Perform an sql injection attack on the demo grading website

Assignment Help Computer Engineering
Reference no: EM131952305

Assignment: Advanced Network Security

Question 1. Analysis of Protocols with Wireshark

For this question you must use virtnet (as used in the workshops) to study Internet applications with Wireshark. This assumes you have already setup and are familiar with virtnet. See Moodle and workshop instructions for information on setting up and using virtnet, deploying the website, and performing the attack.

Your task is to:

• Create topology 5 in virtnet where:

o node1 will be referred to as the client
o node2 will be the router
o node3 will be the server

• Start capturing packets using tcpdump on the router (node2)

• While capturing, perform the following operations in order:

1. Start netcat TCP server using assigned port on the server (node3)

2. Start netcat TCP client on the client (node1)

3. On the client (node1) type:

COIT20262 Assignment 1<press ENTER>
My ID is <type in your actual student ID><press ENTER>

4. On the server (node3) type:

Hello <type in your actual student ID>. I am the server.<press ENTER>

5. On the client (node1) type:

Goodbye server.<press ENTER>

<Ctrl-D>

You need to perform steps 3-5 in the correct sequence, switching from client to server to client.

• Stop the capture and save the file as netcat.pcap

The netcat TCP server must use port 6xyz where xyz is the last three digits of your student ID. For example, the netcat TCP server for student ID 12034567 would be 6567.

After performing and understanding the above steps, answer the following sub-questions

(a) Submit your capture file as netcat.pcap on Moodle. The single file must contain all packets of the TCP exchange using your assigned port and using your ID.

(b) Draw a message sequence diagram that illustrates all the TCP packets generated by using netcat (do not draw any packets generated by other applications or protocols, such as ARP, DNS or SSH). A message sequence diagram uses vertical lines to represent events that happen at a computer over time (time is increasing as the line goes down). Addresses of the computers/software are given at the top of the vertical lines. Horizontal or sloped arrows are used to show messages (packets) being sent between computers. Each arrow should be labelled with the protocol, packet type and important information of the message. Examples of message sequence diagrams are given in workshops. Note that you do not need to show the packet times, and the diagram does not have to be to scale.

(c) Based on your capture only, identify the following information, and give the packet that the information is found in. If the information is found in multiple packets, give the first packet from the capture. For example, if the information is found in packet numbers 3, 5 and 7, you would give the packet as 3.

Information

Value

Packet

MAC address of the client

 

 

IP address of the server

 

 

Flags for 1st TCP segment containing data

 

 

Length of data for 2nd TCP segment containing data

 

 

Absolute sequence number of 1st TCP segment sent by server that contains data

 

 

Question 2. Web Application Attacks

Using virtnet, perform an SQL injection attack on the demo grading website. The general steps for performing an SQL injection attack with virtnet are described.

However you must follow these specific steps when performing the attack:

1. Before performing the attack, add two new student users to the database with the following details:

a. New student 1: username is your ID, password is your ID
b. New student 2: username is 12039999, password is hacker

2. For both of the new students add the following courses and grades:

a. New student 1: coit20262, C
b. New student 1: coit20264, D
c. New student 2: coit20262, HD
d. New student 2: coit20264, F

3. Perform the SQL injection attack as new student 2, i.e. logged in as 12039999

4. Take a screenshot of the attacker web browser showing the web form the attacker uses to perform the attack. Make sure the screenshot clearly shows the fields/data entered by the attacker. Save the screenshot as screenshot-attack.png.

5. Take a screenshot of the attacker web browser showing a successful attack, i.e. the grades of other students. Save the screenshot as screenshot-success.png.

Answer the following questions.

(a) Give a general explanation of an SQL injection attack. (This explanation should NOT reference the attack you performed in virtnet; it should be for any SQL injection attack).

(b) Explain two general approaches that can be used to avoid or minimise SQL injection attacks. (This explanation should NOT reference the attack you performed in virtnet; it should be for any SQL injection attack).

For this specific attack on www.myuni.edu:

(c) Explain the limitation/weakness in the MyUni website that allowed the SQL injection attack to be successful. In your explanation refer to the file(s) and line(s) of code, and give samples of the code in your answer.

(d) Explain what the attacker, 12039999, had to do in their web browser to perform the attack. In your explanation include the screenshot screenshot-attack.png and refer to the information shown in that screenshot.

(e) Submit your screenshot screenshot-attack.png as a separate file. That is, you must both embed the screenshot in the report AND submit the file separately. The reason for this is that it makes it easier for the marker in reading the report to have an embedded image, but sometimes the quality is hard to read (hence the additional file submission).

(f) Explain what the attacker, 12039999, could learn or gain from performing the SQL injection attack. In your explanation include the screenshot screenshot-success.png and refer to the information shown in that screenshot.

(g) Submit your screenshot screenshot-success.png as a separate file.

(h) Explain what the website developer could do to prevent this SQL injection attack. In your explanation, give exact code and steps the developer should use.

Question 3. Cryptography Concepts

Assume you are advising a small legal business on aspects of computer and network security. The business stores many confidential documents, and many of the communications with its clients contain confidential information. The business wants to go paper-less; that is, no paper documents stored or paper-based communications. As they have only a small number (but quite valuable and loyal) clients, the clients have agreed to participate in the paper-less communications (so long as it doesn't introduce any significant extra cost to them).

In the following questions provide an answer that is understandable by employees of the company, and also provides technical depth such that their IT manager can implement any recommended technologies (e.g. refer to standards, protocols, algorithms or software). You are allowed to use dot points, lists and diagrams in your answers, however you should keep the answer of each part shorter than ½ a page (in some cases, the answers may be just a paragraph or two).

The company has a file server, with sufficient space to store their documents for the foreseeable future.

(a) Provide a general explanation of how symmetric key encryption of files or disks work.

(b) With respect to the file server, explain to the company what is full-disk encryption and file-based encryption, and explain the tradeoffs between the two approaches. Include recommended technologies.

The company is considering backing up the file server to a cloud storage provider.

(c) Explain to the company any security ramifications of this approach to backup. Include reasons why or why not there are security ramifications. (Note that you should not explain about the issues of backups or costs of cloud storage; focus only on the security ramifications).

The company, as well as all clients, use email software and document editing software that supports digital signatures.

(d) Provide a general explanation of how digital signatures work, and what problems they solve for the company.

(e) Regarding both encryption on the file server and use of digital signatures, explain to the company what keys will be in use (e.g. types of keys, who will have keys) and provide recommendations on managing, sharing and changing keys.

Question 4. Trojan Downloads Research

Many people download free or paid software from reputable sources for use on their computers and mobile devices. The sources include: app stores (Google Play, Apple App Store); software distribution sites (e.g. SourceForge, GitHub, CNET Download) and individual websites of software developers. However, there have been cases when reputable sources hosting popular software have been compromised, resulting in people downloading infected software (e.g. Trojans). For example, see stories about HandBrake video converter, Transmission BitTorrent, and Google taking down potentially harmful apps from the Play Store. Your task is to study how such reputable software sources can host malicious software, and what measures software developers and hosting sites can take to reduce infection.

Note this question refers to reputable sources of software. The question is NOT about sites or systems that often host illegal or copyrighted software (e.g. torrents, file lockers).

You must write a short report that answers the following questions:

(a) What are the motivations and goals of malicious users in using the above mentioned attacks? Include in your answer examples of negative impact of such attacks on users and software developers.

(b) Select two examples of real Trojans or malware distributed via reputable sources, and describe those examples.

(c) What role can file hashes, digests or signatures play in securing downloads? What are the limitations of these techniques?

(d) List and explain recommendations should be given to software developers in distributing software.

(e) List and explain recommendations should be given to users who download software.

You should structure your report into a section for each of the above parts.

There is no minimum/maximum length of the report. As a guide 1/3 to 1/4 pages of text for each of the above parts may be appropriate. You may draw diagrams if needed. Including pictures from other sources, or including pictures that do not help with the explanation will not gain marks and may lead to reduced marks.

You may assume the audience of the report has similar background on network security as you. You should refer to techniques and concepts covered in the unit, and give sufficient technical detail to demonstrate you understand the issues.

Reference no: EM131952305

Questions Cloud

Explain how you ensured the antivirus program is updated : Explain how you ensured the antivirus program is updated and running a full scan of the system; describe anything significant you observed?
Perform a two-dimensional differencing analysis : For the data in Problem, perform a two-dimensional differencing analysis. Do your results differ from your answer in Problem?
Draw the payoff diagram to illustrate the payoff : FIN380/Multinational Finance Homework - Please draw the payoff diagram to illustrate the payoff. Where is the break-even point
Training program for a group of twenty employees : Suppose you are going to conduct a training program for a group of twenty employees. These employees are different in age and gender.
Perform an sql injection attack on the demo grading website : Perform an SQL injection attack on the demo grading website. The general steps for performing an SQL injection attack with virtnet are described.
What are key performance indicators : 1. What are Key Performance Indicators (KPIs)? 2. What five criteria should be met when creating targets?
Determine which dimensions should be emphasized : Using simple differencing, determine which dimensions should be emphasized. Use two-dimensional differencing to determine which dimensions should be emphasized.
Discuss about the opportunities for social change : I think that the experience that has influenced me the most is from interacting with others that are completing the same process as me.
What areas of weaknesses can you build upon going forward : What areas of weaknesses can you build upon going forward into your Doctoral Study? Be sure to provide supportive examples.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Communication among various constituents in terms of time

communication among various constituents in terms of time and place is key to project management consideration.

  What is meant by two-key lockout and n-key rollover

What are the factors to be considered for interfacing a hex keyboard to a microcontroller?

  Developing a strong scm process to match is system

Developing a strong SCM process to match IS system upgrades would provide what advantage(s)? What would such a process look like? Watch the "Strategic Global Vision" video. What role does technology have in social responsibility

  Which is implemented using linked lists

An array can be used to hold a complete or full binary tree. Explain how he data structure would be set up and how a node's left and right children can be reached. What changes would be needed if there was a requirement to handle non-full, non-comp..

  Calculating mod of the number

Consider the equation ax = b mod m, where x refers to the unknown and a, b and m are given. Display that this equation has either no solutions mod m, or d solutions mod m, where d = gcd (a, m); also, explain when each of these two cases holds.

  Write a code fragment that prints every other character

Write a method called multiplesOfFive that prints the first 5 multiples of 5 (starting with 5). The method takes no parameters and doesn't return anything.

  Can unix fork return an error and why

You can answer this question by looking at the manual page for fork, but before you do that, think about what the fork system call does.

  Questionwrite down an assembly language program that solves

questionwrite down an assembly language program that solves following problem. the albatross company has four

  Create a program to translate a single word at a time

Create a program to translate a single word at a time from English into Pig Elvish. Important: You are only required to implement steps 1-6 above.

  Imagine that you run a photography printing store your

explain the life cycle of an information systemsapply the steps of the life cycle to the scenario listed belowimagine

  Calculates the class mean and standard deviation

Calculates the class mean, standard deviation and percentage of the test scores falling into the ranges.

  How many times each smaller fibonacci number will calculated

In the recursive calculation of Fn , determine exactly how many times each smaller Fibonacci number will be calculated.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd