Reference no: EM133836161 , Length: word count:500
Software Fortress and Web Protection
Practical Lab Activity
Learning Outcome 1: Explain the external threats and internal risks associated with software and web applications.
Assessment Task
For this assessment task, you will identify and describe security vulnerabilities and weaknesses in a web application or service.
Context
SQL injection and cross-site scripting (XSS) are common security vulnerabilities in web applications. Learning how to identify, prevent and mitigate these vulnerabilities is essential for ICT professionals working in software development, cybersecurity and related fields.
In this assessment task, you will be required to describe SQL injection and cross-site scripting (XSS) vulnerabilities in a web application called Damn Vulnerable Web Application (DVWA). This tool is cross-platform virtualisation software used by security professionals and enthusiasts to perform various security assessments and penetration testing on different systems and applications.
Instructions
In preparation for this assessment task, please review the learning resources for Modules 1-4 before undertaking the Online Practical Activity. Get professional assignment writing service now!
You will use a Kali Linux virtual machine to complete the practical lab activity. Before commencing the activity, please ensure that you install and set up the Damn Vulnerable Web Application (DVWA) on the Kali Linux virtual machine. Once you have set up DVWA, you will perform an attack on the web application using different techniques.
To complete this assessment task successfully, you must complete the following tasks:
You will implement an attack on the DVWA on a Kali Linux virtual machine. You will use the DVWA application to execute the attack. While completing the task online, you must record your actions on a separate document in the form of a report.
This Online Practical Lab Activity consists of two (2) tasks. You will select one (1) from the following two listed:
SQL Injection Attack - Perform a SQL injection attack on the DVWA SQL injection page and bypass authentication.
OR
Cross-Site Scripting (XSS) Attack - Perform an XXS attack on the DVWA XSS page and bypass authentication.
Content and format of the report:
You will articulate the steps you followed in executing the attack. This should include identifying the vulnerabilities and describing the potential impact of the attack. You will include the following points in the report:
Information on the selected attack (SQL injection or XSS), including what it is, how it works, and its potential impact.
Description of the steps you took to perform the SQL injection or Cross Site attacks on DVWA, including the SQL commands used and the results obtained.
Screenshots of the commands used and results at each step of the process.
Clear explanation of the potential business and societal impacts of the attacks.
When writing the report, make sure that you:
use clear, concise and cohesive language to elucidate the steps taken and the results obtained, and
formulate the content of the report logically, coherently and sequentially.
You will submit your report in a document format (e.g., PDF, Word) on Blackboard after completing the online practical lab activity.
Referencing
It is essential that you use the current APA style for citing and referencing.