CYB 240 Module Five Lab Worksheet Michael Lara

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

240

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by JudgeMoonKingfisher28

Report
CBY 240 Module Five Lab Worksheet Lab: Command Injection Prompt Response In the lab section “Adding the Code,” Step 3 , insert your name as a comment after the </html> tag. The line of syntax to put a comment in the file is <!-- YourName -->. Take a screenshot after Step 3. In the lab section “Remote Shell,” Step 17 , insert your name at the command line below the output and include it in your screenshot. PHP is an interpreted language that does not need to be compiled. What are the dangers of using an interpreted language versus a compiled language? Using an interpreted language like PHP, which executes code directly without compilation, can introduce risks such as slower execution speeds compared to compiled languages, potential for runtime errors that are only caught during execution, and easier exposure of source code to malicious actors, as the code is accessible in its original form. These factors can affect both the performance and security of applications developed in interpreted languages. Lab: Exploiting a Vulnerable Web Application
Prompt Response In the lab section “Post Exploitation,” Step 42 , insert your last name as the file name instead of “pass”. Make sure you use the file name in Steps 43–45. Take a screenshot after Step 46. Within the lab, you experienced Armitage, a graphical software package that can be used to carry out Metasploitable activities. The exploit that is targeted is a vulnerability with XAMPP. Explain what the vulnerability is and why it needs to be mitigated. The vulnerability in XAMPP typically involves insecure default configurations or outdated components that can be exploited to gain unauthorized access or execute arbitrary code on the server. Mitigating this vulnerability is crucial to protect the server from potential attacks that can compromise data integrity and system security.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help