Preview

Lab #8 – Assessment Worksheet

Powerful Essays
Open Document
Open Document
1544 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab #8 – Assessment Worksheet
LAB #8 – Assessment Worksheet

Course Name and Number: CIS333
Lab Due Date: May 26th, 2013

Introduction
In this lab, you will verify and perform a cross-site scripting (XSS) exploit and an SQL injection attack on the test bed Web application and Web server using the Damn Vulnerable Web Application (DVWA) found on the TargetUbuntu01 Linux VM server. You will use a Web browser and some simple command strings to identify the IP target host and its known vulnerabilities and exploits, and then attack the Web application and Web server using cross-site scripting (XSS) and an SQL injection to exploit the sample Web application running on that server.
Learning Objectives
Upon completing this lab, you will be able to: 3. Identify Web application and Web server backend database vulnerabilities as viable attack vectors 4. Develop an attack plan to compromise and exploit a website using cross-site scripting (XSS) against 
sample vulnerable Web applications 5. Conduct a manual cross-site scripting (XSS) attack against sample vulnerable Web applications 6. Perform SQL injection attacks against sample vulnerable Web applications with e-commerce data 
entry fields 7. MitigateknownWebapplicationandWebservervulnerabilitieswithsecuritycountermeasurestoeliminate 
risk from compromise and exploitation
Deliverables
Upon completion of this lab, you are required to provide the following deliverables to your instructor: 1. A written report of the identified vulnerabilities, exploits, and remediation steps covered in this lab; 2. Screen capture of the cross-site scripting (XSS) attack;
 3. Screen capture of the SQL injection attack; 4. Lab Assessment Questions & Answers for Lab #8.

Lab #8 Written Report In this lab I was able to identify the vulnerabilities of the Web application immediately by uncovering the Web form’s ability to handle unexpected data. This was accomplished by using DVWA tool to perform an attack exploiting a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    3. What possible high risk vulnerabilities did the Rats tool find in the DVWA application source code?…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    Introduction The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    A well-coordinated and regularly audited security check is the best way forward. 7. Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microsoft Windows platforms, what would you do to identify known software vulnerabilities and exploits?…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Assignment Requirements Refer to the handout Testing and Monitoring Security Controls. It contains information on security events or breaches and baseline anomalies.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 Unit 3 Assignment 1 Information Gathering Plan The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Week 3 Assignment: Web Application Attacks Prevention Learning Objectives and Outcomes You will be able to suggest appropriate defenses against common Web server and application attacks.…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 454 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    References: Fonseca, J., Seixas, N., Viera, M., & Madeira, H. (2014). Analysis of Field Data on Web Security Vulnerabilities. IEEE Transaction on Dependable & Secure Computing, 11(2), 89-100 doi:10.1109/TDSC.2013.37…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Web Security Life Cycle

    • 1010 Words
    • 5 Pages

    Application Development: During the development of web applications, things such as poor error handling, and unsecure data transferring can plague the development. Poor error handling could result in malicious users finding much more information about a application than should be revealed and can use that information to gain access to unauthorized areas, while unsecure data transferring could result in data being stolen as it is broadcasted across a network.…

    • 1010 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Penetration Plan

    • 2140 Words
    • 9 Pages

    Dobison, M. (2011, September 9). http://www.fireworkswebsites.com.au/images/example-penetration-security-testing.pdf. Retrieved from http://www.fireworkswebsites.com.au/images/example-penetration-security-testing.pdf Federal Office of Information Security. (n.d.). Study: A penetration testing model. Retrieved from http://www.slideshare.net/kushwahaa/a-penetration-testing-model…

    • 2140 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Taken from: Linux Arab References: [-] Backtrack Linux Distro., http://www.backtrack-linux.org/ [-] Slackware Exploitation VM, http://opensecuritytraining.info/slack12.zip [-] OWASP Broken Web Applications VM, http://downloads.sourceforge.net/project/owaspbwa/1.0/OWASP_Broken_Web_Apps_VM_1.0.7z…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    Lab Assessment Questions 1. What are the five steps of a hacking attack? 2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting.…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    E-Voting by Using Biometrics

    • 2584 Words
    • 11 Pages

    Microsoft, 2011. Threats and Countermeasures for Web Services. [Online] Available at: HYPERLINK "http://msdn.microsoft.com/en-us/library/cc949001.aspx" http://msdn.microsoft.com/en-us/library/cc949001.aspx [Accessed 12 May 2011].…

    • 2584 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    Flawfinder

    • 277 Words
    • 1 Page

    Phillips, S., & Oriyano, G. (2010). Hacker Technique, Tools, and Incident Handling. Jones & Bartlett Learning…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Professor North Cross-Site Scripting Attacks 1. Penetration testing on web servers and applications is extremely important to ensure the application or server is not vulnerable to any of the 5 known main issues. These issues include SQL injection, "cross site scripting (XSS)", username enumeration, string format weaknesses, and remote code implementation (Symantec, 2006).…

    • 684 Words
    • 3 Pages
    Good Essays