The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).
If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.
Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.
BibTex Citation Data :
@article{JOIV470, author = {Alde Alanda and Deni Satria and M.Isthofa Ardhana and Andi Ahmad Dahlan and Hanriyawan Adnan Mooduto}, title = {Web Application Penetration Testing Using SQL Injection Attack}, journal = {JOIV : International Journal on Informatics Visualization}, volume = {5}, number = {3}, year = {2021}, keywords = {Penetration testing; cybersecurity; website; information security; SQL injection.}, abstract = {A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store information safely and avoid cyber attacks. Web applications go through rapid development phases with short turnaround times, challenging to eliminate vulnerabilities. The vulnerability on the web application can be analyzed using the penetration testing method. This research uses penetration testing with the black-box method to test web application security based on the list of most attacks on the Open Web Application Security Project (OWASP), namely SQL Injection. SQL injection allows attackers to obtain unrestricted access to the databases and potentially collecting sensitive information from databases. This research randomly tested several websites such as government, schools, and other commercial websites with several techniques of SQL injection attack. Testing was carried out on ten websites randomly by looking for gaps to test security using the SQL injection attack. The results of testing conducted 80% of the websites tested have a weakness against SQL injection attacks. Based on this research, SQL injection is still the most prevalent threat for web applications. Further research can explain detailed information about SQL injection with specific techniques and how to prevent this attack.}, issn = {2549-9904}, pages = {320--326}, doi = {10.30630/joiv.5.3.470}, url = {https://joiv.org/index.php/joiv/article/view/470} }
Refworks Citation Data :
@article{{JOIV}{470}, author = {Alanda, A., Satria, D., Ardhana, M., Dahlan, A., Mooduto, H.}, title = {Web Application Penetration Testing Using SQL Injection Attack}, journal = {JOIV : International Journal on Informatics Visualization}, volume = {5}, number = {3}, year = {2021}, doi = {10.30630/joiv.5.3.470}, url = {} }Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
__________________________________________________________________________
JOIV : International Journal on Informatics Visualization
ISSN 2549-9610 (print) | 2549-9904 (online)
Organized by Department of Information Technology - Politeknik Negeri Padang, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
W : http://joiv.org
E : joiv@pnp.ac.id, hidra@pnp.ac.id, rahmat@pnp.ac.id
View JOIV Stats
is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.