合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

        代做 FIT3173、代寫 SQL 編程設(shè)計
        代做 FIT3173、代寫 SQL 編程設(shè)計

        時間:2025-05-05  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯



        FIT3173 Software Security Assignment-2 (S1 2025)

        Total Marks 100

        Please see Moodle for the due date.

        1 Overview

        The primary learning objective of this assignment is to provide you with firsthand experience in exploiting

        SQL Injection, Cross-site Scripting and Cross-site Request Forgery vulnerabilities. Additionally, it aims

        to deepen your understanding of these vulnerabilities. This assessment does not require a specific virtual

        machine (VM) and can be executed on any operating system. You can utilize the same setup as the Lab07

        and Lab08.

        2 Submission

        For this assignment, you need to submit two files using a single submission link on Moodle:

        ? A PDF file with relevant screenshots, and

        ? a singlevideo filecontaining the recording of you carrying out all tasks.

        Typeset your report into .pdf format (make sure it can be opened with Adobe Reader) and name it as the

        format:[Your Name]-[Student ID]-FIT3173-Assignment.pdf.

        All payloads, if required, should be embedded in your report. In addition, if a demonstration video is

        required, you should record your screen demonstration with your voice explanation. You can use this free

        tool to make the video:https://monash-panopto.aarnet.edu.au/ ; other tools, such as Zoom, are also fine.

        Important notes and penalties:

        ? A part of the submitted video (at a corner) must clearly show your face at all times. Penalties may

        apply when that’s not the case.

        ? Video demonstration should be a live exploitation of the vulnerabilities.

        ? Late submissions incur a 5-point deduction per day. For example, if you submit 2 days and 1 hour

        late, that incurs 15-point deduction. Submissions more than 7 days late will receive a zero mark.

        ? If you require extension or special consideration, refer tohttps://www.monash.edu/students/

        admin/assessments/extensions-special-consideration. No teaching team mem-

        ber is allowed to give you extension or special consideration, so please do not reach out to a teaching

        team member about this. Follow the guidelines in the aforementioned link.

        ? The maximum allowed duration for the recorded video is 15 mins in total. Therefore, only the first

        15:00 mins of your submitted video will be marked. Any exceeding video components will be ignored.

        ? If your device does not have a camera (or for whatever reason you can’t use your device), you can

        borrow a device from Monash Connect or Library. It’s your responsibility to plan ahead for this.

        Monash Connect or Library not having available devices for loan at a particular point in time is not a

        valid excuse.

        ? You can create multiple video parts at different times, and combine and submit a single video at the

        end. Make sure that the final video is clear and understandable.

        1

        ? You can do (online) research in advance, take notes and make use of them during your video recording.

        You may also prepare exploit scripts in advance. But you cannot simply copy-paste commands to carry

        out the tasks without any explanations. Explanations (of what the code does) while completing the

        tasks are particularly important.

        ? Zero tolerance on plagiarism and academic integrity violations: If you are found cheating, penalties

        will apply, e.g., a zero grade for the unit. The demonstration video is also used to detect/avoid plagia-

        rism. University policies can be found athttps://www.monash.edu/students/academic/

        policies/academic-integrity.

        3 Web Application Vulnerabilities

        Q1: Complete three labs fromPortSwigger Labs, one from SQL Injection, one from Cross-Site

        Scripting, and one from Cross-Site Request Forgery section. Please select labs designated as PRAC-

        TITIONER or EXPERT; APPRENTICE labs will not be accepted. You are permitted to utilize the

        solutions and demonstrations available on the PortSwigger website for assistance. However, please

        do not copy walkthroughs from the PortSwigger website. You will approach the labs as a penetration

        tester, simulating a real-world scenario where you exploit each target as if you were doing it for the

        first time. Your solution should include the logical steps that lead to the exploitation, which may not

        be covered in the walkthroughs on the PortSwigger website.[60 Marks]

        Record a video and write a report to answer the following questions for each lab. At the beginning

        of each lab recording, please state your name, student ID, and the name of the lab you are solving;

        no marks can be awarded without this information.

        1. How did you identify the vulnerability? (5 Marks)

        2. Which payload was chosen for exploitation and why? (5 Marks)

        3. What an attacker could achieve using the vulnerability? (5 Marks)

        4. How the vulnerability can be mitigated? (theoretically, no demonstration is required) (5 Marks)

        The video submission must demonstrate solving the lab, addressing the questions outlined above. In

        case time runs short during the video, you may use the report to address any unanswered questions,

        making references to relevant sections of the video. However, it is important that the video includes,

        at a minimum, a demonstration of the lab. The report does not need to be in detail, it should briefly

        address the mentioned questions, i.e. it can contain one or two-line answer for each question, pay-

        loads and important screenshots (if necessary). The marks mentioned above are for the videos and

        report combined.The word limit for each sub-question is 200 words, i.e. maximum 800 words

        are allowed for Q1 per lab.

