Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack
Title | Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Arnaldy, Defiana, Perdana, Audhika Rahmat |
Conference Name | 2019 2nd International Conference of Computer and Informatics Engineering (IC2IE) |
Date Published | Sept. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-2384-4 |
Keywords | Brute Force Attack, Collaboration, Cross Site Scripting, cross-site scripting, Human Behavior, man-in-the-middle attack, Metrics, Penetration Testing, policy-based governance, privacy, pubcrawl, resilience, Resiliency, Scalability, Sniffing, SQL detection, SQL Injection, website |
Abstract | This research conducted a security evaluation website with Penetration Testing terms. This Penetration testing is performed using the Man-In-The-Middle Attack method. This method is still widely used by hackers who are not responsible for performing Sniffing, which used for tapping from a targeted computer that aims to search for sensitive data. This research uses some penetration testing techniques, namely SQL Injection, XSS (Cross-site Scripting), and Brute Force Attack. Penetration testing in this study was conducted to determine the security hole (vulnerability), so the company will know about their weakness in their system. The result is 85% success for the penetration testing that finds the vulnerability on the website. |
URL | https://ieeexplore.ieee.org/document/8940872 |
DOI | 10.1109/IC2IE47452.2019.8940872 |
Citation Key | arnaldy_implementation_2019 |