Premium Essay

Lab 8

In: Business and Management

Submitted By codyakacp3
Words 442
Pages 2
Lab #8 – Assessment Worksheet

Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities

Course Name and Number:

Student Name:

Instructor Name:

Lab Due Date:

Overview

In this lab, you performed simple tests to verify a cross-site scripting (XSS) exploit and an SQL injection attack using the Damn Vulnerable Web Application (DVWA), a tool left intentionally vulnerable to aid security professionals in learning about Web security. You used a Web browser and some simple command strings to identify the IP target host and its known vulnerabilities, and then attacked the Web application and Web server using cross-site scripting (XSS) and SQL injection to exploit the sample Web application running on that server.

Lab Assessment Questions & Answers

1. Why is it critical to perform a penetration test on a Web application and a Web server prior to production implementation?

To make sure no one can penetrate your web application before you put it in a live situation.

2. What is a cross-site scripting attack? Explain in your own words.

Cross-site scripting is a type of computer security vulnerability typically found in web applications that enables attacks to inject client side script into web pages viewed by others 3. What is a reflective cross-site scripting attack?

A reflective attack a type of computer security vulnerability it involves the web application dynamically generating a response using non-sanitized data from the client scripts, like Java scripts or VB script, in the data sent to the server will send back a page with the script.

4. Which Web application attack is more likely to extract privacy data elements out of a database?

Character scrambling and masking, numeric variance and nulling.

5. What security countermeasures could be used to monitor your…...

Similar Documents

Free Essay

Lab 8

...addition, these database should enforce storage limits to prevent certain email recipients from using up all of the available space on your Mailbox role server before your databases are put into production. It is the most important role in your Exchange organization because it stores and manages access to the mailboxes and public folders used to store vital company information. 7. What have more than one database for your mailbox server? Because it optimizes database performance as well as provides for flexible recovery in the case of database corruption. If a single database becomes corrupted, then you can take the single database offline by dismounting it and then restore it from backup without affecting the other three databases. 8. What is the purpose of limiting hard drive space available for emails? The purpose is to prevent ambitious users from using up all of the available space on the Mailbox role servers. 9. Explain what occurs as a user reaches their email storage limit. The user will receive a warning email at 1:00 a.m. from Exchange indicating that he is approaching his limit and should remove any unnecessary emails. 10. What sort of security features can be provided by the Exchange Server 2007 when a user is accessing the server remotely? You can now restrict the user features that are available in OWA as well as the company file servers that OWA users are allowed to access. 11. Why do administrators disable the “change password” feature......

Words: 923 - Pages: 4

Premium Essay

Lab 8

...remediation is performed before it is allowed into the trusted network. For remote access clients, authorized and unauthorized network traffic will use separate security domains such as Virtual Local Area Networks (VLANs) (STIG Viewer, 2011). 7. What is a VPN? Distinguish between VPN server, VPN client, VPN router, and SSL VPNS. A virtual private network (VPN) is a dedicated tunnel from one endpoint to another. The VPN tunnel can be created between a remote workstation using the public Internet and a VPN router or a secure browser and Secure Sockets Layer (SSL)-VPN Web site (Kim & Solomon, 2012). VPN goes between a VPN client (computer) to a VPN server (network). SSL VPNs do not need to run a VPN client to connect to the network (Netgear, 2008). 8. What is the difference between a tunnel-mode VPN and a split-tunneling VPN? A tunnel-mode VPN encapsulates the entire Internet Protocol (IP) packet, adding a new header, and then the entire diagram is encrypted. The split-tunneling VPN only encrypts traffic that is destined for or originating from hosts on the network; all other IP traffic is sent outside of the VPN connection to hosts connected on the Internet unencrypted (Inform It, n.d.). 9. According to the Remote Access Policy STIG are personally owned devices considered acceptable to perform privileged (administrative) tasks on a DoD network? Personally owned devices are not considered acceptable to perform privileged tasks on a Department of Defense (DoD) network......

Words: 917 - Pages: 4

Premium Essay

Unit 8 Lab Questions

...Richard Bailey Unit 8 lab 8.1 August 19, 2013 NT2580 Introduction to Information Security 1. So you can find the weekness and fix before it can be implamented on the server and goes live. 2. A reflective XSS attack a type of computer security vulnerability. It involves the web application dynamically generating a response using non-sanitized data from the client. Scripts, like JavaScript or VB Script, in the data sent to the server will send back a page with the script. 3. SQL Injections can be used to enter the database with administrator rights.  Best way to avoid this is using Java in websites. 4. methods, including character scrambling and masking, numeric variance and nulling, rely on an array of built-in SQL Server system functions that are used for string manipulation. 5. Well co-ordinated and regulary audited security checks is the best way forword. 6. . There has been considerable debate comparing the security attributes of open source and proprietary software (Anderson, 2002). However, for a careful interpretation of the data, rigorous quantitative modeling methods are needed. The likelihood of a system being compromised depends on the probability that a newly discovered vulnerability will be exploited. Thus, the risk is better represented by the vulnerabilities which are not yet discovered and the vulnerability discovery rate rather than by the vulnerabilities that have been already discovered in the past and remedied by patches. ...

Words: 489 - Pages: 2

Premium Essay

Unit 8 Lab

...Lab 8 Assessment 1. Where can you store your public keys or public certificate files in the public domain? Is this the same thing as a public key infrastructure (PKI) server? Certificate stores 2. What do you need if you want to decrypt encrypted messages and files from a trusted sender? Decryption key 3. When referring to IPSec tunnel mode, what two types of headers are available and how do they differ? Authentication Header is used to prove the identity of the sender and ensure the data is not tampered with while Encapsulated Security Payload provides authentication and encryption and encrypts the IP packets and ensures their integrity. 4. Provide a step by step progression for a typical Certificate Enrollment process with a Certificate Authority. Create Enrollment Object Set Enrollment Parameters Create Request Submit Request Process request Get Certificate Accept Certificate 5. When designing a PKI infrastructure what are the advantages and disadvantages of making the CA available publicly over the Internet or keeping it within the private network? Advantages Straight-forward Concept Chain-length limit Less time to obtain a usable certificate within the CA Disadvantages Scalability Single point of trust Still need an impeccable CA 6. Designing a PKI involves several steps. Per the Windows Best Practices for Designing a PKI, what are those steps? In your words, explain what each step is meant to do? *......

Words: 634 - Pages: 3

Premium Essay

Lab 8 Assessment

...to monitor your production SQL databases? There should be an IT security policy and process in place that conducts monthly or quarterly (at the least) coordinated and regularly audited security checks. 7. Given that Apache and Internet Information Services (IIS) are the two most popular Web application servers for Linux and Microsoft® Windows platforms, what would you do to identify known software vulnerabilities and exploits? I would conduct more testing prior to releasing the software. I would also conduct penetration tests from the server-side and developers side; I would also conduct the same from the end user and client-side. As a company it is important to understand the vulnerabilities Apache and IIS have for Linux and Microsoft®  8. What can you do to ensure that your organization incorporates penetration testing and Web application testing as part of its implementation procedures? It is important for an organization to have a Software Development Lifecycle (SDLC) process as part of Release and Currency management, or part of ITSM. Testing is one of the phases of SDLC; a result oftesting is Acceptance, which is determined by the success of testing from the code side and testing from the user perspective. Upon successful completion of testing and User Acceptance only then would I allow an application to be deployed and in production.  9. What other security countermeasures do you recommend for websites and Web application deployment to ensure the CIA of the Web......

