CYB_240_3-2
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
240
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by JusticeJellyfishPerson10226
CYB 240 Module Three Lab Worksheet
CYB-240
2023 November 12
Lab: SQL Injections (SQLi)
Prompt
Response
In the lab section “Analysis of the Vulnerability,”
Step 20
, insert your
name at the command line below the output and include it in your
screenshot.
In the lab, we demonstrated the dangers of unsecured input and how
it can lead to SQLi. The lab also demonstrated how escaping can be
used to mitigate an SQLi password bypass attack. Explain the steps of
escaping and why it was successful in mitigating the SQL injection
attack.
The steps of escaping refer to the practice
characters, such as a backslash ('/'), in a w
and interpreted by the SQL server as part
could potentially lead to an SQL injection
successful in mitigating SQL injection att
input validation and sanitization reinforce
SQL injection attacks by having only vali
Lab: Performing SQL Injection to Manipulate Tables in a Database
Prompt
Response
In the lab section “Stealing Data and Creating a Backdoor,”
Step 7
,
insert your last name as the user that is created. Also, use the name
in Step 8. Take a screenshot after Step 8.
Metasploit is an oopen-sourcefree tool that is shipped with Kali Linux.
The tool can also be added to other distributions of Linux. How can
Metasploit is a tool utilized for conductin
which involves evaluating the security of
this tool be used by security analysts to help secure computer
systems that they are responsible for maintaining?
performing these tests, vulnerabilities, an
system can be identified proactively, enab
addressed and fixed before being discove
attackers.
Lab: Session Stealing (Stored XSS)
Prompt
Response
In the lab section “Alice Gets Owned,”
Step 12
, insert your name in
the comment field and then take a screenshot of the dialog.
In the lab, you learn to exploit stored XSS. What steps can be taken on
a form that would prevent the ability of a stored XSS to execute, and
how should they be implemented?
To prevent the ability of a stored XSS, sev
implemented such as conducting rigorous
testing, performing vulnerability testing a
and securing restricted areas, and establis
testing process. As security professionals,
proactive approach to security with regula
and securing the input and storage proces
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help