2022 10th International Conference on Cyber and IT Service Management (CITSM) 2022
DOI: 10.1109/citsm56380.2022.9935837
|View full text |Cite
|
Sign up to set email alerts
|

Security Vulnerability Analysis of the Sharia Crowdfunding Website Using OWASP-ZAP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
2

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 23 publications
0
3
0
2
Order By: Relevance
“…Figure 1 presents the updated top 10 vulnerabilities from 2017 to 2021 [16]. Because OWASP's security standards are thorough and specific dependent on the configuration of the website page and server, the OWASP TOP 10 approach is effective as a security standard for carrying out penetration testing on a website [17]. The main reason behind broken access control vulnerability is failing to adhere to secure design principles like enforce appropriate input validation and take action to limit critical information disclosure, setting up secure sessions, and management, control of the readability of the directory [18].…”
Section: Owasp Top 10mentioning
confidence: 99%
“…Figure 1 presents the updated top 10 vulnerabilities from 2017 to 2021 [16]. Because OWASP's security standards are thorough and specific dependent on the configuration of the website page and server, the OWASP TOP 10 approach is effective as a security standard for carrying out penetration testing on a website [17]. The main reason behind broken access control vulnerability is failing to adhere to secure design principles like enforce appropriate input validation and take action to limit critical information disclosure, setting up secure sessions, and management, control of the readability of the directory [18].…”
Section: Owasp Top 10mentioning
confidence: 99%
“…2). Open Web Application Security Project Zed Attack Proxy (OWASP ZAP) is an open-source tool that is useful for finding vulnerabilities in a website application [25] [26]. The stages of its use consist of 5 steps, namely 1) Input -enter the hostname/host ID as input to attack; 2) Scan -application scan; 3) Discover -find application loopholes; 4) Analysisthe process of analyzing the findings by categorizing them into low, medium, high, and information; 5) Result -final result [27], [28].…”
Section: B Smart Contractmentioning
confidence: 99%
“…Further testing of dApps using the OWASP ZAP tool. The last is to analyze the resulting DApps.Open Web Application Security Project Zed Attack Proxy (OWASP ZAP) is an open-source tool that is useful for finding vulnerabilities in a website application[25][26]. The stages of its use consist of 5 steps, namely 1) Input -enter the hostname/host ID as input to attack; 2) Scan -application…”
mentioning
confidence: 99%
“…Hasil pengujian menunjukkan variasi tingkat kerentanan, dengan solusi yang telah diusulkan untuk meningkatkan keamanan situs web. Penelitian ini menggunakan metode pengujian keamanan, alat-alat, dan fokus pada kerentanan khusus seperti SQL injection dan XSS, serta memanfaatkan kerangka kerja untuk mendeteksi dan mencegah kerentanan dalam perangkat lunak sistem [13].…”
Section: Pendahuluanunclassified