Preview

Hypertext Transfer Protocol and Web Application

Satisfactory Essays
Open Document
Open Document
508 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hypertext Transfer Protocol and Web Application
Lab #1: Evaluate Business World Transformation- Impact of the Internet and WWW Learning Objectives and Outcomes.
1. From the results of Lab #1- Business Application Impact Analysis Worksheet, what do you consider to be the greatest type of risk and why?
a. The greatest will be
2. Why is it critical to perform periodic web application vulnerability assessments and penetration tests?
a. To keep the system from getting hack
3. What kind of web application does Damn Vulnerable Web Application (DVWA) use?
a. It uses PHP/MySQL web application
4. Why is connecting your web servers and web applications to the Internet like opening Pandora’s Box?
a. Because my problems can arise, all the vulnerabilities could be exploited
5. What does the skipfish application do and why is it a good security tool for web servers and web application testing?
a. Skipfish is an active web application security reconnaissance tool.
6. What is tcpdump and why is it a good tool for application for testing the Ubuntu Linux web server and web application security?
a. Tcpdump is an open source command-line tool for monitoring (sniffing) network traffic.
b. At an Ethernet segment, Tcpdump operates by putting the network card into promiscuous mode in order to capture all the packets going through the wire. Using Tcpdump we have a view on any TCP/UDP connection establishment and termination and we can measure the response time and the packet loss percentages To print
7. What does the Firefox live HTTP headers plug-in application do, and why is this a good tool for web server and web application security testing?
a. Live HTTP Headers is a really helpful penetration testing add-on for Firefox. It displays live headers of each http request and response. You can also save header information by clicking on the button in the lower left corner. I don’t think that there is any kind of need to tell how important this add-on is for the security testing process
8. What does using the “-h” switch

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Mat 540 Quiz 4

    • 644 Words
    • 3 Pages

    2. What are at least three risk factors that Heru should be considering in evaluating the project? What types of risk do they represent? 5 points…

    • 644 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Is317 Lab #3 Questions

    • 430 Words
    • 2 Pages

    It traces the routes packets from the user to the target, it shows a packets hops to the target, and they target the host address.…

    • 430 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Allows a network device to intercept and read each network packet that arrives in its entirety.…

    • 424 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    This lab demonstrated the first three steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance and Probing) on a targeted IP subnetwork using Zenmap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found to exploit the vulnerability.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Question 9: Why is it necessary to clear the cache before you retest the web server connections?…

    • 560 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Which tool is better at performing protocol captures and which tool is better at performing protocol…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Web 240 week 2 dqs

    • 340 Words
    • 1 Page

    The process of creating and maintaining a website typically involves both development and production environments. What is one reason for maintaining the two separate environments and the purpose of each? Explain. Is there a scenario for bringing the two together? Explain.…

    • 340 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    Firefox is a popular web application penetration testing tool with many plugins. It’s designed for web application security assessment or penetration testing.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    You will be able to suggest appropriate defenses against common Web server and application attacks.…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    1. Why is it critical to perform a penetration test on a web application prior to production Implementation?…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Personal Finance

    • 1291 Words
    • 6 Pages

    b. What sort of negative outcomes are possible for this type of risk? (1-3 sentences. 1.0 points)…

    • 1291 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    14. A web application penetration test focuses only on the security of the web application itself. A Network Penetration test checks the security of the network system by analyzing the holes and flaws within both the hardware and the software.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays