Analisis Keamanan Website Shih Ka Plastic Boxes Factory Terhadap Ancaman SQL Injection

Main Article Content

Muhammad Muhsinin Muhsinin
Mukhammad Said Riza Zudi
Yekti Adi Prasetyo
Ahmad Maulana Arif
Susanto

Abstract

This study discusses security vulnerabilities in web applications, focusing on SQL injection attacks. With the increasing number of internet users and sensitive data being managed, system security on websites has become crucial. This research uses SQLmap to identify and explore potential attacks on the Shih ka Plastic Boxes Factory website. The findings reveal significant security gaps due to insufficient input validation. It was found that attackers could easily access sensitive data through the exploitation of these vulnerabilities. Additionally, recommendations for security improvements are suggested, including the implementation of strict input validation and the use of prepared statements to protect the database.

Article Details

How to Cite
Muhsinin, M. M., Mukhammad Said Riza Zudi, Yekti Adi Prasetyo, Ahmad Maulana Arif, & Susanto. (2025). Analisis Keamanan Website Shih Ka Plastic Boxes Factory Terhadap Ancaman SQL Injection. JITSI : Jurnal Ilmiah Teknologi Sistem Informasi, 6(1), 50 - 55. https://doi.org/10.62527/jitsi.6.1.329
Section
Articles

References

[1] N. Huda and M. Megawaty, “Analisis Kinerja Website Dinas Komunikasi dan Informatika Menggunakan Metode Pieces,” Jurnal Sisfokom (Sistem Informasi dan Komputer), vol. 10, no. 2, pp. 155–161, Jul. 2021, doi: 10.32736/sisfokom.v10i2.1018.
[2] C. Adi Putra, R. Pratama, T. Sutabri, J. A. Jenderal Yani No, and S. Selatan, “ANALISIS MANFAAT MACHINE LEARNING PADA NEXT-GENERATION FIREWALL SOPHOS XG 330 DALAM MENGATASI SERANGAN SQL INJECTION”, doi: 10.36595/misi.v5i2.
[3] A. W. Wardhana and H. B. Seta, “Analisis Keamanan Sistem Pembelajaran Online Menggunakan Metode ISSAF pada Website Universitas XYZ,” vol. 3, p. 2021.
[4] Y. Natanael, R. Felicia, E. Malays, and S. Sakti, “Analisis Keamanan Informasi Bagi Pengguna Website Menggunakan Kalilinux Melalui Teknik SQL Injection”, doi: 10.37817/tekinfo.v25i1.
[5] A. Zirwan, “Pengujian dan Analisis Kemanan Website Menggunakan Acunetix Vulnerability Scanner,” Jurnal Informasi dan Teknologi, pp. 70–75, Mar. 2022, doi: 10.37034/jidt.v4i1.190.
[6] A. W. Kuncoro, J. Informatika, F. Rahma, and M. E. Jurusan Informatika, “Analisis Metode Open Web Application Security Project (OWASP) pada Pengujian Keamanan Website: Literature Review.” [Online]. Available: https://www.sciencedirect.com
[7] R. Yulia Andarini, P. Hendradi, and S. Nugroho, “MENINGKATKAN KEAMANAN TERHADAP SQL INJECTION STUDI KASUS SISTEM KEPEGAWAIAN BNN,” Indonesian Journal of Business Intelligence (IJUBI), vol. 6, no. 1, Jun. 2023, doi: 10.21927/ijubi.v6i1.3161.
[8] M. F. Al Azhar and R. Harwahyu, “Implementasi Dashboard Monitoring untuk Pengujian Kerentanan SQL Injection pada Environment GitLab.”
[9] R. Hermawan, “STRING (Satuan Tulisan Riset dan Inovasi Teknologi) TEKNIK UJI PENETRASI WEB SERVER MENGGUNAKAN SQL INJECTION DENGAN SQLMAP DI KALILINUX.”
[10] A. Riyanti, B. M. Rahmanto, D. R. Hardianto, R. D. A. Yuristiawan, and A. Setiawan, “Uji Penetrasi Injeksi SQL terhadap Celah Keamanan Database Website menggunakan SQLmap,” Journal of Internet and Software Engineering, vol. 1, no. 4, p. 9, Jun. 2024, doi: 10.47134/pjise.v1i4.2623.
[11] N. Christina Sari et al., “Deteksi Kerentanan SQL Injection pada Website Menggunakan Vulnerability Assessment Info Artikel,” vol. 2, no. 1, pp. 9–17, 2024, doi: 10.26714/jodi.
[12] “346325-penetration-testing-database-menggunakan-21bc5d72”.