CYB_240_3-2

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

240

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by JusticeJellyfishPerson10226

Report
CYB 240 Module Three Lab Worksheet CYB-240 2023 November 12 Lab: SQL Injections (SQLi) Prompt Response In the lab section “Analysis of the Vulnerability,” Step 20 , insert your name at the command line below the output and include it in your screenshot. In the lab, we demonstrated the dangers of unsecured input and how it can lead to SQLi. The lab also demonstrated how escaping can be used to mitigate an SQLi password bypass attack. Explain the steps of escaping and why it was successful in mitigating the SQL injection attack. The steps of escaping refer to the practice characters, such as a backslash ('/'), in a w and interpreted by the SQL server as part could potentially lead to an SQL injection successful in mitigating SQL injection att input validation and sanitization reinforce SQL injection attacks by having only vali Lab: Performing SQL Injection to Manipulate Tables in a Database Prompt Response In the lab section “Stealing Data and Creating a Backdoor,” Step 7 , insert your last name as the user that is created. Also, use the name in Step 8. Take a screenshot after Step 8. Metasploit is an oopen-sourcefree tool that is shipped with Kali Linux. The tool can also be added to other distributions of Linux. How can Metasploit is a tool utilized for conductin which involves evaluating the security of
this tool be used by security analysts to help secure computer systems that they are responsible for maintaining? performing these tests, vulnerabilities, an system can be identified proactively, enab addressed and fixed before being discove attackers. Lab: Session Stealing (Stored XSS) Prompt Response In the lab section “Alice Gets Owned,” Step 12 , insert your name in the comment field and then take a screenshot of the dialog. In the lab, you learn to exploit stored XSS. What steps can be taken on a form that would prevent the ability of a stored XSS to execute, and how should they be implemented? To prevent the ability of a stored XSS, sev implemented such as conducting rigorous testing, performing vulnerability testing a and securing restricted areas, and establis testing process. As security professionals, proactive approach to security with regula and securing the input and storage proces
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help