CYB 240 Module Five Lab Worksheet

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

240

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by SuperKoala931

Report
1 5-3 Lab Worksheet Chris Lawton Southern New Hampshire University CYB 240: Operating System Security Dr. Randy Arvay 6/4/2023
2 CBY 240 Module Five Lab Worksheet Lab: Command Injection
3 Prompt Response In the lab section “Adding the Code,” Step 3 , insert your name as a comment after the </html> tag. The line of syntax to put a comment in the file is <!-- YourName -->. Take a screenshot after Step 3. In the lab section “Remote Shell,” Step 17 , insert your name at the command line below the output and include it in your screenshot. PHP is an interpreted language that does not need to be compiled. What are the dangers of using an interpreted language versus a compiled language? Complied language is a form of code that is converted directly into machine code for the processor to execute and is harder for most people to read. While an interpreted language must run through a program that goes line by line to execute a command and is much more legible for people to read. Interpreted languages can be more
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Lab: Exploiting a Vulnerable Web Application Prompt Response In the lab section “Post Exploitation,” Step 42 , insert your last name as the file name instead of “pass”. Make sure you use the file name in Steps 43–45. Take a screenshot after Step 46. Within the lab, you experienced Armitage, a graphical software package that can be used to carry out Metasploitable activities. The exploit that is targeted is a vulnerability with XAMPP. Explain what the vulnerability is and why it needs to be mitigated. XAMPP contains a default username and password within the WebDAV folder. This can allow attackers to gain unauthorized access to a system (XAMPP WebDAV PHP Upload Vulnerability, n.d.). This needs to be mitigated because attackers gaining unauthorized access to a system that uses default usernames and passwords can allow for ease of privilege escalations. Which can lead to exploitation of sensitive information. References XAMPP WebDAV PHP Upload Vulnerability . (n.d.). Mageni Security. https://www.mageni.net/vulnerability/xampp-webdav-php-upload- vulnerability-802293