代做FIT3173 Software Security Assignment-2 (SSB 2025)代做SQL语言

FIT3173 Software Security Assignment-2 (SSB 2025)

Total Marks 100

Due on Jan 31st, 2025, Friday midnight, 11:55:00 pm

1 Overview

The primary learning objective of this assignment is to provide you with firsthand experience in exploiting SQL Injection, Cross-site Scripting and Cross-site Request Forgery vulnerabilities.  Additionally, it aims to deepen your understanding of these vulnerabilities.  This assessment does not require a specific virtual machine (VM) and can be executed on any operating system.  You can utilize the same setup as the Lab06 and Lab07.

2 Submission

For this assignment, you need to submit two files using a single submission link on Moodle:

A PDF file with relevant screenshots, and

a single video file containing the recording of you carrying out all tasks.

Typeset your report into .pdf format (make sure it can be opened with Adobe Reader) and name it as the format: [Your Name]-[Student ID]-FIT3173-Assignment.pdf.

All payloads, if required, should be embedded in your report.  In addition, if a demonstration video is required, you should record your screen demonstration with your voice explanation.  You can use this free tool to make the video:https://monash-panopto.aarnet.edu.au/ ; other tools, such as Zoom, are also fine.

Important notes and penalties:

•  A part of the submitted video (at a corner) must clearly show your face at all times.  Penalties may apply when that’s not the case.

Video demonstration should be a live exploitation of the vulnerabilities.

•  Late submissions incur a 5-point deduction per day.  For example, if you submit 2 days and  1 hour late, that incurs 15-point deduction. Submissions more than 7 days late will receive a zero mark.

•  If you require extension or special consideration, refer to https://www.monash.edu/students/ admin/assessments/extensions-special-consideration. No teaching team mem-ber is allowed to give you extension or special consideration, so please do not reach out to a teaching team member about this. Follow the guidelines in the aforementioned link.

•  The maximum allowed duration for the recorded video is 15 mins in total.  Therefore, only the first 15:00 mins of your submitted video will be marked. Any exceeding video components will be ignored.

•  If your device does not have a camera (or for whatever reason you can’t use your device), you can borrow a device from Monash Connect or Library.  It’s your responsibility to plan ahead for this. Monash Connect or Library not having available devices for loan at a particular point in time is not a valid excuse.

•  You can create multiple video parts at different times, and combine and submit a single video at the end. Make sure that the final video is clear and understandable.

•  You can do (online) research in advance, take notes and make use of them during your video recording. You may also prepare exploit scripts in advance. But you cannot simply copy-paste commands to carry out the tasks without any explanations.  Explanations (of what the code does) while completing the tasks are particularly important.

•  Zero tolerance on plagiarism and academic integrity violations: If you are found cheating, penalties  will apply, e.g., a zero grade for the unit. The demonstration video is also used to detect/avoid plagia-  rism. University policies can be found at https://www.monash.edu/students/academic/ policies/academic-integrity.

3 Web Application Vulnerabilities

Q1: Complete three labs from PortSwigger Labs, one from SQL Injection, one from Cross-Site Scripting, and one from Cross-Site Request Forgery section. Please select labs designated as PRAC-TITIONER or EXPERT; APPRENTICE labs will not be accepted. You are permitted to utilize the solutions and demonstrations available on the PortSwigger website for assistance. However, please do not copy walkthroughs from the PortSwigger website. You will approach the labs as a penetration tester, simulating a real-world scenario where you exploit each target as if you were doing it for the first time. Your solution should include the logical steps that lead to the exploitation, which may not be covered in the walkthroughs on the PortSwigger website. [60 Marks]

Record a video and write a report to answer the following questions for each lab. At the beginning of each lab recording, please state your name, student ID, and the name of the lab you are solving; no marks can be awarded without this information.

1. How did you identify the vulnerability? (5 Marks)

2. Which payload was chosen for exploitation and why? (5 Marks)

3. What an attacker could achieve using the vulnerability? (5 Marks)

4. How the vulnerability can be mitigated? (theoretically, no demonstration is required) (5 Marks)

The video submission must demonstrate solving the lab, addressing the questions outlined above. In case time runs short during the video, you may use the report to address any unanswered ques-tions, making references to relevant sections of the video. However, it is important that the video includes, at a minimum, a demonstration of the lab. The report does not need to be in detail, it should briefly address the mentioned questions, i.e. it can contain one or two-line answer for each question, payloads, important screenshots (if necessary) and the video link(s). The marks mentioned above are for the videos and report combined. The word limit for each sub-question is 200 words, i.e. maximum 800 words are allowed for Q1 per lab.

