Analysis of Cross Site Request Forgery (CSRF) Attacks on West Lampung Regency Websites Using OWASP ZAP Tools
نویسندگان
چکیده
Technological developments in the field of increasingly advanced computers and networks have caused many organizations to use web applications provide business services. With increasing popularity internet, number cyber-attacks has also increased. To overcome these negative impacts, role network security is very necessary. The Cross Site Request Forgery (CSRF) method a penetration technique aimed at exploiting website vulnerabilities there one tool commonly used find on websites, namely OWASP ZAP. research succeeded proving West Lampung district by conducting attack simulations. From results experiment, it was found that were 12 alerts with low risk Regency. In are 53 URL pages vulnerable attack.
منابع مشابه
Server Side Protection against Cross Site Request Forgery using CSRF Gateway
The E-Commerce and Social Media has become the new identity for millions of users across the globe. Ease of services for Shopping, Travel, Internet Banking, Social Media, chat and collaboration Apps etc. have become part of one’s life where these identities have name, media content, confidential notes, business projects and credit cards. Convenience and connections brings the ease of connectivi...
متن کاملCross Site Request Forgery on Android WebView
Android has always been about connectivity and providing great browsing experience. Web-based content can be embedded into the Android application using WebView. It is a User Interface component that displays webpages. It can either display a remote webpage or can also load static HTML data. This encompasses the functionality of a browser that can be integrated to application. WebView provides ...
متن کاملCross Site Request Forgery: Preventive Measures
Cross Site Request Forgery is considered as one of top vulnerability in today’s web, where an untrusted website can force the user browser to send the unauthorized valid request to the trusted site. Cross Site Request Forgery will let the integrity of the legitimate user. So far many solutions have been proposed for the CSRF attacks such as the referrer HTTP Header, Custom HTTP header, Origin H...
متن کاملDefeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection
A cross site request forgery (CSRF) attack occurs when a user’s web browser is instructed by a malicious webpage to send a request to a vulnerable web site, resulting in the vulnerable web site performing actions not intended by the user. CSRF vulnerabilities are very common, and consequences of such attacks are most serious with financial websites. We recognize that CSRF attacks are an example...
متن کاملMitigating CSRF attacks on OAuth 2.0 and OpenID Connect
Many millions of users routinely use their Google, Facebook and Microsoft accounts to log in to websites supporting OAuth 2.0 and/or OpenID Connect-based single sign on. The security of OAuth 2.0 and OpenID Connect is therefore of critical importance, and it has been widely examined both in theory and in practice. Unfortunately, as these studies have shown, real-world implementations of both sc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Jurnal Sistem Informasi dan Komputer
سال: 2022
ISSN: ['2301-7988', '2581-0588']
DOI: https://doi.org/10.32736/sisfokom.v11i2.1393