11
TUGAS AKHIR SECURITY TESTING DENGAN MENGGUNAKAN METODE OSSTMM PADA WEB INSTITUT TEKNOLOGI TELKOM PURWOKERTO EDY SURMANA PUTRA TARIGAN 14102058 PROGRAM STUDI S1 INFORMATIKA FAKULTAS TEKNOLOGI INDUSTRI DAN INFORMATIKA INSTITUT TEKNOLOGI TELKOM PURWOKERTO 2018

SECURITY TESTING DENGAN MENGGUNAKAN METODE OSSTMM …

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SECURITY TESTING DENGAN MENGGUNAKAN METODE OSSTMM …

TUGAS AKHIR

SECURITY TESTING DENGAN MENGGUNAKAN

METODE OSSTMM PADA WEB INSTITUT

TEKNOLOGI TELKOM PURWOKERTO

EDY SURMANA PUTRA TARIGAN

14102058

PROGRAM STUDI S1 INFORMATIKA

FAKULTAS TEKNOLOGI INDUSTRI DAN INFORMATIKA

INSTITUT TEKNOLOGI TELKOM PURWOKERTO

2018

Page 2: SECURITY TESTING DENGAN MENGGUNAKAN METODE OSSTMM …

ii

TUGAS AKHIR

SECURITY TESTING DENGAN MENGGUNAKAN

METODE OSSTMM PADA WEB INSTITUT

TEKNOLOGI TELKOM PURWOKERTO

SECURITY TESTING USING OSSTMM METHOD AT

INSTITUT TEKNOLOGI TELKOM PURWOKERTO WEB

Disusun Sebagai Salah Satu Syarat untuk Memperoleh Gelar Sarjana Komputer

EDY SURMANA PUTRA TARIGAN

14102058

PROGRAM STUDI S1 INFORMATIKA

FAKULTAS TEKNOLOGI INDUSTRI DAN INFORMATIKA

INSTITUT TEKNOLOGI TELKOM PURWOKERTO

2018

Page 3: SECURITY TESTING DENGAN MENGGUNAKAN METODE OSSTMM …

ii

Page 4: SECURITY TESTING DENGAN MENGGUNAKAN METODE OSSTMM …

ii

Page 5: SECURITY TESTING DENGAN MENGGUNAKAN METODE OSSTMM …

iii

Page 6: SECURITY TESTING DENGAN MENGGUNAKAN METODE OSSTMM …

iv

KATA PENGANTAR

Segala Puji syukur penulis panjatkan kehadirat Tuhan Yang Maha Esa atas

karuniaNya dan atas segala limpahan rahmatNya kepada penyusun sehingga

penyusun dapat menyelesaikan laporan proposal penelitian ini dengan baik.

Penulis secara langsung ingin mengucapkan terima kasih kepada pihak yang

telah membantu dalam penelitian ini, antara lain.

1. Tuhan Yesus Kristus yang telah memberikan rencana yang terbaik-Nya kepada

penulis.

2. Bapak Dr. Ali Rokhman, M.Si., M.Kom selaku Ketua Institut Teknologi

Telkom Purwokerto.

3. Bapak Muhammad Fajar Sidiq, S.T., M.T. dan Bapak Ipam Fuaddina Adam,

S.T., M.Kom. Selaku dosen pembimbing yang telah diberikan untuk

mengarahkan dan membimbing penulis dalam penyusunan skripsi.

4. Bapak Muhammad Zidny Naf’an, Lc., M.Kom selaku Ketua Program Studi

Teknik Informatika Institut Teknologi Telkom Purwokerto.

5. Ibu saya tercinta yang telah banyak memberikan doa dan memberi dukungan

sehingga saya dapat menyelesaikan laporan ini.

6. Evi, Elisabet, Grace, Nancy, Kadut, Opek dan teman- teman saya di Perumahan

Griya Safira yang telah memberi dukungan, saran dan doa sehingga saya

terbantu dalam penyusunan proposal tugas akhir ini.

Purwokerto, 13 Agustus 2018

Edy Surmana Putra Tarigan

Page 7: SECURITY TESTING DENGAN MENGGUNAKAN METODE OSSTMM …

v

DAFTAR ISI

HALAMAN JUDUL .......................................................................................... i

HALAMAN PENGESAHAN PEMBIMBING ................................................ iii

HALAMAN PENETAPAN PENGUJI ............................................................. iv

HALAMAN PERNYATAAN ORISINALITAS ............................................. v

KATA PENGANTAR ........................................................................................ vi

ABSTRAK .......................................................................................................... vii

ABSTRACT ......................................................................................................... viii

DAFTAR ISI ....................................................................................................... ix

DAFTAR GAMBAR .......................................................................................... xi

DAFTAR TABEL .............................................................................................. xii