Q2: Download the Q2.html file from Moodle. Assume you are browsing monash.edu, and it is hypothetically vulnerable to various web attacks (although it is not). While navigating monash.edu, assume you open another tab in the same browser, and visit attacker.com (as-suming attacker convinced you to do that). You click the Submit button on the attacker.com webpage, which contains Q2.html, initiating attacks on monash.edu. Examine Q2.html (you can open the file in the browser and intercept the request in BurpSuite if desired) and respond to the following questions. No video is required for this question. The word limit for each sub-question is 200 words, i.e. maximum 600 words are allowed for Q2. [20 Marks]

1. Which vulnerability/vulnerabilities attacker.com is trying to exploit on monash.edu? (please explain the scenario outlining how this exploitation could occur) (10 Marks)

2. If successful, what is the consequence of the attack(s)? (5 Marks)

3. What mitigation(s) would you suggest for monash.edu to counter attack(s) launched by attacker.com? (5 Marks)

Note: The parameter values in the HTML file are URL encoded.

Q3: Assume you visit monash.edu and it tries to talk to lms.monash.edu, the browser issues an OPTIONS method to lms.monash.edu and gets a response, below is the HTTP request and its response:

OPTIONS /doc HTTP/1.1

Host: lms.monash.edu

User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:71.0)

Accept: text/html,application/xhtml+xml,application/xml

Accept-Language: en-us,en;q=0.5

Accept-Encoding: gzip,deflate

Connection: keep-alive

Origin: monash.edu

Access-Control-Request-Method: POST

Access-Control-Request-Headers: x-requested-with

HTTP/1.1 204 No Content

Date: Mon, 01 Dec 2008 01:15:39 GMT

Server: Apache/2

Access-Control-Allow-Origin: *

Access-Control-Allow-Methods: POST, GET, OPTIONS

Access-Control-Allow-Headers: x-requested-with

Access-Control-Allow-Credentials: true

Access-Control-Max-Age: 86400

Vary: Accept-Encoding, Origin

Keep-Alive: timeout=2, max=100

Connection: Keep-Alive

Explain the Cross-Origin Resource Sharing (CORS) HTTP headers in the above HTTP request and response. Please avoid listing each header with an explanation; instead, gather the key information and present it in a concise paragraph.

Would browser change future requests based on the above HTTP response? No video is required for this question. The word limit for Q3 is 300 words. [10 Marks]

4 Report Completion and Quality of Presentation [10 Marks]

Marks are allocated to the quality and clarity of presentation in the report and the video.




热门主题

课程名

mktg2509 csci 2600 38170 lng302 csse3010 phas3226 77938 arch1162 engn4536/engn6536 acx5903 comp151101 phl245 cse12 comp9312 stat3016/6016 phas0038 comp2140 6qqmb312 xjco3011 rest0005 ematm0051 5qqmn219 lubs5062m eee8155 cege0100 eap033 artd1109 mat246 etc3430 ecmm462 mis102 inft6800 ddes9903 comp6521 comp9517 comp3331/9331 comp4337 comp6008 comp9414 bu.231.790.81 man00150m csb352h math1041 eengm4100 isys1002 08 6057cem mktg3504 mthm036 mtrx1701 mth3241 eeee3086 cmp-7038b cmp-7000a ints4010 econ2151 infs5710 fins5516 fin3309 fins5510 gsoe9340 math2007 math2036 soee5010 mark3088 infs3605 elec9714 comp2271 ma214 comp2211 infs3604 600426 sit254 acct3091 bbt405 msin0116 com107/com113 mark5826 sit120 comp9021 eco2101 eeen40700 cs253 ece3114 ecmm447 chns3000 math377 itd102 comp9444 comp(2041|9044) econ0060 econ7230 mgt001371 ecs-323 cs6250 mgdi60012 mdia2012 comm221001 comm5000 ma1008 engl642 econ241 com333 math367 mis201 nbs-7041x meek16104 econ2003 comm1190 mbas902 comp-1027 dpst1091 comp7315 eppd1033 m06 ee3025 msci231 bb113/bbs1063 fc709 comp3425 comp9417 econ42915 cb9101 math1102e chme0017 fc307 mkt60104 5522usst litr1-uc6201.200 ee1102 cosc2803 math39512 omp9727 int2067/int5051 bsb151 mgt253 fc021 babs2202 mis2002s phya21 18-213 cege0012 mdia1002 math38032 mech5125 07 cisc102 mgx3110 cs240 11175 fin3020s eco3420 ictten622 comp9727 cpt111 de114102d mgm320h5s bafi1019 math21112 efim20036 mn-3503 fins5568 110.807 bcpm000028 info6030 bma0092 bcpm0054 math20212 ce335 cs365 cenv6141 ftec5580 math2010 ec3450 comm1170 ecmt1010 csci-ua.0480-003 econ12-200 ib3960 ectb60h3f cs247—assignment tk3163 ics3u ib3j80 comp20008 comp9334 eppd1063 acct2343 cct109 isys1055/3412 math350-real math2014 eec180 stat141b econ2101 msinm014/msing014/msing014b fit2004 comp643 bu1002 cm2030
联系我们
EMail: 99515681@qq.com
QQ: 99515681
留学生作业帮-留学生的知心伴侣!
工作时间:08:00-21:00
python代写
微信客服:codinghelp
站长地图