Analisis Kerentanan SQL Injection Menggunakan SQLMap pada Kali Linux

Nanda Dwi Kurniawan(1*), Azmi Maulana Firdaus(2), Fausta Rizky Abriansah(3), Praditya Rendi Ferdian(4), Susanto Susanto(5)

(1) 
(2) Universitas Semarang
(3) Universitas Semarang
(4) Universitas Semarang
(5) USM
(*) Corresponding Author

Abstract


SQL injection is one of the serious threats in website security that can jeopardize the integrity of the database. This research focuses on using Sqlmap integrated in Kali Linux operating system to analyze website database vulnerability. Kali Linux was chosen because it is a Linux distribution specifically designed for penetration testing and has been equipped with various cybersecurity tools, including Sqlmap as a reliable open-source framework to detect and analyze SQL injection vulnerabilities automatically. The main objective of the research is to develop a systematic methodology in analyzing website database vulnerabilities through SQL injection techniques. The methodology includes the installation and configuration of Sqlmap on Kali Linux, implementation of penetration testing, and comprehensive analysis of the vulnerability findings. This research also emphasizes the importance of implementing security mechanisms and mitigation strategies to protect data integrity from SQL injection attacks. The results of this research are expected to contribute to the development of better cybersecurity practice.


Keywords


SQL Injection; Website; Kali Linux; Sqlmap; Cyber Security

Full Text:

PDF

References


A. Dos Santos, G. S. Pereira, R. A. Syuhada, and E. M. S. Sakti, “Uji Coba Keamanan Database Website Menggunakan Python Dan Sqlmap Melalui Command Prompt Pada Sistem Operasi Windows,” J. Ilm. Tek. Inform., vol. 25, no. 1, pp. 146–153, 2024, [Online]. Available: https://doi.org/10.37817/tekinfo.v25i1

Gusti Ayu Mas Ekayanti, Dewa Ayu Deby Cintiya, Putu Yoga Suartana, Rama Ngurah Putera Pinatih, Gede Arna Jude Saskara, and I Made Edy Listartha, “Perbandingan Tools Sql Sus, Sql Ninja, Dan the Mole Dalam Penerapan Sql Injection,” J. Inform. Teknol. dan Sains, vol. 4, no. 4, pp. 478–482, 2022, doi: 10.51401/jinteks.v4i4.2201.

D. P. Putranto, J. Jayanta, and B. Hananto, “Analisis Keamanan Website Leads UPNVJ Terhadap Serangan SQL Injection & Sniffing Attack,” Inform. J. Ilmu Komput., vol. 18, no. 3, p. 230, 2022, doi: 10.52958/iftk.v18i3.4690.

R. Supartini and J. M. Parenreng, “Deteksi Serangan SQL Injection pada Website dengan Menggunakan Metode Reguler Expression,” Progress. Information, Secur. Comput. Embed. Syst., vol. 1, no. 2, pp. 107–114, 2023, doi: 10.61255/pisces.v1i2.101.

A. Riyanti, B. M. Rahmanto, D. R. Hardianto, R. D. A. Yuristiawan, and A. Setiawan, “Uji Penetrasi Injeksi SQL terhadap Celah Keamanan Database Website menggunakan SQLmap,” J. Internet Softw. Eng., vol. 1, no. 4, p. 9, 2024, doi: 10.47134/pjise.v1i4.2623.

I. Hilmy, Muhammad and N. Azmi, Rama, Halim, “Konstruksi Pertahanan Dan Keamanan Negara Terhadap Perlindungan Data Dalam Cyberspace Untuk Menghadapi Pola Kebiasaan Baru The Construction of State Defense and Security Against Data Protection in Cyberspace to Facing New Habits,” J. Lemb. Ketahanan Nas. Republik Indones., vol. 9, no. 1, pp. 114–124, 2021.

S. P. Salsabilah, A. Al Mita, M. Zachwan Irsyad, and E. M. S. Sakti, “Implementasi Penggunaan Kali linux dengan Teknik Ddos dalam Uji coba Keamanan Website,” J. Ilm. Tek. Inform., vol. 25, no. 1, pp. 98–106, 2024.

N. A. Prasetiyo, R. B. Huwae, and A. H. Jatmika, “Audit Dan Analisis Website Pemerintah Menggunakan Pengujian Penetrasi Sql Injection dan Cross Site Scripting ( XSS ),” J. Teknol. Informasi, Komput. dan Apl., vol. 6, no. 2, pp. 525–533, 2024.

N. Sadikin and M. S. Mahardika, “Implementasi Keamanan Server Domain Controller Active Directory Domain Services terhadap Berbagai Threat dan Attack,” J. Maklumatika, vol. 11, no. 1, pp. 12–21, 2024, [Online]. Available: https://maklumatika.i-tech.ac.id/index.php/maklumatika/article/view/254

D. P. Putra, I. W. A. P. Putra, and I. G. W. P. Sucipta, “Perbandingan Password Attack Menggunakan Tools Barshwf, Hashcat, dan Hash Cracker Console,” JTIK (Jurnal Tek. Inform. Kaputama), vol. 7, no. 1, pp. 181–187, 2023.

M. Ridwan, S. AM, B. Ulum, and F. Muhammad, “Pentingnya Penerapan Literature Review pada Penelitian Ilmiah,” J. Masohi, vol. 2, no. 1, p. 42, 2021, doi: 10.36339/jmas.v2i1.427.

Rusandi and Muhammad Rusli, “Merancang Penelitian Kualitatif Dasar/Deskriptif dan Studi Kasus,” Al-Ubudiyah J. Pendidik. dan Stud. Islam, vol. 2, no. 1, pp. 48–60, 2021, doi: 10.55623/au.v2i1.18.

G. A. Saputra, E. I. Alwi, and A. W. M. Gaffar, “Analisis Keamanan Website SIAKAD menggunakan Pentest Tools,” LINIER Lit. Inform. dan Komput., vol. 1, no. 4, pp. 379–388, 2024.

F. Fachri, “Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing,” J. Teknol. Inf. dan Ilmu Komput., vol. 10, no. 1, pp. 51–58, 2023, doi: 10.25126/jtiik.20231015872.

H. Haikal Muhammad, A. Id Hadiana, and H. Ashaury, “Pengamanan Aplikasi Web Dari Serangan Sql Injection Dan Cross Site Scripting Menggunakan Web Application Firewall,” JATI (Jurnal Mhs. Tek. Inform., vol. 7, no. 5, pp. 3265–3273, 2024, doi: 10.36040/jati.v7i5.7320




DOI: http://dx.doi.org/10.30998/string.v10i1.26855

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Nanda Dwi Kurniawan, Azmi Maulana Firdaus, Fausta Rizky Abriansah, Praditya Rendi Ferdian, Susanto Susanto

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

 

STRING (Satuan Tulisan Riset dan Inovasi Teknologi) indexed by:



Lisensi Creative Commons
Ciptaan disebarluaskan di bawah Lisensi Creative Commons Atribusi 4.0 Internasional.
View My Stats

Flag Counter