International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 186 - Number 45 |
Year of Publication: 2024 |
Authors: Dinda Aulia Rizki, Imam Riadi |
10.5120/ijca2024924085 |
Dinda Aulia Rizki, Imam Riadi . Security Analysis of Village Government Website Against Cross-Site Scripting Attacks using Penetration Testing. International Journal of Computer Applications. 186, 45 ( Oct 2024), 11-21. DOI=10.5120/ijca2024924085
The internet is the main source for obtaining various information, both useful and not. A website, also known as a site or portal, is a digital platform consisting of a collection of pages designed to present information in various formats, such as text, still and moving images, animations, and sound. This website serves as an important platform for public services, so it is crucial to protect it from cyber threats. This research aims to analyze and improve the security vulnerabilities of websites against Cross-Site Scripting (XSS) attacks using the Penetration Testing method. The research methodology used in this study includes four essential steps to address potential XSS vulnerabilities on the Purwobakti website. The first step is Preparation, which involves a thorough analysis of the security issues and the development of action plans to address any identified threats. The second step, Scanning, involves a comprehensive scan of all data collected in the previous phase. The third step is Testing, where an in-depth analysis is conducted to identify and evaluate the existing security weaknesses on the website. Finally, the Reporting phase compiles the security testing results into a comprehensive report that provides a complete overview the website security status. The results of this study identified 8 findings: 1 high-risk threat of Server-Side Template Injection (Blind), 1 medium-risk of Content Security Policy (CSP) Header Not Set, Absence Of Anti-CSRF Tokens, and Missing Anti-clickjacking Header, one low-risk threat of Strict-Transport-Security Header Not Set, and 3 informational-level risks, including User Controllable HTML Element Attribute (Potential XSS), Re-examine Cache-control Directives, and Modern Web Application.