CYB 240 Module Five Lab Worksheet Brandon Meadows
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
240
Subject
Information Systems
Date
Jun 10, 2024
Type
docx
Pages
4
Uploaded by BrigadierMeerkatMaster1059
CBY 240 Module Five Lab Worksheet Lab: Command Injection
Prompt
Response
In the lab section “Adding the Code,” Step 3
, insert your name as a comment after the </html> tag. The line of syntax to put a comment in the file is <!-- YourName -->. Take a screenshot after Step 3. In the lab section “Remote Shell,” Step 17
, insert your name at the command line below the output and include it in your screenshot.
PHP is an interpreted language that does not need to be compiled. What are the dangers of using an interpreted language versus a compiled language?
Dangers of using interpreted language in steps :- Step 1 :- The overall efficiency of an interpreted language is much less than a compiled language due to slower execution. Step 2 :- The most dangerous part of interpreted language
is that it is not secure at all. The reason is that, interpreted language doesn't create an executable file.
Lab: Exploiting a Vulnerable Web Application
Prompt
Response
In the lab section “Post Exploitation,” Step 42
, insert your last name as the file name instead of “pass”. Make sure you use the file name in
Steps 43–45. Take a screenshot after Step 46. Within the lab, you experienced Armitage, a graphical software package that can be used to carry out Metasploitable activities. The exploit that is targeted is a vulnerability with XAMPP. Explain what the vulnerability is and why it needs to be mitigated.
XAMPP contains a default username and password within the WebDAV folder. This can allow attackers to gain unauthorized access to a system (XAMPP WebDAV PHP Upload Vulnerability, n.d.). This needs to be mitigated because attackers gaining unauthorized access to a system that uses default usernames and passwords can allow for ease of privilege escalations. Which can lead to exploitation of sensitive information.
References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
XAMPP WebDAV PHP Upload Vulnerability. (n.d.). Mageni Security. https://www.mageni.net/vulnerability/xampp-
webdav-php-upload-vulnerability-802293