Preview

Lab 4

Powerful Essays
Open Document
Open Document
1087 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 4
1. What is a PHP Remote File Include (RFI) attack, and why are these prevalent in today’s Internet world?
a. A Remote File Include allows an attacker to include a remote file. This vulnerability is most often found on websites and is usually implemented through a script on the web server.
2. What country is the top host of SQL Injection and SQL Slammer infection? Why can’t the US Government do anything to prevent these injection attacks and infections?
a. Peru.
3. What does it mean to have a policy of Nondisclosure in an organization?
a. It means that certain information can’t be made public under the company’s policy.
4. What Trends were tracked when it came to Malicious Code in 2009 by the Symantec Report researched during this lab?
a. Swifi, Interrupdate, Fostrem, Kuaiput, Mibling, Pilleuz, Ergrun, Bredolab, Changeup, Induc
5. What is Phishing? Describe what a typical Phishing attack attempts to accomplish.
a. Stealing online account information by posing as a legitimate company.
6. What is the Zero Day Initiative? Do you think this is valuable, and would you participate if you were the managing partner in a large firm?
a. A program to reward security researchers for disclosing vulnerabilities. Yes.
7. What is a Server Side Include (SSI)? What are the ramifications if an SSI exploit is successful?
a. A Server Side Include is a process of adding content to an existing HTML page.
8. According to the TippingPoint Report researched in this lab how do SMB attacks measure up to HTTP attacks in the recent past?
a. There was almost a 60% shift from a SMB type attack, towards an HTTP-based attack. In addition, nearly 100% of the observed attacks are automated, botnet, or worm-based attacks.
9. According to the TippingPoint Report, what are some of the PHP RFI payload effects DVLabs has detected this year?
a. PHP Remote file-include attacks saw a steady overall downward trend, except for a massive spike in mid-year of 2010.
10. Explain the steps it takes to execute a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Compare the portions that address Internet and e-mail access of at least three different companies.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. Why is it critical to perform a penetration test on a Web application and a Web server prior to production implementation?…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lot2 Task 1

    • 719 Words
    • 3 Pages

    The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets:…

    • 719 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS4680 Lab 4 Q&A

    • 1180 Words
    • 4 Pages

    2. What country is the top host of SQL Injection and SQL Slammer infections? Why can’t the US Government do anything to prevent these injection attacks and infections?…

    • 1180 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Lab 4

    • 575 Words
    • 3 Pages

    1.List four cell structures that were common to both plant and animal cells. (4 points)…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Solution: This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 7 - Info Sec

    • 2576 Words
    • 10 Pages

    Anytime a user attempts to access a network, the server logs the attempt. In this lab, you first used the…

    • 2576 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    A reflective attack a type of computer security vulnerability it involves the web application dynamically generating a response using non-sanitized data from the client scripts, like Java scripts or VB script, in the data sent to the server will send back a page with the script…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Perform research 3

    • 335 Words
    • 1 Page

    Answer 3: Server Side Includes (SSI) is a simple interpreted server-side scripting language used almost exclusively for the Web. The most frequent use of SSI is to include the contents of one or more files into a web page on a web server.…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 4

    • 794 Words
    • 4 Pages

    What time in hours:minutes:seconds GMT did the S waves arrive? (See Lab Exercise #1, Step 1, Question 2)…

    • 794 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Client Server Script

    • 950 Words
    • 4 Pages

    Client-side scripts are often embedded within an HTML or XHTML document (hence known as an “embedded script”), but they may also be contained in a separate file, to which the document (or documents) that use it make reference (hence known as an “external script”). Upon request, the necessary files are sent to the user’s computer by the web server (or servers) on which they reside. The user’s web browser executes the script, then displays the document, including any visible output from the script. Client-side scripts may also contain instructions for the browser to follow in response to certain user actions, (e.g., clicking a button). Often, these instructions can be followed without further communication with the server.…

    • 950 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Common Gateway Interface (CGI) is what enables an application to run on a web server and packages it into a website form that people can access. This is an older technology that has many flaws but served a purpose for a significant period of time. The major downside to CGI is that each individual person that logs on has a program ran just for them. This creates a lot of overhead and is not very efficient. The major security flaw is that you’re allowing anyone who tries to access your site permission to start running programs so you can imagine how this could get sticky. I would consider this a legacy technology due to the fact that it is outdated and not used in most instances.…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The article "Improving the Security of Your Site by Breaking Into it" allows IT administrators to look at their own network security through the eyes of an intruder. By utilizing the same tools as potential intruders, not only can administrators identify potential security holes in their existing network, but they can also raise the level of awareness and preparedness when it comes to intrusions. Quite often, IT administrators approach to network or host security is reactive instead of proactive. The article discusses techniques that can provide access to a remote intruder to a target host on your network.…

    • 1185 Words
    • 4 Pages
    Powerful Essays

Related Topics