Assessing_Common_Attack_Vectors_4e_-_Madeline_OMalley
pdf
keyboard_arrow_up
School
Utica College *
*We aren’t endorsed by this school
Course
356
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
14
Uploaded by BrigadierJellyfishPerson5726
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
Student:
Email:
Madeline O`Malley
madeline.omalley@spartans.ut.edu
Time on Task:
Progress:
9 hours, 40 minutes
100%
Report Generated:
Sunday, October 29, 2023 at 9:29 AM
Section 1: Hands-On Demonstration
Part 1: Perform an Injection Attack
11.
Make a screen capture
showing the
DOM XSS dialog box
.
Page 1 of 14
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
21.
Make a screen capture
showing the
successful admin login
.
26.
Make a screen capture
showing the
successful Reflected XSS injection
.
Page 2 of 14
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
42.
Make a screen capture
showing the
user with the @owasp.org email
.
Part 2: Perform a Malware Attack
Page 3 of 14
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
6.
Make a screen capture
showing the
msfvenom output
.
Page 4 of 14
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
23.
Make a screen capture
showing the
Opening malwarePayload.exe dialog box
.
Page 5 of 14
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
36.
Make a screen capture
showing the
output of the sysinfo command
.
Page 6 of 14
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
Section 2: Applied Learning
Part 1: Perform a Distributed Denial-of-Service Attack
25.
Make a screen capture
showing the
newly recruited hosts
.
Page 7 of 14
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
28.
Make a screen capture
showing the
drisst.org webpage
.
Page 8 of 14
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
33.
Make a screen capture
showing the
failed connection to drisst.org
.
35.
Make a screen capture
showing the
“PF states limit reached” error message
.
Part 2: Perform a Social Engineering Attack
Page 9 of 14
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
24.
Make a screen capture
showing the
finished SET phishing email composition
.
Page 10 of 14
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
36.
Make a screen capture
showing the
transaction.php page in the browser
.
Page 11 of 14
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
Section 3: Challenge and Analysis
Part 1: Recommend Defensive Measures
Identify
and
describe
at least two defensive measures that can be used against injection attacks. Be
sure to cite your sources.
Two key defensive measures against injection attacks are input validation and output encoding. Input
validation involves scrutinizing user supplied data to ensure it adheres to the expected format and
content. By enforcing strict input validation, you can prevent malicious characters or code from
infiltrating your application.
Output encoding is another important measure when displaying user-generated data. It entails
encoding or escaping the data to prevent it from being interpreted as executable code. In web
applications, output encoding can thwart Cross-Site Scripting attacks by converting characters like <
and > into HTML entities, rendering them harmless.
What Is Input Validation and Why Is It Important? (makeuseof.com)
Output Encoding — Ultimate solution for XSS | by Yadav667 | Medium
Identify
and
describe
at least two defensive measures that can be used against malware attacks. Be
sure to cite your sources.
Antivirus software is a fundamental tool in protecting against malware. It works by scanning files and
programs for known malware signatures or suspicious behavior. When malware is detected, the
antivirus software can quarantine or remove the malicious files. Regularly updating antivirus definitions
is essential to stay protected against the latest threats.
Firewalls act as a barrier between your network and potential malware threats. They can be hardware-
based or software-based and filter incoming and outgoing network traffic based on a set of security
rules. Firewalls help block unauthorized access and can prevent malware from communicating with
command and control servers. It's important to configure firewalls properly to ensure they provide
effective protection.
What Is a Firewall & Can It Protect Your Computer? (safetydetectives.com)
Page 12 of 14
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
Identify
and
describe
at least two defensive measures that can be used against denial-of-service
attacks. Be sure to cite your sources.
Implementing traffic filtering can help mitigate DoS attacks. Traffic filtering involves setting up rules
that allow or block traffic based on various criteria, such as source IP addresses, ports, or specific
protocols. By identifying and blocking malicious traffic patterns, you can reduce the impact of DoS
attacks.
Leveraging a Content Delivery Network is a proactive measure against DoS attacks. Content delivery
networks distribute content across multiple geographically dispersed servers, reducing the risk of a
single point of failure. They can absorb and mitigate traffic spikes, including DoS attacks, by
redirecting traffic through their distributed infrastructure. CDNs are equipped with various security
features that can identify and block malicious traffic, allowing legitimate requests to reach your
servers.
How Blocking and Controlling Traffic Can Stop DDos Attacks | CSO Online
How a CDN Can Help Protect Against DDoS Attacks - Namecheap Blog
Identify
and
describe
at least two defensive measures that can be used against social engineering
attacks. Be sure to cite your sources.
One of the most effective measures is to educate employees about the tactics and techniques used in
social engineering attacks. Regular training programs can raise awareness about the risks associated
with sharing sensitive information, clicking on suspicious links, or disclosing passwords. Employees
should be trained to verify the identity of the person requesting information or access, especially in
cases of unsolicited communications.
Implementing 2FA is a technical defense that adds an extra layer of security. Even if an attacker gains
access to login credentials through social engineering, they won't be able to access the account
without the second authentication factor. This makes it significantly harder for attackers to compromise
accounts, as they would need physical possession of the second factor.
Social engineering – Protection & Prevention (kaspersky.com)
Part 2: Research Additional Attack Vectors
Page 13 of 14
Assessing Common Attack Vectors (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 06
Describe
the additional attack vector you selected and
identify
at least two defensive measures that
can be used against it. Be sure to cite your sources.
Scanning - Security scanning tools can actively search for misconfigurations in systems and network
devices. These misconfigurations might include open ports, overly permissive permissions,
unnecessary services, weak passwords, or outdated software. By scanning your environment, you can
identify issues before attackers do.
Updates - Software updates often include patches for known vulnerabilities. When you apply these
patches, you close security holes that attackers could exploit due to misconfigurations. Outdated or
unpatched software is a common target for attackers, so keeping your software up to date helps
reduce the attack surface.
Misconfiguration Attacks: 5 Real-Life Attacks and Lessons Learned (bri
Powered by TCPDF (www.tcpdf.org)
Page 14 of 14