preview

Nt1310 Unit 1 Lab 1

Good Essays

• Vulnerability 1: Injection – used to attack the applications in which malicious SQL statements are inserted into an entry field for execution. o Mitigation- Keeping untrusted data separate from commands and queries.
• Vulnerability 2: Broken Authentication and Session Management: User authentication credentials, session Id’s are not protected when stored by using hashing or encryption techniques. o Mitigation: Adopting strong authentication and session management controls.
• Vulnerability 3: Cross-Site Scripting (XSS): It is one of the most common application layer hacking techniques ("What is cross-site," 2015). o Mitigation: Can be mitigated by separating untrusted data from active browser content.
• Vulnerability 4: Insecure …show more content…

By performing this I have noticed how to use Firefox browser to access the Damn Vulnerable Web Application (DWVA) to replicate several of the most critical security risks of application development. I have also learned what a SQL injection and how to perform SQL injection. A successful SQL injection will obtain confidential data from the database. By using this SQL injection an attacker will insert any data which destroys the database integrity. I have also learned how to perform command execution or command injection attack on DWVA. I have also learned hot to perform cross-site request forgery (CSRF) on the DWVA. This attack make the user to pass a malicious code without his knowledge. I have also learned how to change mode in Linux. The chmod command is used for changing mode. I have also learned how to upload a php file into the server. This uploaded file is used to attack the web server. I have also learned that the SQL injection attacks allows the user to include malicious scripts into a web server. I was surprised when I have uploaded the change.php file. After uploading the file I can use the new password to get logged into DVWA. I was also surprised after getting all the SQL injection attempts

Get Access