CYB-240-ModuleThreeLabWorksheet

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

240

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by DeanGoldfinch4081

Report
CYB 240 Module Three Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: SQL Injections (SQLi) Prompt Response In the lab section “Analysis of the Vulnerability,” Step 20 , insert your name at the command line below the output and include it in your screenshot. In the lab, we demonstrated the dangers of unsecured input and how it can lead to SQLi. The lab also demonstrated how escaping can be used to mitigate an SQLi password bypass attack. Explain the steps of escaping and why it was successful in mitigating the SQL injection attack. Escaping is used to make values entered read as a string instead of as a command. (Klein, n.d.) . In the lab, the steps were to use sudo to pull up the script. We removed the // from log in command lines. When the injection command was entered again in the login field the log in failed.
Lab: Performing SQL Injection to Manipulate Tables in a Database Prompt Response In the lab section “Stealing Data and Creating a Backdoor,” Step 7 , insert your last name as the user that is created. Also use the name in Step 8. Take a screenshot after Step 8. Metasploit is an open source free tool that is shipped with Kali Linux. The tool can also be added to other distributions of Linux. How can this tool be used by security analysts to help secure computer systems that they are responsible for maintaining? Metasploit can be used to test systems and identify weaknesses. This can be done at the time the system is set up, after patches and updates, or anytime to ensure that there are as few vulnerabilities in the system as possible.
Lab: Session Stealing (Stored XSS) Prompt Response In the lab section “Alice Gets Owned,” Step 12 , insert your name in the comment field and then take a screenshot of the dialog. In the lab, you learn to exploit stored XSS. What steps can be taken on a form that would prevent the ability of a stored XSS to execute, and how should they be implemented? To prevent XSS input should be filtered, output should be encoded, use appropriate response headers, and implement Content Security Policy (CSP). (Cross-site scripting, n.d.) . The first three are measures taken when creating the script on the form. CSP is also activated by including the appropriate command in the script. (Content Security Policy (CSP), n.d.)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help