Words: 849 - Pages: 4

Free Essay

Lab # 8

... 6. What is the standard formula to rank potential threats? Decompose the application, determine and rank threats, and determine countermeasures and mitigation. 7. If an organization is identified as not using any password policies for any of its applications what would be two suggestions to note in the assessment? That the organization is a great risk without any password policies. 8. Should newly-released patches for a known vulnerability be applied to production system once released? Yes 9. What is the importance of having a security incident response plan in an organization? So that when there is a security incident all employees involved know the correct way to handle the incident. 10. What would an auditor be trying to verify if he/she is asking to view logs for certain dates? To view what was enter in on that day to match the reports. 11. How could the findings from the Skipfish and rats scanning performed in lab #7 be categorized and presented in an assessment report? In a summary of the findings. 12. Consider the analysis tool Skipfish used in lab #7 is to be included in a web assessment report. What pertinent information about the method of testing and tools used could be included in an assessment report? 13. Provide a remediation recommendation for a potential vulnerability found with the use of the “eval” function in a static analysis report. 14. Explain the process of remediation for a XSS scripting vulnerability found from...

Words: 473 - Pages: 2

Free Essay

Lab 8

...Jack Ferguson 12 May 14 Lab #8 In cryptography, encryption is the process of encoding messages in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. In an encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext . This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the ciphertext should not be able to determine anything about the original message. An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key that adversaries do not have access to. For technical reasons, an encryption scheme usually needs a key-generation algorithm to randomly produce keys. There are two basic types of encryption schemes: Symmetric-key and public-key encryption. In symmetric-key schemes, the encryption and decryption keys are the same. Thus communicating parties must agree on a secret key before they wish to communicate. In public-key schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key and is capable of reading the encrypted messages. Public-key encryption is a relatively recent invention: historically, all encryption schemes have been symmetric-key (also called private-key)......

Words: 1540 - Pages: 7

Premium Essay

Pt1420 Lab 8

...Lab 8.1 Step 2: The hour is 1 continue loop till the hour is 24 then stop. Step 3: Constant Integer Max_Minutes = 60 Declare Integer minutes For minutes = 1 to Max_Minutes Display “The minute is “, minutes End For Step 4: Constant Integer Max_Seconds = 60 Declare Integer seconds For seconds = 1 to Max_Seconds Display “The second is “, seconds End For Step 6: The number is 2 The number is 4 The number is 6 The number is 8 The number is 10 Step 7: Constant Integer Max_VALUE = 200 Declare Integer counter For counter = 20 to Max_VALUE step 20 Display “The number is “, counter End For Step 9: Enter the number of students in class Display however many numbered students you enter Step 11: Loop five times, each asking you to enter a number Displaying the total at the end Step 12: Declare Integer counter Declare Integer totalAge = 0 Declare Real averageAge = 0 Declare Integer age Declare Integer number Display “How many ages do you want to enter: “ Input number For counter = 1 to number Display “Enter age “ Input age Set totalAge = totalAge + age End For averageAge = totalAge / number Display “The average age is “, averageAge Lab 8.2 Lab 8.3 Module Module1 Sub Main() Dim anotherDay As String = "yes" While anotherDay = "yes" Dim totalSpeed As Double = 0 Dim averageSpeed As Double = 0 enterSpeeds(totalSpeed) calcAverage(totalSpeed, averageSpeed) ...

Words: 324 - Pages: 2

Free Essay

Lab 8

...Lab 8.1 Step 2: The hour is 1 continue loop till the hour is 24 then stop. Step 3: Constant Integer Max_Minutes = 60 Declare Integer minutes For minutes = 1 to Max_Minutes Display “The minute is “, minutes End For Step 4: Constant Integer Max_Seconds = 60 Declare Integer seconds For seconds = 1 to Max_Seconds Display “The second is “, seconds End For Step 6: The number is 2 The number is 4 The number is 6 The number is 8 The number is 10 Step 7: Constant Integer Max_VALUE = 200 Declare Integer counter For counter = 20 to Max_VALUE step 20 Display “The number is “, counter End For Step 9: Enter the number of students in class Display however many numbered students you enter Step 11: Loop five times, each asking you to enter a number Displaying the total at the end Step 12: Declare Integer counter Declare Integer totalAge = 0 Declare Real averageAge = 0 Declare Integer age Declare Integer number Display “How many ages do you want to enter: “ Input number For counter = 1 to number Display “Enter age “ Input age Set totalAge = totalAge + age End For averageAge = totalAge / number Display “The average age is “, averageAge Lab 8.2 Lab 8.3 Module Module1 Sub Main() Dim anotherDay As String = "yes" While anotherDay = "yes" Dim totalSpeed As Double = 0 Dim averageSpeed As Double = 0 enterSpeeds(totalSpeed) calcAverage(totalSpeed, averageSpeed) ...

