Lab #8 – Assessment Worksheet

Topics: Web server, JavaScript, Code injection Pages: 5 (1544 words) Published: June 23, 2013
LAB #8 – Assessment Worksheet

Course Name and Number: CIS333
Lab Due Date: May 26th, 2013

Introduction
In this lab, you will verify and perform a cross-site scripting (XSS) exploit and an SQL injection attack on the test bed Web application and Web server using the Damn Vulnerable Web Application (DVWA) found on the TargetUbuntu01 Linux VM server. You will use a Web browser and some simple command strings to identify the IP target host and its known vulnerabilities and exploits, and then attack the Web application and Web server using cross-site scripting (XSS) and an SQL injection to exploit the sample Web application running on that server. Learning Objectives

Upon completing this lab, you will be able to:
3. Identify Web application and Web server backend database vulnerabilities as viable attack vectors 4. Develop an attack plan to compromise and exploit a website using cross-site scripting (XSS) against 
sample vulnerable Web applications 5. Conduct a manual cross-site scripting (XSS) attack against sample vulnerable Web applications 6. Perform SQL injection attacks against sample vulnerable Web applications with e-commerce data 
entry fields 7. MitigateknownWebapplicationandWebservervulnerabilitieswithsecuritycountermeasurestoeliminate 
risk from compromise and exploitation Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your instructor: 1. A written report of the identified vulnerabilities, exploits, and remediation steps covered in this lab; 2. Screen capture of the cross-site scripting (XSS) attack;
 3. Screen capture of the SQL injection attack;

4. Lab Assessment Questions & Answers for Lab #8.

Lab #8 Written Report
In this lab I was able to identify the vulnerabilities of the Web application immediately by uncovering the Web form’s ability to handle unexpected data. This was accomplished by using DVWA tool to perform an attack exploiting a cross-site scripting (XSS) by selecting the XSS reflected button and typing, “<this is a test>” in the UserID box. By attacking the XSS, I was able to see how the Web application handled unexpected data, and that it was also vulnerable to attackers gaining administrative access to the Web application’s popup alert windows, which hackers would love to have access to in order to divert users from the intended use of the Web application. Another vulnerability experienced through this Web application was the lack of security the Web application had which allowed various levels of probing. The Web form was unable to handle special characters, which was a reflection of the development of the database and also the lack of proper security controls to encrypt sensitive data within the database. In this lab I was able to exploit the XSS vulnerability to gain admin access to the web form. I was also able to exploit the fact that there was a lack of encryption within the database and gain access to user information within the database. I was also able to use SQL select statements within the USERID textbox to gain access to the version of SQL being used on the server, which would also allow attackers the ability to know which malware could be used to cause damage. The steps I would take to remediate the vulnerabilities and ways attackers could potentially exploit the Web application and Web forms would be to implement data classification standards on the proper handling of data. Implement software development life cycle (SDLC) processes for design and development of new and existing solutions. Testing and quality assurance (QA) processes would be a part of the IT security policies, standards, and guidelines to ensure completeness of software testing, penetration testing, and quality assurance to identify and fix the gaps and weaknesses in the Web form prior to its release into production. To conclude, the Web application we used within this lab is essentially part of the...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Lab 5 Assessment Worksheet Essay
  • Essay about Lab #2 – Assessment Worksheet
  • Lab 6 Assessment Worksheet Essay
  • Lab 3
  • Essay on Lab 8
  • Lab 8 Essay
  • Lab 8 Essay
  • Lab 2 Performing A Vulnerability Assessment Worksheet Essay

Become a StudyMode Member

Sign Up - It's Free