        2

        Q2: Download theQ2.htmlfile from Moodle. Assume you are browsingmonash.edu, and

        it is hypothetically vulnerable to various web attacks (although it is not).While navigating

        monash.edu, assume you open another tab in the same browser, and visitattacker.com(as-

        suming attacker convinced you to do that). You click theSubmitbutton on theattacker.com

        webpage, which containsQ2.html, initiating attacks onmonash.edu. ExamineQ2.html(you

        can open the file in the browser and intercept the request in BurpSuite if desired) and respond to the

        following questions.No video is required for this question. The word limit for each sub-question

        is 200 words, i.e. maximum 600 words are allowed for Q2. [20 Marks]

        1. Which vulnerability/vulnerabilitiesattacker.comis trying to exploit onmonash.edu?

        (please explain the scenario outlining how this exploitation could occur) (10 Marks)

        2. If successful, what is the consequence of the attack(s)? (5 Marks)

        3. What mitigation(s) would you suggest formonash.eduto counter attack(s) launched by

        attacker.com? (5 Marks)

        Note: The parameter values in the HTML file are URL encoded.

        3

        Q3: Assume you visitmonash.eduand it tries to talk tolms.monash.edu, the browser issues

        an OPTIONS method tolms.monash.eduand gets a response, below is the HTTP request and

        its response:

        OPTIONS /doc HTTP/1.1

        Host: lms.monash.edu

        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:71.0)

        Accept: text/html,application/xhtml+xml,application/xml

        Accept-Language: en-us,en;q=0.5

        Accept-Encoding: gzip,deflate

        Connection: keep-alive

        Origin: monash.edu

        Access-Control-Request-Method: POST

        Access-Control-Request-Headers: x-requested-with

        HTTP/1.1 204 No Content

        Date: Mon, 01 Dec 2008 01:15:39 GMT

        Server: Apache/2

        Access-Control-Allow-Origin:

        *

        Access-Control-Allow-Methods: POST, GET, OPTIONS

        Access-Control-Allow-Headers: x-requested-with

        Access-Control-Allow-Credentials: true

        Access-Control-Max-Age: 86400

        Vary: Accept-Encoding, Origin

        Keep-Alive: timeout=2, max=100

        Connection: Keep-Alive

        Explain the Cross-Origin Resource Sharing (CORS) HTTP headers in the above HTTP request and

        response. Please avoid listing each header with an explanation; instead, gather the key information

        and present it in a concise paragraph.

        Would browser change future requests based on the above HTTP response?No video is required

        for this question. The word limit for Q3 is 300 words. [10 Marks]

        4 Report Completion and Quality of Presentation [10 Marks]

        Marks are allocated to the quality and clarity of presentation in the report and the video.

        請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp


         

        掃一掃在手機(jī)打開當(dāng)前頁
      1. 上一篇:代做 MATH2052編程、代寫 MATH2052設(shè)計程序
      2. 下一篇:代做 EEB 504B、代寫 java/Python 程序
      3. 無相關(guān)信息
        合肥生活資訊

        合肥圖文信息
        出評 開團(tuán)工具
        出評 開團(tuán)工具
        挖掘機(jī)濾芯提升發(fā)動機(jī)性能
        挖掘機(jī)濾芯提升發(fā)動機(jī)性能
        戴納斯帝壁掛爐全國售后服務(wù)電話24小時官網(wǎng)400(全國服務(wù)熱線)
        戴納斯帝壁掛爐全國售后服務(wù)電話24小時官網(wǎng)
        菲斯曼壁掛爐全國統(tǒng)一400售后維修服務(wù)電話24小時服務(wù)熱線
        菲斯曼壁掛爐全國統(tǒng)一400售后維修服務(wù)電話2
        美的熱水器售后服務(wù)技術(shù)咨詢電話全國24小時客服熱線
        美的熱水器售后服務(wù)技術(shù)咨詢電話全國24小時
        海信羅馬假日洗衣機(jī)亮相AWE  復(fù)古美學(xué)與現(xiàn)代科技完美結(jié)合
        海信羅馬假日洗衣機(jī)亮相AWE 復(fù)古美學(xué)與現(xiàn)代
        合肥機(jī)場巴士4號線
        合肥機(jī)場巴士4號線
        合肥機(jī)場巴士3號線
        合肥機(jī)場巴士3號線
      4. 短信驗證碼 酒店vi設(shè)計

        国产精品亚洲精品日韩已方| 国产日韩亚洲大尺度高清| 久久久久久精品久久久久| 手机看片在线精品观看| 国产日韩精品一区二区在线观看播放| 大香视频伊人精品75| 久久久精品久久久久影院| 亚洲国产高清在线精品一区| 久9久9精品视频在线观看| 日本无码小泬粉嫩精品图| 国产精品免费大片一区二区| 牛牛在线精品观看免费正| 中文一国产一无码一日韩| 国产精品jizz在线观看网站| 好吊操这里只有精品| 亚洲av无码成人精品国产| 中文字幕av日韩精品一区二区| 国产成人精品日本亚洲11| 91精品国产91久久久久久蜜臀| 久久久精品人妻一区二区三区四| 色欲久久久天天天综合网精品 | 国内精品久久久久久久coent| 无码国模国产在线无码精品国产自在久国产 | 国产成人无码精品久久久小说| 在线精品国产成人综合| 国产精品俺来也在线观看| 精品欧洲AV无码一区二区男男| 182tv精品视频在线播放| 久久亚洲国产精品成人AV秋霞| 中文字幕亚洲精品| 久久精品国产免费观看| 国产精品55夜色66夜色| 国产香蕉免费精品视频| 国产精品夜色一区二区三区| 国产精品一级香蕉一区| 国产日韩精品视频一区二区三区| 亚洲日韩国产AV无码无码精品| 久久久一本精品99久久精品36| 精品国产日韩亚洲一区91| 久久精品国产9久久综合| 亚洲av午夜福利精品一区|