Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Cross site request forgery csrf attack lab answer

21/10/2021 Client: muhammad11 Deadline: 2 Day

SOPH LAB IN APPLIED COMPUTING

Find six vulnerabilities in CandyPal
Vulnerabilities must fall under the risks discussed during lecture
Cross-Site Scripting
Cross-Site Request Forgery
Insecure Deserialization
Using Components with Known Vulnerabilities
Unvalidated Redirects and Forwards
Insufficient Logging & Monitoring
Provide the following per vulnerability:
Name
Image

Description

Quiz

Quiz – Answers

Q1. What does OWASP stand for?

A1. Open Web Application Security Project

Q2. Which of the OWASP Top 10 was removed from 2017’s list?

A2. Cross-Site Request Forgery

Q3. What is Session Fixation an example of?

A3. Broken Authentication

Q4. DTD stands for Document Type Description.

A4. False

Q5. There is more than one type of injection attack.

A5. True

OWASP Top 10

OWASP Top 10 – Risks

Injection

Broken Authentication

Sensitive Data Exposure

XML External Entities

Broken Access Control

Security Misconfiguration

Cross-Site Scripting

Cross-Site Request Forgery

Insecure Deserialization

Using Components with Known Vulnerabilities

Unvalidated Redirects and Forwards

Insufficient Logging & Monitoring

OWASP Top 10 – Cross-Site Scripting (Overview)

When an attacker gets their JavaScript to execute on a victim’s browser

OWASP Top 10 – Cross-Site Scripting (Examples)

Reflected XSS – Payload in HTTP request comes back in HTTP response body

Stored XSS – Payload is stored in the application’s database and returned in an HTTP response body

DOM-Based XSS – Normal JavaScript comes from the HTTP response body and retrieves the payload from the URL to place on the page

OWASP Top 10 – Cross-Site Scripting (Labs)

URL: http://10.15.1.10:8081

Lab 1 – Reflected XSS

Lab 2 – Stored XSS

Lab 3 – DOM-Based XSS (Try Different Browsers)

Lab 4 – XSS in Tag Attributes

Lab 5 – POST XSS

Discussion – Remediation

OWASP Top 10 – Cross-Site Request Forgery (Overview)

When an attacker gets a victim’s browser to perform an action with their session

OWASP Top 10 – Cross-Site Request Forgery (Examples)

Victim is logged into an application

Attacker sends an email containing a link to victim

Link leads to the application’s logout endpoint

Victim clicks on the link and gets logged out

OWASP Top 10 – Cross-Site Request Forgery (Labs)

URL: http://10.15.1.10:8081

Lab 1 – CSRF to XSS Chained Attack

Discussion – Remediation

Discussion – SOP & CORS

Lab 2 – Steal Comments

OWASP Top 10 – Insecure Deserialization (Overview)

Serialization is the process of converting an object into a format that can be stored or transferred

Deserialization is the process of converting serialized data back into an object

Insecure Deserialization occurs when untrusted input gets deserialized

OWASP Top 10 – Insecure Deserialization (Examples)

Application A serializes objects and sends them to Application B

Application B does not authenticate Application A

An attacker makes direct requests to Application B with serialized data

Attacker’s serialized data gets deserialized and the object’s functions are executed

OWASP Top 10 – Insecure Deserialization (Labs)

URL: http://10.15.1.10:8081

Lab 1 – PHP Object Injection

Discussion – Remediation

OWASP Top 10 – Using Components with Known Vulnerabilities (Overview)

Self explanatory

Just because an application is using a component with known vulnerabilities does not mean it is exploitable

OWASP Top 10 – Using Components with Known Vulnerabilities (Examples)

https://nvd.nist.gov/

https://jeremylong.github.io/DependencyCheck/

https://dependencytrack.org/

OWASP Top 10 – Unvalidated Redirects and Forwards (Overview)

Redirect is when someone sends you elsewhere for an answer

Forward is when someone answers you after asking elsewhere

Rest is self explanatory

OWASP Top 10 – Unvalidated Redirects and Forwards (Examples)

An attacker borrows the reputation of a trusted domain to then send a victim somewhere malicious

An attacker gets an application to retrieve resources from a malicious server to achieve XSS

An attacker gets an application to communicate with a malicious server to steal credentials

OWASP Top 10 – Unvalidated Redirects and Forwards (Labs)

URL: http://10.15.1.10:8081

Lab 1 – Unvalidated Redirect

Lab 2 – Server Side Request Forgery (Credentials)

Lab 3 – Server Side Request Forgery (XSS)

Discussion – Remediation

OWASP Top 10 – Insufficient Logging & Monitoring (Overview)

Self explanatory

OWASP Top 10 – Insufficient Logging & Monitoring (Examples)

Users authenticating

Impersonation functionality

Payment functionality

Password reset functionality

Brute force attempts

Malicious traffic

Etc.

