FIT 2093 Introduction to Cyber Security Assignment

Assignment Help Computer Network Security
Reference no: EM132551021

FIT 2093 Introduction to Cyber Security - Monash University

Assignment: Web Hacking Challenge

In this assignment, your goal is to do security testing of a mini web application to try find vulnerabilities in it using techniques covered in our Web security lecture, and exploit them to break the app's security. You can access the web application at the attached URL:

This web app give access to registered members of a `Broken App' group to access some information common to the group members (provided using the PHP server script at brokenapp.php) as well as personal private information for each group member (via the script at brokenapp-personal.php on the same domain).

Visit the web application URL above using your web browser. If all is well, the browser should display a page that looks like this:

Tasks. Your task is to perform the following security tests on this web application.

Part A: Personal Private Information Security Test

In this part, your aim is to do security testing of the personal private information part of the web app. For this, you are given member 1's password, namely:

Ro4mvSemq45xfepvaEr24

(1) Here, we consider an attack against member 1 by some outsider (non-member) attacker. Try logging in with the given member 1 password, and examining that member's private information. Based on the application behavior, where on this page could there be a possible point where a reflected XSS vulnerability might exist? Why? Perform a test to see if an XSS vulnerability exists for an attack against member 1, and explain your test, its results, and conclusion on why/why not such a vulnerability exists and can be exploited.

(2) Test the application against an attacker who is one of the authorized group members, in particular the member with ID number 1. Can that member gain unauthorized access to another member's personal private data? If so, explain the vulnerability you found and how member 1 can exploit it, show any private member data exposed by the attack, and briefly explain how the vulnerability could be eliminated. In any case, explain the tests you did, the results, and your interpretation of them.

Part B: Shared Group Private Information Security Test

In this part, your aim is to do security testing of the shared group private information part of the web application, from the point of view of an outsider (non-member) attacker trying to reveal the group private information. Although you are not given the shared group password, you are given the php code for the relevant script brokenapp.php (available for download on Moodle).

(3) Look at the details in the brokenapp.php PHP script available on Moodle to see how user input is read in from the user's browser request and how the authentication check is performed. You should read the PHP documentation on the PHP functions used in the script, see https://php.net/manual/en/ and search for the relevant functions. The shared group password, whose cryptographic hash is hard-coded in the script, was generated using the php function call password_hash(pwd, PASSWORD_DEFAULT),where pwd is the password to be hashed (note that the hash includes also a salt value generated at random). To help your security tests, you are also given a simple PHP script called password_hasher.php (the code is available on Moodle, it can be run by pointing your browser to https://13.54.173.115/password_hasher.php ; alternatively, you could run it by copying it into the web server folder /var/www/html/ of your FIT2093 Ubuntu-64 VM and then pointing your VM Firefox browser to https://localhost/password_hasher.php ). The script takes an input password from a user and displays its hash value (generated using the php function call above) when the user clicks the small button below the text box.

Using the above information/tools, attempt to identify a vulnerability in brokenapp.php. If you found a vulnerability, explain how it can be exploited, provide any secret information revealed, and briefly explain how the brokenapp.php code could be modified to eliminate this vulnerability. In any case, explain what tests you did, the results, and your interpretation of them.

Attachment:- Web Hacking Challenge.rar

Reference no: EM132551021

Questions Cloud

Is the real gdp growing and at what rate : Is the real GDP growing and at what rate? (Consider the situation before COVID - 19)
Define how your discussion will be evaluated : Read the journal article, "Executive Information Systems: Their impact on Executive Decision Making". Based on the information presented in the article.
What is the companys cost of equity : The Doven Co. just issued a dividend of $2.35 per share on its common stock, What is the companys cost of equity
Inflationary gap or a recessionary gap : Is the Canada experiencing an inflationary gap or a recessionary gap? Consider the situation before Covid - 19.
FIT 2093 Introduction to Cyber Security Assignment : FIT 2093 Introduction to Cyber Security Assignment Help and Solution, Monash University - Assessment Writing Service - security testing of a mini web
Describe action regulatory agency took against business : Describe an action a regulatory agency took against a business in the past 6 months. Post a link to your source. Do you agree or disagree with the action?
Explain the aspects of expansionary and contractionary : Explain the aspects of expansionary and contractionary fiscal policy. During which phases of the business cycle would each be appropriate
What the amount of the direct materials quanitiy variance is : What The amount of the direct materials quanitiy variance is? The standard costs and actual cost for direct materials for the manufacture of 2,500
What is real gdp : If the money supply is 600, velocity is 5 and the price index is 100, what is real GDP?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain primary tasks high-level investigation processes

Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist.

  Describe the key differences between a network-based attack

Describe the key differences between a network-based attack and client-based attack. Give some examples of each and determine which deserves the most attention at this point in time. Explain your reasoning.

  Methods of controlling the layout of controls

Describe at least two methods of controlling the layout of controls on a web page. Explain their differences

  Explain rsa public-key encryption scheme

Consider the plain (i.e., non-padded) RSA public-key encryption scheme. Encrypt the message m = 12 using the public key pk = (N,e), where N = 35 and e = 3.

  What classess java provide to make network programming

IPv6 uses addresses that are 16 bytes long (128 bits ).  How many addresses is that per person in the world? and What classes does Java provide to make network programming easier

  Explain the security breach

Explain the security breach and the steps taken to mitigate the breach, and explain whether the steps taken were adequate - what are the steps a hospital

  Determine what the risk to an organisation

Security professionals need to ensure that they keep up to date with the latest threats and security issues. This allows them to update their risk profiles.

  Identify an assessment of risks associated with collection

Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information.

  Find out about the cryptosystems and protocols

Go to a popular online electronic commerce site like Amazon.com. What can you find out about the cryptosystems and protocols in use to protect this transaction

  Describe how cryptography can be used to meet your goal

You are designing a program that will be able to detect if any of the standard operating system files on a PC have been modified. You decide to use cryptography to accomplish this. Describe how cryptography can be used to meet your goal

  Analyze the network protocols and security mechanisms

Analyze the network protocols and security mechanisms in wireless networks. Evaluate the application of Wireless LANs, MANs, and PANs.

  Why do modern encryption algorithms use keys?

Why do modern encryption algorithms use keys?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd