CYB-240_ModuleFiveLabWorksheet

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

240

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by DeanGoldfinch4081

Report
CBY 240 Module Five Lab Worksheet Lab: Command Injection Prompt Response In the lab section “Adding the Code,” Step 3 , insert your name as a comment after the </html> tag. The line of syntax to put a comment in the file is <!-- YourName -->. Take a screenshot after Step 3. In the lab section “Remote Shell,” Step 17 , insert your name at the command line below the output and include it in your screenshot. PHP is an interpreted language that does not need to be compiled. What are the dangers of using an interpreted language versus a compiled language? Interpreted language presents a security risk because the code is executed line by line. (Santos, 2023) . Compiled translates the code to machine language before executing. (Santos, 2023) .
Lab: Exploiting a Vulnerable Web Application Prompt Response In the lab section “Post Exploitation,” Step 42 , insert your last name as the file name instead of “pass”. Make sure you use the file name in Steps 43–45. Take a screenshot after Step 46. I was unable to launch the attack. I waited 5 minutes. I closed down the lab and started over again. It is stuck on “waiting up to 180 seconds for exploit to trigger. Within the lab, you experienced Armitage, a graphical software package that can be used to carry out Metasploitable activities. The exploit that is targeted is a vulnerability with XAMPP. Explain what the vulnerability is and why it needs to be mitigated. XAMPP is open source. It was found to have insecure permissions. This allows attackers to gain access and execute code. (NIST, 2022) . If attackers are allowed to access XAMPP they can change or enter code changing the outcome of the existing code. They could access files, plant viruses, etc. References NIST. (2022, June 6). CVE-2022-29376 Detail . Retrieved from NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-29376 Santos, L. G. (2023, April 24). Interpreted Languages vs Compiled Languages: What's the Difference? Retrieved from Dev: https://dev.to/tofuwave/interpreted-languages-vs-compiled-languages-whats-the-difference-45eh#:~:text=This%20means%20that %20interpreted%20code,buffer%20overflows%20and%20injection%20attacks.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help