Words: 324 - Pages: 2

Premium Essay

Lab 8 Information Systems

...neither consistently isolated nor symptomatic of unengaged management. A lack of attention to continuity planning is currently prevalent throughout the business world, and is most likely a result of 8.Business continuity is the strategic and tactical capability of an organization to plan for and respond to business interruption in a way that allows them to continue business operations at an acceptable, defined level. ASIS International calls it Organizational Resilience (OR). Business continuity is not something that a company undertakes when they learn a hurricane is coming. It requires a methodical and detailed analysis of both organizational and stakeholder requirements and the development of a process that includes 9. The terrorist attacks on the United States on September 11, 2001 are focusing the attention of organization decision makers on the urgent need to prepare for disaster recovery. The Business Continuity Plan describes the steps an organization takes when it cannot operate normally because of a natural or manmade disaster. It may be written for a specific business process or may address all mission-critical business processes. 10. Updating a Business Plan All business plans should be regularly updated - whether weekly, monthly, semi-annually or annually. Every 8-10 months is what the experts recommend, as long as things have remained fairly stable. A business plan should always be updated when there are any major changes taking place. For instance, is......

Words: 1432 - Pages: 6

Free Essay

Unit 8 Lab

...Payload provides authentication and encryption and encrypts the IP packets and ensures their integrity. 4. Create Enrollment Object, Set Enrollment Parameters, Create Request, Submit Request, Process request, Get Certificate, Accept Certificate 5. Advantages: Straight-forward Concept, Chain-length limit, Less time to obtain a usable certificate within the CA Disadvantages: Scalability, Single point of trust, Still need an impeccable CA 6. Outline the business scenario, Define the application certificate requirements, Create certificate policies and practices statements, Design the certification authority (CA) infrastructure, Create a certificate renewal strategy, Develop a CA management plan 7. System overview, hardware, applications 8. Display information about the digital certificates that are installed on a DirectAccess client, DirectAccess server, or intranet resource. 9. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation. 10. It is so that a user can use one username and password for multiple applications. It can help security because it is only one username and password that a user......

Words: 293 - Pages: 2

Free Essay

Lab 8 Discussion

...Experiment 8 Lab Report Analysis of Oxidizing Capacity of Bleach The goal of this lab is to perform a titration of a sample of bleach with thiosulfate, figuring the end point with a starch indicator. We will determine the percent mass of sodium hypochlorite in bleach by using the volume of sodium thiosulfate needed to reach the end point. This value represents the oxidizing capacity of the unknown bleach. At the end, we will create two redox reactions to determine the overall chemical reaction that occurs during this process. I think that my oxidizing capacity will be 5.0g. Most bleach contains salts with the hypochlorite ion, the oxidizing agent that removes stains and whitens them. The hypochlorite ion usually comes in the form of sodium hypochlorite, NaOCl, or calcium hypochlorite. The two oxidation reduction reactions that occur during this experiment are first the oxidation of iodide to iodine, I2(aq), by the hypochlorite ion and then making the aqueous iodine reduce back to iodide by titrating it with sodium thiosulfate. The overall stoichiometry of the reaction is one mole of hypochlorous acid, formed by placing the sodium hypochlorite into acidic solution, plus two moles of the thiosulfate ion plus hydrogen ions from the solution yielding one mole of chlorite anions, one mole of the tetrasulfur hexoxide anion and one mole of liquid water. We began the titration of aqueous iodine by adding .05M sodium thiosulfate until the brown colored solution began to turn a...