BAB I PENDAHULUAN ................................................................................... 1

1.1 Latar Belakang ......................................................................................... 1

1.2 Rumusan Masalah .................................................................................... 2

1.3 Tujuan Masalah ........................................................................................ 3

1.4 Batasan Masalah ....................................................................................... 3

BAB II TINJAUAN PUSTAKA ........................................................................ 4

2.1 Penelitian Sebelumnya ............................................................................. 4

2.2 Dasar Teori ............................................................................................... 9

2.2.1 Sistem Informasi .................................................................................... 9

2.2.2 Website ................................................................................................... 9

2.2.3 Keamanan Informasi .............................................................................. 9

2.2.4 Security Testing ...................................................................................... 10

2.2.5 Manajemen Resiko................................................................................. 10

2.2.6 Open Source Security Testing Methodology Manual (OSSTMM) ........ 10

2.2.6.1 Risk Assesment Value (RAV) .............................................................. 12

2.2.6.2 Security Testing Audit Report (STAR) ................................................ 17

BAB III METODOLOGI PENELITIAN ........................................................ 18

3.1 Metode Penelitian..................................................................................... 18

3.1.1 Study Literature ..................................................................................... 19

Page 8: SECURITY TESTING DENGAN MENGGUNAKAN METODE OSSTMM …

vi

3.1.2 Pengumpulan Data ................................................................................. 19

3.1.3 Analisis Data .......................................................................................... 19

3.1.4 Perancangan Metode OSSTMM ............................................................ 19

3.1.5 Pengujian Metode .................................................................................. 21

3.1.6 Analisis Hasil ......................................................................................... 22

3.1.7 Penulisan Laporan .................................................................................. 22

3.1.8 Publikasi ................................................................................................. 22

BAB IV HASIL PENGUJIAN DAN ANALISIS ............................................. 23

4.1 Hasil Pengujian ........................................................................................ 23

4.1.1 Wawancara ............................................................................................. 23

4.1.2 Analisis OSSTMM................................................................................. 23

4.1.3 Perhitungan Manual RAV...................................................................... 34

4.2 Rekomendasi ............................................................................................ 41

BAB V PENUTUP .............................................................................................. 59

5.1 Kesimpulan .............................................................................................. 59

5.2 Saran ......................................................................................................... 59

DAFTAR PUSTAKA ......................................................................................... 60

Page 9: SECURITY TESTING DENGAN MENGGUNAKAN METODE OSSTMM …

vii

DAFTAR GAMBAR

Gambar 2.1 Kategori RAV .................................................................................. 12

Gambar 2.2 Rumus Kategori Limitations ............................................................ 16

Gambar 3.1 Tahapan Metode Penelitian .............................................................. 18

Gambar 3.2 Tahapan metode OSSTMM ............................................................. 20

Gambar 4.1 Hasil Pengujian nmap Menggunakan Jaringan Publik ..................... 26

Gambar 4.2 Hasil pengujian dari Teknik Brute Force 1 ...................................... 27

Gambar 4.3 Hasil pengujian dari Teknik Brute Force 2 ...................................... 28

Gambar 4.4 Hasil pengujian dari Teknik Brute Force 3 ...................................... 28

Gambar 4.5 Hasil pengujian dari Teknik Brute Force 4 ...................................... 29

Gambar 4.6 Hasil pengujian dari Teknik Brute Force 5 ...................................... 29

Gambar 4.7 Hasil Pengujian IP ID Sequence Generation ................................... 30

Gambar 4.8 Hasil Pengujian nikto Anti-clickjacking x-frame option header ...... 32

Gambar 4.9 Hasil Pengujian nikto OSVDB ......................................................... 32

Gambar 4.10 Hasil Pengujian OWASP ZAP untuk Cross Site Scripting ............ 33

Gambar 4.11Hasil Pengujian OWASP ZAP untuk Cookie ................................. 33

Gambar 4.12 Nilai RAV ...................................................................................... 39

Gambar 4.13 Pelaporan Audit STAR................................................................... 40

Page 10: SECURITY TESTING DENGAN MENGGUNAKAN METODE OSSTMM …

viii

DAFTAR TABEL

Tabel 2.1 Perbandingan Referensi ....................................................................... 6

Tabel 2.2 Nilai Risk Assesment Value (RAV) ...................................................... 12

Tabel 4.1 Rangkuman Visibility ........................................................................... 25

Tabel 4.2 Rangkuman Access .............................................................................. 25

Tabel 4.3 Rangkuman Authentication .................................................................. 26

Tabel 4.4 Rangkuman Non-Repudiation .............................................................. 30

Tabel 4.5 Rangkuman Confidentiality ................................................................. 30

Tabel 4.6 Rangkuman Vulnerability .................................................................... 31

Tabel 4.7 Rangkuman Weakness.......................................................................... 34

Tabel 4.8 Rangkuman Concern ........................................................................... 34

Tabel 4.9 Posture Review ..................................................................................... 42

Tabel 4.10 Logistics ............................................................................................. 43

Tabel 4.11 Active Detection Verification ............................................................. 44

Tabel 4.12 Visibility Audit ................................................................................... 44

Tabel 4.13 Access Verification ............................................................................. 45

Tabel 4.14 Trust Verification ............................................................................... 45

Tabel 4.15 Controls Verification ......................................................................... 47

Tabel 4.16 Process Verification ........................................................................... 48

Tabel 4.17 Configuration And Training Verification .......................................... 49

Tabel 4.18 Property Vadidation ........................................................................... 50

Tabel 4.19 Segregation Review ............................................................................ 50

Tabel 4.20 Exposure Verification ........................................................................ 51

Tabel 4.21 Competitive Intelligence Scouting ..................................................... 53

Tabel 4.22 Quarantine Verification ..................................................................... 54

Tabel 4.23 Privileges Audit .................................................................................. 55

Tabel 4.24 Survivability Validation And Service Continuity ............................... 57

Tabel 4.25 End Survey, Alert And Log Review .................................................... 57

Page 11: SECURITY TESTING DENGAN MENGGUNAKAN METODE OSSTMM …

ix