Question: Could someone help by demonstrating? In this homework create two different unique demonstrations of Porous Defenses such as: Use of a Broken or Risky Cryptographic
Could someone help by demonstrating?
In this homework create two different unique demonstrations of Porous Defenses such as:
Use of a Broken or Risky Cryptographic Algorithm, Improper Restriction of Excessive Authentication Attempts, and Use of a One-Way Hash without a Salt. Provide unique code that contains the vulnerability and then provide an updated version of the code that fixes the vulnerability. also, describe why the original code was vulnerable and discuss specific attack methods a user could try to exploit the vulnerability. Finally, discuss how the new code fixes the vulnerability.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
