Analisis Keamanan Website Shih Ka Plastic Boxes Factory Terhadap Ancaman SQL Injection
Main Article Content
Abstract
This study discusses security vulnerabilities in web applications, focusing on SQL injection attacks. With the increasing number of internet users and sensitive data being managed, system security on websites has become crucial. This research uses SQLmap to identify and explore potential attacks on the Shih ka Plastic Boxes Factory website. The findings reveal significant security gaps due to insufficient input validation. It was found that attackers could easily access sensitive data through the exploitation of these vulnerabilities. Additionally, recommendations for security improvements are suggested, including the implementation of strict input validation and the use of prepared statements to protect the database.
Article Details

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
[2] C. Adi Putra, R. Pratama, T. Sutabri, J. A. Jenderal Yani No, and S. Selatan, “ANALISIS MANFAAT MACHINE LEARNING PADA NEXT-GENERATION FIREWALL SOPHOS XG 330 DALAM MENGATASI SERANGAN SQL INJECTION”, doi: 10.36595/misi.v5i2.
[3] A. W. Wardhana and H. B. Seta, “Analisis Keamanan Sistem Pembelajaran Online Menggunakan Metode ISSAF pada Website Universitas XYZ,” vol. 3, p. 2021.
[4] Y. Natanael, R. Felicia, E. Malays, and S. Sakti, “Analisis Keamanan Informasi Bagi Pengguna Website Menggunakan Kalilinux Melalui Teknik SQL Injection”, doi: 10.37817/tekinfo.v25i1.
[5] A. Zirwan, “Pengujian dan Analisis Kemanan Website Menggunakan Acunetix Vulnerability Scanner,” Jurnal Informasi dan Teknologi, pp. 70–75, Mar. 2022, doi: 10.37034/jidt.v4i1.190.
[6] A. W. Kuncoro, J. Informatika, F. Rahma, and M. E. Jurusan Informatika, “Analisis Metode Open Web Application Security Project (OWASP) pada Pengujian Keamanan Website: Literature Review.” [Online]. Available: https://www.sciencedirect.com
[7] R. Yulia Andarini, P. Hendradi, and S. Nugroho, “MENINGKATKAN KEAMANAN TERHADAP SQL INJECTION STUDI KASUS SISTEM KEPEGAWAIAN BNN,” Indonesian Journal of Business Intelligence (IJUBI), vol. 6, no. 1, Jun. 2023, doi: 10.21927/ijubi.v6i1.3161.
[8] M. F. Al Azhar and R. Harwahyu, “Implementasi Dashboard Monitoring untuk Pengujian Kerentanan SQL Injection pada Environment GitLab.”
[9] R. Hermawan, “STRING (Satuan Tulisan Riset dan Inovasi Teknologi) TEKNIK UJI PENETRASI WEB SERVER MENGGUNAKAN SQL INJECTION DENGAN SQLMAP DI KALILINUX.”
[10] A. Riyanti, B. M. Rahmanto, D. R. Hardianto, R. D. A. Yuristiawan, and A. Setiawan, “Uji Penetrasi Injeksi SQL terhadap Celah Keamanan Database Website menggunakan SQLmap,” Journal of Internet and Software Engineering, vol. 1, no. 4, p. 9, Jun. 2024, doi: 10.47134/pjise.v1i4.2623.
[11] N. Christina Sari et al., “Deteksi Kerentanan SQL Injection pada Website Menggunakan Vulnerability Assessment Info Artikel,” vol. 2, no. 1, pp. 9–17, 2024, doi: 10.26714/jodi.
[12] “346325-penetration-testing-database-menggunakan-21bc5d72”.