Assessing_Common_Attack_Vectors_4e_-_Madeline_OMalley

pdf

School

Utica College *

*We aren’t endorsed by this school

Course

356

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

14

Uploaded by BrigadierJellyfishPerson5726

Report
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 Student: Email: Madeline O`Malley madeline.omalley@spartans.ut.edu Time on Task: Progress: 9 hours, 40 minutes 100% Report Generated: Sunday, October 29, 2023 at 9:29 AM Section 1: Hands-On Demonstration Part 1: Perform an Injection Attack 11. Make a screen capture showing the DOM XSS dialog box . Page 1 of 14
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 21. Make a screen capture showing the successful admin login . 26. Make a screen capture showing the successful Reflected XSS injection . Page 2 of 14
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 42. Make a screen capture showing the user with the @owasp.org email . Part 2: Perform a Malware Attack Page 3 of 14
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 6. Make a screen capture showing the msfvenom output . Page 4 of 14
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 23. Make a screen capture showing the Opening malwarePayload.exe dialog box . Page 5 of 14
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 36. Make a screen capture showing the output of the sysinfo command . Page 6 of 14
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 Section 2: Applied Learning Part 1: Perform a Distributed Denial-of-Service Attack 25. Make a screen capture showing the newly recruited hosts . Page 7 of 14
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 28. Make a screen capture showing the drisst.org webpage . Page 8 of 14
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 33. Make a screen capture showing the failed connection to drisst.org . 35. Make a screen capture showing the “PF states limit reached” error message . Part 2: Perform a Social Engineering Attack Page 9 of 14
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 24. Make a screen capture showing the finished SET phishing email composition . Page 10 of 14
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 36. Make a screen capture showing the transaction.php page in the browser . Page 11 of 14
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 Section 3: Challenge and Analysis Part 1: Recommend Defensive Measures Identify and describe at least two defensive measures that can be used against injection attacks. Be sure to cite your sources. Two key defensive measures against injection attacks are input validation and output encoding. Input validation involves scrutinizing user supplied data to ensure it adheres to the expected format and content. By enforcing strict input validation, you can prevent malicious characters or code from infiltrating your application. Output encoding is another important measure when displaying user-generated data. It entails encoding or escaping the data to prevent it from being interpreted as executable code. In web applications, output encoding can thwart Cross-Site Scripting attacks by converting characters like < and > into HTML entities, rendering them harmless. What Is Input Validation and Why Is It Important? (makeuseof.com) Output Encoding — Ultimate solution for XSS | by Yadav667 | Medium Identify and describe at least two defensive measures that can be used against malware attacks. Be sure to cite your sources. Antivirus software is a fundamental tool in protecting against malware. It works by scanning files and programs for known malware signatures or suspicious behavior. When malware is detected, the antivirus software can quarantine or remove the malicious files. Regularly updating antivirus definitions is essential to stay protected against the latest threats. Firewalls act as a barrier between your network and potential malware threats. They can be hardware- based or software-based and filter incoming and outgoing network traffic based on a set of security rules. Firewalls help block unauthorized access and can prevent malware from communicating with command and control servers. It's important to configure firewalls properly to ensure they provide effective protection. What Is a Firewall & Can It Protect Your Computer? (safetydetectives.com) Page 12 of 14
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 Identify and describe at least two defensive measures that can be used against denial-of-service attacks. Be sure to cite your sources. Implementing traffic filtering can help mitigate DoS attacks. Traffic filtering involves setting up rules that allow or block traffic based on various criteria, such as source IP addresses, ports, or specific protocols. By identifying and blocking malicious traffic patterns, you can reduce the impact of DoS attacks. Leveraging a Content Delivery Network is a proactive measure against DoS attacks. Content delivery networks distribute content across multiple geographically dispersed servers, reducing the risk of a single point of failure. They can absorb and mitigate traffic spikes, including DoS attacks, by redirecting traffic through their distributed infrastructure. CDNs are equipped with various security features that can identify and block malicious traffic, allowing legitimate requests to reach your servers. How Blocking and Controlling Traffic Can Stop DDos Attacks | CSO Online How a CDN Can Help Protect Against DDoS Attacks - Namecheap Blog Identify and describe at least two defensive measures that can be used against social engineering attacks. Be sure to cite your sources. One of the most effective measures is to educate employees about the tactics and techniques used in social engineering attacks. Regular training programs can raise awareness about the risks associated with sharing sensitive information, clicking on suspicious links, or disclosing passwords. Employees should be trained to verify the identity of the person requesting information or access, especially in cases of unsolicited communications. Implementing 2FA is a technical defense that adds an extra layer of security. Even if an attacker gains access to login credentials through social engineering, they won't be able to access the account without the second authentication factor. This makes it significantly harder for attackers to compromise accounts, as they would need physical possession of the second factor. Social engineering – Protection & Prevention (kaspersky.com) Part 2: Research Additional Attack Vectors Page 13 of 14
Assessing Common Attack Vectors (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 06 Describe the additional attack vector you selected and identify at least two defensive measures that can be used against it. Be sure to cite your sources. Scanning - Security scanning tools can actively search for misconfigurations in systems and network devices. These misconfigurations might include open ports, overly permissive permissions, unnecessary services, weak passwords, or outdated software. By scanning your environment, you can identify issues before attackers do. Updates - Software updates often include patches for known vulnerabilities. When you apply these patches, you close security holes that attackers could exploit due to misconfigurations. Outdated or unpatched software is a common target for attackers, so keeping your software up to date helps reduce the attack surface. Misconfiguration Attacks: 5 Real-Life Attacks and Lessons Learned (bri Powered by TCPDF (www.tcpdf.org) Page 14 of 14