Visible to the public Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack

TitleImplementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack
Publication TypeConference Paper
Year of Publication2019
AuthorsArnaldy, Defiana, Perdana, Audhika Rahmat
Conference Name2019 2nd International Conference of Computer and Informatics Engineering (IC2IE)
Date PublishedSept. 2019
PublisherIEEE
ISBN Number978-1-7281-2384-4
KeywordsBrute Force Attack, Collaboration, Cross Site Scripting, cross-site scripting, Human Behavior, man-in-the-middle attack, Metrics, Penetration Testing, policy-based governance, privacy, pubcrawl, resilience, Resiliency, Scalability, Sniffing, SQL detection, SQL Injection, website
Abstract

This research conducted a security evaluation website with Penetration Testing terms. This Penetration testing is performed using the Man-In-The-Middle Attack method. This method is still widely used by hackers who are not responsible for performing Sniffing, which used for tapping from a targeted computer that aims to search for sensitive data. This research uses some penetration testing techniques, namely SQL Injection, XSS (Cross-site Scripting), and Brute Force Attack. Penetration testing in this study was conducted to determine the security hole (vulnerability), so the company will know about their weakness in their system. The result is 85% success for the penetration testing that finds the vulnerability on the website.

URLhttps://ieeexplore.ieee.org/document/8940872
DOI10.1109/IC2IE47452.2019.8940872
Citation Keyarnaldy_implementation_2019