CYB_240_Module_Five_Lab_Worksheet_SG

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

240

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by ChiefSummer9109

Report
CBY 240 Module Five Lab Worksheet Lab: Command Injection
Prompt Response In the lab section “Adding the Code,” Step 3 , insert your name as a comment after the </html> tag. The line of syntax to put a comment in the file is <!-- YourName -->. Take a screenshot after Step 3. In the lab section “Remote Shell,” Step 17 , insert your name at the command line below the output and include it in your screenshot.
Lab: Exploiting a Vulnerable Web Application Prompt Response In the lab section “Post Exploitation,” Step 42 , insert your last name as the file name instead of “pass”. Make sure you use the file name in Steps 43–45. Take a screenshot after Step 46. Within the lab, you experienced Armitage, a graphical software package that can be used to carry out Metasploitable activities. The exploit that is targeted is a vulnerability with XAMPP. Explain what the vulnerability is and why it needs to be mitigated. In the lab, Armitage targeted a vulnerability in XAMPP, a widely-used web development software stack. While the specific vulnerability isn't detailed, addressing vulnerabilities in XAMPP is crucial to prevent unauthorized access, data breaches, or service disruptions. Mitigation measures typically involve applying patches, configuring the software securely, and adhering to best practices to ensure the overall security of the system.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help