Analisis Keamanan Aplikasi Lumpang Menggunakan Framework OWASP 10 (Study Kasus PT. Lumpang Sejahtera Indonesia)

Paramasasanka, sankala Radhiva (2021) Analisis Keamanan Aplikasi Lumpang Menggunakan Framework OWASP 10 (Study Kasus PT. Lumpang Sejahtera Indonesia). Undergraduate Thesis thesis, Institut Teknologi Telkom Purwokerto.

[img] Text
Cover.pdf

Download (3MB)
[img] Text
Abstract.pdf

Download (243kB)
[img] Text
Abstrak.pdf

Download (247kB)
[img] Text
BAB I.pdf

Download (1MB)
[img] Text
BAB II.pdf

Download (4MB)
[img] Text
BAB III.pdf

Download (3MB)
[img] Text
7. BAB IV.pdf
Restricted to Registered users only

Download (2MB) | Request a copy
[img] Text
BAB V.pdf

Download (232kB)
[img] Text
Daftar Pustaka.pdf

Download (679kB)
[img] Text
lampiran.pdf
Restricted to Registered users only

Download (4MB) | Request a copy

Abstract

the rapid development of technology also affects the way individuals, organizations and business people carry out the process of sending information, processing transactions. PT. Lumpang Sejahtera Indonesia is an e-commarce company where the lumpang applications is a product. Starting from an e-commerce website, namely www.lumpungpangan.com where this e-commerce website belongs to the lower middle class e-commerce. As time goes by, this lumbungpangan website will no longe be used because there an increasing number for users, transactions, products, digitalizations of the marketing business and additional features where the system support mobile applications only. Finally the lumbung pangan website was not used and migrated to a mobile application. When migrating on to an application, the lumpang application has never been done. Application security analysis with the OWASP 10 framework. To find out how vulnerable an application is to external attacks, it is necessary to carry out a penetration teting process, where in penetration testing there is a planning and preparation process, penetration testing and reporting. To perform a security vulnerability on the mortart application using the santoku linux operating system using tools, dex2jar, JD-GUI, wireshark. The results of the 10 provisions of OWASP top 10 mobile there are 3 weaknesses, namely the use of onapporprivate platforms, Reverse Enginering, Insufficient Cryptography. Keywords : Security, Applications, Penetration Testing, OWASP, Santoko Linux.

Item Type: Thesis (Undergraduate Thesis)
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Informatics > Informatics Engineering
Depositing User: pustakawan ittp
Date Deposited: 08 Dec 2021 03:48
Last Modified: 16 Jun 2022 06:15
URI: http://repository.ittelkom-pwt.ac.id/id/eprint/6688

Actions (login required)

View Item View Item