Question: Instructions : Complete the tasks described in this worksheet. Read the instructions carefully and submit evidence of your completed tasks (a screen shot is your

Instructions: Complete the tasks described in this worksheet. Read the instructions carefully and submit evidence of your completed tasks (a screen shot is your evidence). Answer the questions below in the space provided.

Showing Evidence of Completion: Your evidence of completion is a screen shot, as described in each exercise. Use the tool of your choice to take a screen shot of the required content. Screen shots should be pasted at the end of this document.

Answering Questions: Your answers should be written in carefully edited college-level English, using complete sentences.

Lab Analyzing Types of Web Application Attacks

Instructions and Evidence of Completion

Answer a Question

At the end of the document (not in this table) paste a screen capture that shows: the successful SQL Injection showing the complete user data base; the complete profile for user Larry Stooge; the DVWA tool showing the XSS attack. Be sure to label your screen captures and be sure that it shows the command used and the output from that command. You should show three screen captures.

Answer each of the questions below using the space to the right of the question. Be sure your answer is complete and correct.

Question

Answer

In your own words explain why some web sites are vulnerable to SQL injection attacks.

What two things must a web site do to make it vulnerable to an XSS attack?

What are the primary differences between HTML and XML?

In your own words explain a buffer overflow.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!