Words: 818 - Pages: 4

Premium Essay

Lab 8

...12 failed log in attempts Log Name: Security Source: Microsoft-Windows-Security-Auditing Date: 5/30/2014 8:30:18 AM Event ID: 4625 Task Category: Logon Level: Information Keywords: Audit Failure User: N/A Computer: TarWin2012DC.securelabsondemand.com Description: An account failed to log on. Subject: Security ID: NULL SID Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 Account For Which Logon Failed: Security ID: NULL SID Account Name: TARGET2012B$ Account Domain: SECURELABSONDEM Failure Information: Failure Reason: Unknown user name or bad password. Status: 0xC000006D Sub Status: 0xC000006A Process Information: Caller Process ID: 0x0 Caller Process Name: - Network Information: Workstation Name: TARGET2012B Source Network Address: 172.30.0.18 Source Port: 49304 Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon request fails. It is generated on the computer where access was attempted. The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The Logon Type field indicates the kind of logon that was requested. The most common types are...

Words: 711 - Pages: 3

Free Essay

Nos 230 Lab 8

...Lab 8 Creating and Configuring Virtual Machine Storage | | This lab contains the following exercises and activities: Exercise 8.1Exercise 8.2Exercise 8.3 Exercise 8.4Exercise 8.5Lab Challenge | Creating a Virtual Hard DiskEditing a Virtual Hard Disk FileCreating a Virtual Machine with an Existing Virtual Hard DiskConfiguring QOS on a Virtual Hard DiskCreating a Pass-Through DiskCreating a Checkpoint | BEFORE YOU BEGIN The lab environment consists of three servers connected to a local area network, one of which is configured to function as the domain controller for a domain called adatum.com. The computers required for this lab are listed in Table 8-1. Table 8-1 Computers Required for Lab 8 Computer | Operating System | Computer Name | Domain controller 1 | Windows Server 2012 R2 | SERVERA | Member server 2 | Windows Server 2012 R2 | SERVERB | Member server 3 | Windows Server 2012 R2 | SERVERC | In addition to the computers, you also require the software listed in Table 8-2 to complete Lab 8. Table 8-2 Software Required for Lab 8 Software | Location | Lab 8 student worksheet | Lab08_worksheet.docx (provided by instructor) | Working with Lab Worksheets Each lab in this manual requires that you answer questions, take screen shots, and perform other activities that you will document in a worksheet named for the lab, such as Lab08_worksheet.docx. It is recommended that you use a USB flash drive to store your worksheets, so you can submit them to...

Words: 1958 - Pages: 8

Premium Essay

Lab 8

...Joshua Reynolds FW9135 Psy1010 Section 052 TA Monica De Iorio 8th Lab Assignment There are many ways to cope with stress but we learned about 3 specific strategies in lab. These three included cognitive, behavioral, and avoidance strategies. Active cognitive strategies include actively thinking about a situation to adjust more effectively to it. This strategy is one of the better ways to cope with stress. Then you have active behavioral strategies and this involves actively taking some type of action to improve a problem situation that is stressing you out. This is the other strategy that is best for relieving stress. The third strategy that we had learned about was the avoidance strategy. This strategy is not a good strategy to use and can sometimes make things worse. Avoidance involves keeping the stressful situation and circumstances out of awareness. This could potentially cause more stress. The strategy that I tend to use the most is the active behavioral strategy. I like to take action in everything that I do, especially when it involves things that are causing or will cause myself to stress out. An example of that would be of someone had a problem with me I would go talk to them about it and try to figure out what the problem is. Instead of avoiding it or just thinking about it I would go do something about it. Another example could be if I had a bad grade in a class I would go see my professor to see what I could do about it and make that extra effort. The......

Words: 315 - Pages: 2