Create PHP page named directory_traversal_part1.php in your droplet web root This PHP page will display all...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Create PHP page named directory_traversal_part1.php in your droplet web root This PHP page will display all files and folders of path that will be given to it via a query string parameter without any validation checking Insert the following content for the php page <?php ini_set('display_errors', 1); ini_set('display_startup_errors', 1); error_reporting(E_ALL); $path isset($_GET['q']) ? $_GET['q'"]= print "<pre>"; print_r(scandir (Spath)); print "</pre>"; ?> Running Script Open any browser. Open the URL: (Your droplet IP)/ directory_traversal_part1.php Take a screenshot of your browser. Name the screenshot step_d-1.png Using the Query String Open the URL: {Your droplet IP)/ directory_traversal_part1.php?q=./ Take a screenshot of your browser. Name the screenshot step_d-2.png Mystery Task 1 Open the URL (Your droplet IP)/ directory_traversal_part1.php?q=hello Take a screenshot of your browser. Name the screenshot step_d-3.png Create a text file named step_d.txt and describe What you see on the browser (the issue) What sensitive information is given by this page Create PHP page named directory_traversal_part1.php in your droplet web root This PHP page will display all files and folders of path that will be given to it via a query string parameter without any validation checking Insert the following content for the php page <?php ini_set('display_errors', 1); ini_set('display_startup_errors', 1); error_reporting(E_ALL); $path isset($_GET['q']) ? $_GET['q'"]= print "<pre>"; print_r(scandir (Spath)); print "</pre>"; ?> Running Script Open any browser. Open the URL: (Your droplet IP)/ directory_traversal_part1.php Take a screenshot of your browser. Name the screenshot step_d-1.png Using the Query String Open the URL: {Your droplet IP)/ directory_traversal_part1.php?q=./ Take a screenshot of your browser. Name the screenshot step_d-2.png Mystery Task 1 Open the URL (Your droplet IP)/ directory_traversal_part1.php?q=hello Take a screenshot of your browser. Name the screenshot step_d-3.png Create a text file named step_d.txt and describe What you see on the browser (the issue) What sensitive information is given by this page
Expert Answer:
Answer rating: 100% (QA)
Solution Code explanation The code sets the error reporting level to display all errors and warnings It retrieves the value of the query string parameter q and assigns it to the variable path It uses ... View the full answer
Related Book For
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these computer network questions
-
This data set represents the web server hit logs for a single website for a single day. You're going to do some analysis of the data, but first you need to normalize it properly -- which requires...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
A cylindrical rod of steel (E =207 GPa, 30 106 psi) having a yield strength of 310 MPa (45,000 psi) is to be subjected to a load of 11,100 N (2500 lbf). If the length of the rod is 500 mm (20.0...
-
A designer has to select a metal-belt drive to transmit a power of Hnom under circumstances where a service factor of Ks and a design factor of nd are appropriate. The design goal becomes Hd = Hnom...
-
Determine the integrals in Exercises by making appropriate substitutions. x3 x - 2x X 3x + 1 dx
-
The approximation of Eq. (13.31) is sometimes suggested as a possible way to approximate V@R of option portfolios. For instance, with the data of Example 13.10, we may apply the following first-order...
-
A new machine can be purchased today for $300,000. The annual revenue from the machine is calculated to be $67,000, and the equipment will last 10 years. Expect the maintenance and operating costs to...
-
Can you elaborate on the integration of graph databases with machine learning and artificial intelligence frameworks, discussing techniques such as graph embeddings, graph neural networks (GNNs), and...
-
What Are Empirical/Research Articles? Describe the resource assigned to you including two examples of how this resource will support your successful completion of the capstone project?
-
Adam who is 14 years of age is a member of the Bike out fan club. He frequently visits their Facebook page and is heavily impacted by what Bike out says and wears. This fan club is what kind of...
-
Address the leadership teams of Ellen Johnson Sirleaf and Narendra Modi. What type of leadership team did each create? How were the leadership teams created? How did the leader deal with team...
-
Genetic Insights Co. purchases an asset for $13,132. This asset qualifies as a seven-year recovery asset under MACRS. The seven-year fixed depreciation percentages for years 1, 2, 3, 4, 5, and 6 are...
-
As CFO of the OK Oil Co you expect to have produced 10,000 barrels of oil to sell in May, 2021. You are concerned that the spot price of oil may drop from the current price you are receiving of $53...
-
Linda Baer has already saved $4.751 to buy a used vehicle. Ignoring taxes and assuming her money is invested in a money market account earning 6 percent compounded annually, how long will it take to...
-
Management proposes a plan to lower the interest burden for Five Brothers. Five Brothers has one debt investor, Warren Buffett. The proposal to Warren Buffett is to lower the coupon payments of Five...
-
1. What is the control premium paid by Carson to aquire 80 percent of voting shares of Gardena? 2. What is the goodwill of Gardena at acquisition? 3.What is the amount of Non-Controlling Interest at...
-
1. Advertising for eyeglasses _________ (increases/decreases) the price of eyeglasses because advertising promotes _________. 2. An advertisement that succeeds in getting consumers to try the product...
-
The process of hiding information within other files, such as digital pictures or other images, is known as which of the following? a. Digital signatures b. Steganography c. Registration authority d....
-
The ________ is a certification program that is administered by the Security Industry Association (SIA). a. CAPM b. CSPM c. PMP d. ECCPM
-
I. Explain how in transport mode, the data within an IP packet is encrypted, but the header information is not. II. Emphasize that this allows the user to establish a secure link directly with the...
-
Sumitomo Cable manufactures various types of aluminum and copper cables which it sells directly to retail outlets through its distribution channels. The manufacturing process for producing cables...
-
The Cooper Furniture Company of Potomac, Maryland, assembles two types of chairs (Recliners and Rockers). Separate assembly lines are used for each type of chair. Classify each cost item (AI) as...
-
The following data are for Marvin Department Store. The account balances (in thousands) are for 2017. 1. Compute (a) the cost of goods purchased and (b) the cost of goods sold. 2. Prepare the income...
Study smarter with the SolutionInn App