan Keamanan Website Pada Instansi (Redacted). Naratif : Jurnal Nasional Riset, Aplikasi Dan Teknik Informatika, 5(1), 1–8. https://doi.org/10.53580/naratif.v5i1.180
Risky, M. A. Z., & Yuhandri, Y. (2021). Optimalisasi dalam Penetrasi Testing Keamanan Website Menggunakan Teknik SQL Injection dan XSS. Jurnal Sistim Informasi Dan Teknologi, 3, 215–220. https://doi.org/10.37034/jsisfotek.v3i4.68
Wardhana, A. W., & Seta, H. B. (2021). Analisis Keamanan Sistem Pembelajaran Online Menggunakan Metode ISSAF pada Website Universitas XYZ. Informatik : Jurnal Ilmu Komputer, 17(3), 226. https://doi.org/10.52958/iftk.v17i3.3653
Fadlullah Fadlullah, Muhlis Tahir, Briliant Pijar Bintari, Mia Liana Dewi, Muhammad Fahri Ilmy, Syafi’ Syafi’, & Rama Ardiansyah. (2023). Implementasi Algoritma AES pada Autentikasi Login Sistem Informasi. Jurnal Bintang Pendidikan Indonesia, 1(2), 251–263. https://doi.org/10.55606/jubpi.v1i2.1420
Rusdan, M., & Sabar, M. (2020). Analisis dan Perancangan Jaringan Wireless Dengan Wireless Distribution System Menggunakan User Authentication Berbasis Multi-Factor Authentication. JOINT (Journal of Information Technology), 02(01), 17–24.
Fauzi, M. K., & Setiawan, A. (2024). Implementasi Algoritma Vigenere Chiper atau Caesar Chiper Untuk Pengamanan Password Dalam Penerimaan Siswa Baru. Jurnal Info Digit) eISSN29880289 Vo l. Jid, 2(3), 1083. http://kti.potensi-utama.ac.id/index.php/JID
Wahyu Hidayat M, Nurhayi Musdira, Natatsa Rasyid, Miftahul Khairi S, & Muh Juharman. (2023). Analisis Ancaman Terhadap Keamanan Data Pribadi pada Email. Jurnal Pendidikan Terapan, 01, 7–12. https://doi.org/10.61255/jupiter.v1i2.73
Fauzi, F. M., Indonesia, U. K., Afrianto, I., & Indonesia, U. K. (2023). Implementasi Algoritma Md5 Untuk Keamanan Login Website Implementasi Algoritma Md5 Untuk Keamanan. d(August), 1–5
Yamin, M., Malethi, T. T., Monica, Jodhika, & Natali, S. (2023). Evaluasi Risiko Pada Penggunaan Password Yang Lemah: Analisis Kasus Penggunaan Password Umum. Jurnal Ilmiah Multidisiplin Ilmu Komputer, 1(1), 41–48. https://doi.org/10.61674/jimik.v1i1.112
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 JURNAL ILMIAH INFORMATIKA

This work is licensed under a Creative Commons Attribution 4.0 International License.