Next Week

Next Week

Topic:

Security Training Platforms Pt. 1

Assignments:

Week 4 Homework

Week 4 Quiz

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Pro Writer
High Quality Assignments
Instant Assignment Writer
Engineering Help
Accounting & Finance Specialist
Academic Mentor
Writer Writer Name Offer Chat
Pro Writer

ONLINE

Pro Writer

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$40 Chat With Writer
High Quality Assignments

ONLINE

High Quality Assignments

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$41 Chat With Writer
Instant Assignment Writer

ONLINE

Instant Assignment Writer

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$30 Chat With Writer
Engineering Help

ONLINE

Engineering Help

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$22 Chat With Writer
Accounting & Finance Specialist

ONLINE

Accounting & Finance Specialist

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$50 Chat With Writer
Academic Mentor

ONLINE

Academic Mentor

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$30 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Think social psychology duff pdf - Homework Question - Diary of anne frank play character descriptions - Bethel university ccj login - Notetaking - Kinship chart symbols - Hyperion essbase admin guide - Community DQ 1 - Give me liberty 5th edition pdf free - Annotated bibilography - Info systems - ITGE_Discussion5 - Spencer's flea market in dover delaware - Biblical name meaning hairy crossword clue - Module 3 Case-BHD421 - Perry smith and richard hickock - How to draw a space time diagram - Atlanta child murders new evidence - Powerade bridge seats busch stadium - Baskerville old face adobe - Pepsi glass bottle australia - Allen is a critique of utilitarianism - Marketing - Muslim Molvi 7340613399 OnLine No 1 FaMOUs VashIKaraN sPecIaLIsT IN Mathura - Ansys contact detection method - Management information system (Lab1) - Two ways to belong in america by bharati mukherjee essay - Research paper - Journal Entry - Calcium and hydrochloric acid equation - Write a one page critical reflection on this chart - Gandhi memorial international school - Looking for a PHD Writer in UAE - Skinpen by bellus medical for sale - Ezproxy liberty 2048 login - Case studies of minority student placement in special education - Hydro 175 john deere - The inclusion of nurses in the systems development life cycle - Ethernet cable color code - Institute of internal auditors canada - Ethics primer for public administrators svara - Detecting fake news assignment vaccines answers - A gantt chart can be used to track informal communication paths. - Discussion 09/22 - Edu 100 week 5 journal - Need a paper done in APA format - Question 8A - Kitchen utensils and equipment and their uses - Discussion - Doing ethics 5th edition pdf - Zan v. Director, Missouri Department of Health, 497 U.S. 261 (1990 - Cloud in a bottle with matches - 3 types of emergency in a fitness environment - Scientific and Mathematical/Analytical Perspectives of Inquiry Paper - Application notice - rms licence appeal - Co codamol effervescent asda - 2015 hsc chemistry solutions - Pmp integration management questions and answers pdf - Discussion 1: Importance of Managerial Accounting- APA format - Study worksheet questions - The invention of nature epub - Excel 2019 In Practice - Ch 5 Independent Project 5-4 - Three ethical theories - Millfield primary school littleport - Paper - Operational Excellence - Critical academic writing and multilingual students - How to decode dtmf tones - Qnt 351 week 2 powerpoint - What shape is pf3 - Bearings and scale drawings - Www bcsp org resources review and study sources - Wuthering heights chapter 14 - Arlec pa1500 portable air conditioner - Australian standards tiling wet areas - Paper - Dr lawson broomfield hospital - Factorytalk linx opc ua connector - What is a 10 51 police code - Celf 5 metalinguistics description - 39 clues maze of bones characters - Assignment 2 situation analysis course hero - I too sing america annotations - 2010 hsc exam timetable - After reading the introduction from Imagined Communities and watching/reading "La Marseillaise", respond to the following question in a paragraph or two (a double-spaced page or less) - Brisbane correctional centre postal address - What's the plural of hippopotamus - WBS - Dr spiller stockists perth - Apple financial statements past 5 years - ASSIGNMENT 1 For Economics - Uses of histogram in daily life - Southern cross gts bkn - How to find square root of 1681 - Viavi onx 620 manual - Manic miner class tools - Behavior change theories and models - Kitchen safety occupational therapy - Hangman game code in assembly language - How can you tell a dogwood tree e 28 answers