![]() |
CSC347 Introduction to Information Security
|
| Due: | November 16, 2017 at 11:59 PM |
|---|---|
| Late penalty: | 10% for 1 day, 20% for 2 days |
| Hand in: | Please place your solutions in a2.zip and then electronic submit here |
| Marking: | |
| Groups: | Groups of size 2. Both students receive the same mark. |
The fourFours web application has many vulnerabilities. For this exercise, we will explore
some of the vulnerabilities and then fix them. /var/www/fourFours/index_fixed.php
has directions outlining the vulnerabilities in the application as well as how you can fix them.
For this question, just explore the outlined vulnerabilities documenting each with an example.
For SQL Injection, please use SQLMAP in Kali Linux. You should attack index.php
For reference, please take a look at The OWASP Top 10.
For this question, follow the instructions and fix the vulnerabilities. Submit index_fixed.php
Some pointers: To change to root, execute
/var/www.
find will do the trick.
Report your find command and the results.
diff is your friend (check the options)
Do a brief recursive diff and send it to a file, do a full diff and send it to a file.
Make sure to check both volumes. Report your two diff commands as well as their results.
/var/log anything interesting?
mine.py
which behaves as follows:
Please find the following:
openssl x509 -in arnoldscert.pem -inform pem -text -noout.
openssl x509 -in sergueiscert.pem -inform pem -text -noout.
openssl req -in req.pem -text -noout.
Your job, understand and document the following scripts (in this order):