CYB_240_Module_Three_Lab_Bailey_Holly

.docx

School

University of Missouri, Columbia *

*We aren’t endorsed by this school

Course

7850

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

3

Uploaded by bails4

Report
Bailey Holly Professor Bernuy Application Security CYB-240-R3445 28 January 2024 CYB 240 Module Three Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: SQL Injections (SQLi) Prompt Response In the lab section “Analysis of the Vulnerability,” Step 20 , insert your name at the command line below the output and include it in your screenshot. In the lab, we demonstrated the dangers of unsecured input and how it can lead to SQLi. The lab also demonstrated how escaping can be used to mitigate an SQLi password bypass attack. Explain the steps of escaping and why it was successful in mitigating the SQL injection attack. The first step is to identify special characters in the user input that have a specific meaning in SQL. Once the special characters are identified, these characters are replaced with harmless versions that won’t be interpreted as SQL commands. Special characters are prepended with a backlash to escape their functionality, such as ‘\’ becomes ‘\\’. By escaping special characters, an attacker's injected SQL code becomes part of the data itself, instead of manipulating the query structure. This prevents unintended execution of malicious commands and protects the database from compromise.
Bailey Holly Professor Bernuy Application Security CYB-240-R3445 28 January 2024 Lab: Performing SQL Injection to Manipulate Tables in a Database Prompt Response In the lab section “Stealing Data and Creating a Backdoor,” Step 7 , insert your last name as the user that is created. Also use the name in Step 8. Take a screenshot after Step 8. Metasploit is an open source free tool that is shipped with Kali Linux. The tool can also be added to other distributions of Linux. How can this tool be used by security analysts to help secure computer systems that they are responsible for maintaining? Metasploit provides a vast library of exploits, security analysts can leverage this to scan their systems for known vulnerabilities and assess their patching priorities. Metasploit modules can be used to simulate attacks, this helps analysts evaluate the effectiveness of their firewalls, IDS, and other security tools in detecting and preventing attacks. Analysts can use Metasploit modules to test their code for vulnerabilities and improve the overall security of their applications.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help