Explain what is a cross-site scripting attack

Assignment Help Computer Engineering
Reference no: EM131153001

Lab- Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities

Overview

In this lab, you performed simple tests to verify a cross-site scripting (XSS) exploit and an SQL injection attack using the Damn Vulnerable Web Application (DVWA), a tool left intentionally vulnerable to aid security professionals in learning about Web security. You used a Web browser and some simple command strings to identify the IP target host and its known vulnerabilities, and then attacked the Web application and Web server using cross-site scripting (XSS) and SQL injection to exploit the sample Web application running on that server.

Lab Assessment Questions & Answers

1. Why is it critical to perform a penetration test on a Web application and a Web server pri to production implementation?

2. What is a cross-site scripting attack? Explain in your own words.

3. What is a reflective cross-site scripting attack?

3. Which Web application attack is more likely to extract privacy data elements out of a database?

4. What security countermeasures could be used to monitor your production SQL databases against injection attacks?

5. What can you do to ensure that your organization incorporates penetration testing and application testing as part of its implementation procedures?

6. Who is responsible for the C-I-A of production Web applications and Web servers?

Reference no: EM131153001

Questions Cloud

Research problem and contributions to research theory : Research Problem & Contributions to Research Theory- Describe the scientific problem. - Most of the healthcare environments across the industry are unsafe and unhealthy.
Why might your coworker suggest encrypting an archive file : Why might your coworker suggest encrypting an archive file before e-mailing it? What kind of network traffic can you filter with the Windows Firewall with Advanced Security?
What is the arrival rate : A computer processes jobs on a first-come, first-served basis. The jobs arrive to the computerevery 6 minutes. The objective in processing these jobs is that they spend no more than eight minutes,on average, in the system(Hint: you can use the Go..
Formulate a linear programming model : Formulate a linear programming model that can be used to determine the amount of funds CCU should allocate to each type of loan in order to maximize the total annual return for the new funds.
Explain what is a cross-site scripting attack : What is a cross-site scripting attack? Explain in your own words. What is a reflective cross-site scripting attack? Which Web application attack is more likely to extract privacy data elements out of a database?
How does fit into your beliefs about your leadership style : Analyze your personal leadership attributes you feel you have that will help you in your graduate nursing role. Also discuss those attributes that you feel you may need to develop in your graduate nursing role.
Indicate the number of different color groupings for sale : A rug manufacturer has decided to use seven compatible colors in her rugs. However, in weaving a rug, only five spindles can be used. In advertising, the rug manufacturer wants to indicate the number of different color groupings for sale.
Difference between the variances : When testing for the difference between the variances of two population with sample sizes of n1=8 and n2=10, the number of degrees of freedom are?
What key type was use to create the certificate on kleopatra : What does Kleopatra allow you to do once it is installed? What key type was used to create the certificate on Kleopatra? What other types of encryption key types are possible?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Clarify security mechanisms available for a database

Clarify security mechanisms available for a database

  Prepare functional specifications for the companys use of

select one business thatnbspdoes not alreadynbsphave a websitenbspand develop an internet strategy for it. most large

  What are some trends which computer support has witnessed

what are some trends that computer support has witnessed over the past 10 years? how does the cost benefit of

  Determining the project schedule

Discuss in scholarly detail how you determine a project schedule once the critical path has been identified and how to adjust the schedule if the calculated project.

  In order to develop effective strategies it is critical to

in order to develop effective strategies it is critical to understand the marketplace environment. in this assignment

  The web page is passed back to the client

One of the features of Javascript that we have been looking at this week is that code is interpreted within the browser environment, on client machine.

  Creating a static method

Write down a static method, getBigWords, which takes a String parameter and returns an array whose elements are words in the parameter that consists of more than 5 letters.

  Technology assumption and analyzing the system

Which businesses and services would no longer be required if the perfect technology assumption were a reality for automobile? Explain how does the perfect technology assumption help with analyzing the system?

  Formal mission statement about soft-wear, limited

Explain how do the information systems help the people working individually and in groups make the decisions more efficiently? Write down a formal mission statement about the Soft-Wear, Limited (SWL).

  What is the average latency time for disk

What is the disk transfer rate in bytes per second and what are the minimum and maximum latency times for this disk? What is the average latency time for this disk?

  Make the script to get it to back up to "x" number

Write down a shell script that would count the number of files in your account hat were last modified 5 or more days ago. When you run the shell script, the results should look something like.

  What type of access permissions are probably configured

If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd