Lab 3 Assignment (Web Security)
|
|
|
- Rafe Dalton
- 9 years ago
- Views:
Transcription
1 CS 5910 Fundamentals of Computer/Network Security - 3 Credit Hours (Fall 2011 CS ) Instructor: Chuan Yue Lab 3 Assignment (Web Security) Please follow the requirements and due date specified in the Syllabus to submit your work. Please also include a comment to tell me: How much time did you spend on this assignment? Acknowledgments: The usage of AWS (Amazon Web Services) cloud infrastructure for this lab exercise is enabled by an AWS Teaching Grant awarded to Dr. Chuan Yue in AWS account and EC2 (Elastic Compute Cloud) Instance Setup: please make sure to read the information at: Important Note: Like other cloud service providers, Amazon uses the pay-as-you-go pricing model. In our lab exercises, normally (unless explicitly specified) you only need to create one EC2 instance. Meanwhile, please make sure to stop the running of your EC2 instance when you do not use it, so that Amazon will not charge to my account when we do not use its service. Please do not stop or start other people s instances. Lab Description: Students will identify two types of Web attacks in this Lab. One is Command Injection attacks, and the other is Cross Site Scripting (XSS) attacks. You need to answer the specified questions in the following lab content and steps, and submit your answers in a PDF or Word file. You are also required to answer a short survey after you finish the lab. Lab Content and Steps: 1. Reuse your EC2 instance created in Lab 1, and Lab 2. You need to start your Apache 2 and enable Web traffic if you have disabled them in Lab 2. (Note: the login URL is: 2. Command Injection Attack 2.1 Start your EC2 instance and the Apache 2 web server Question 1: (5 points) (a) What are the users and groups pre created on your EC2 instance? What is the main reason (in terms of security) for creating so many users and groups? (b) What are the running user and running group of those Apache 2 processes? Which Apache 2 configurations are used to specify the running user and running group? Why such configurations are used? 2.2 Host the extremeinsecure Web application on your EC2 Apache Web server by (1) wget (2) extract the.tar.gz file to the appropriate directory of the Apache 2 Web server Fall 2011 CS Lab 3 Web Security Page 1 of 5
2 (3) properly set the permissions of the extracted directory and files so that the nine.htm and one.php webpages in the extremeinsecure directory can be properly accessed by anyone through a Web browser, e.g., by typing (you need to use DNS of your EC2): Question 2: (5 points) (a) What are the permissions that you have assigned to the extremeinsecure directory and the files in it (you can run ls l and copy the results from the screen)? 2.3 Identify and verify the command injection vulnerability in this Web application. Question 3: (15 points) (a) What is that vulnerability and how did you figure it out? What are the risks due to this vulnerability? (Hint: you may identify the vulnerability by either trying this Web application, doing a source code inspection, or running a third party Web application vulnerability scanning tool). (b) Demonstrate this vulnerability by using at least three attack examples. You need to provide the details about the attack procedure, input, and the corresponding output for each example. 2.4 Perform a special attack by using the following steps: (1) Create a directory named confidential under the /var directory. (2) Create a file named bankinfo.txt in the confidential directory contains such a sentence: I have $1,00,000 in my bank account. I am so happy because NO ONE can know this. Yay!! (3) Change the owner of the confidential directory and bankinfo.txt to the current running user of those Apache 2 processes. (Hint: use chown command) (4) Set the permission of the confidential directory so that it is only readable, writable, and executable by the owner. Other users do not have any access right to this directory. (5) Set the permission of bankinfo.txt so that it is only readable and writable by the owner. Other users do not have any access right to this file. Question 4: (15 points) (a) What are the permissions that you have assigned to the confidential directory and the bankinfo.txt file (you can run ls l and copy the results from the screen)? (b) Demonstrate that you can take advantage of the above identified vulnerability to read the content of bankinfo.txt by only using a browser on any computer. You need to provide the details about the attack procedure, input, and the corresponding output. Fall 2011 CS Lab 3 Web Security Page 2 of 5
3 (c) Demonstrate that you can take advantage of the above identified vulnerability to change the content of bankinfo.txt (still only using a browser on any computer) to: I have $2,00,000 in my bank account. I am so happy because NO ONE can know this. Yay!! That is, only the amount of the money is doubled. The size of the bankinfo.txt file does not change. You need to provide the details about the attack procedure, input, and the corresponding output. (d) Analyze why such a confidential file outside of the Apache www directory can be read and modified. 2.5 Propose a solution to fix the command injection vulnerability in this Web application. Also propose a solution to further reduce the potential risks that can be introduced by the Apache server to this Linux system (Hint: for this solution, you can either consider enforcing file create/access policies or consider changing Apache configurations). Question 5: (15 points) Describe your solutions and verifications. 3. Cross Site Scripting (XSS) attack 3.1 Host the XSS Web application on your EC2 Apache Web server by (1) wget (2) extract the.tar.gz file to the appropriate directory of the Apache 2 Web server (3) properly set the permissions of the extracted directory and files so that webpages in the XSS directory can be properly accessed by anyone through a Web browser, e.g., by typing (you need to use DNS of your EC2): Visit the XSS Web application using a browser (1) You will see two links as shown below. click the First, visit this page! link to visit setgetcookie.htm (2) On setgetcookie.html, fill the username/password form, click Set cookie and then Show cookie buttons to make sure this website set a cookie to your browser Fall 2011 CS Lab 3 Web Security Page 3 of 5
4 (3) go back and click the Then, visit this page! link to visit malurl.htm You will see two links on this malurl.htm page as shown below, but both of them do not work right now. (4) change the malurl.htm of your XSS Web application, so that when you click the first EMC's RSA Security Breach May Cost Bank Customers $100 Million link, the cookie stored on your browser for this website will be sent to an attacker s server (that s my EC2 instance) using an HTTP GET request with the following format: Note: you must use the above address and format, so that the stealcookie.php on my EC2 instance can receive and verify your submission record. Here, COOKIES means the complete cookie content save on your browser for this website (i.e., document.cookie), so it should include a pair of username and password values. The file stealcookie.php is also included in XSS.tar.gz, so that you can use it to test your attack locally on your EC2 instance before actually sending the stolen cookies crossside to my EC2 instance. Hint: there could be multiple solutions. One solution is to simply replace the current href value ("#") of the first link in malurl.htm with a piece of JavaScript code; nothing else needs to be changed. Note that if you use this solution and if you move the mouse over the link, you may notice that my EC2 address information (ec ) is shown on the status bar of your browser. So, a security conscious user may notice this and may not be tricked to click the link. Question 6: (15 points) What are your changes to the malurl.htm file? What is the public DNS of your EC2 instance used in this task? What are your verification results? Explain this XSS attack. (5) Make the attack stealthier, so that when you move the mouse over the second link, my EC2 address information (ec ) will not be shown on the status bar of your browser. In this case, a security conscious user may also be tricked to click the second link. Still, when you click this second EMC's RSA Security Breach May Cost Bank Customers $100 Million link, the cookie stored on your browser for this website will be sent to an attacker s server (that s my EC2 instance) using an HTTP GET request with the following format: Fall 2011 CS Lab 3 Web Security Page 4 of 5
5 Note: you must use the above address and format, so that the stealcookie.php on my EC2 instance can receive and verify your submission record Hint: there could be multiple solutions. One simple solution is to simply add a redirectpage.htm webpage in the XSS directory; you don t need to change malurl.htm because redirectpage.htm has been specified in it. Question 7: (15 points) Describe the details of your solution. If you use the redirectpage.htm solution, please provide the content of this file. What is the public DNS of your EC2 instance used in this task? What are your verification results? (6) Basically, the above two links illustrated the persistent (or stored) XSS attacks. That is, if an attack can store those links on your legitimate webpages or websites, they can perform attacks such as cookie stealing. This XSS Web application is also vulnerable to non-persistent (or reflected) XSS attacks. In this task, demonstrate that the above cookie stealing attacks can happen by using reflected XSS attacks. In other words, reflected XSS attacks can also send the cookie stored on your browser for this website to an attacker s server (that s my EC2 instance) using an HTTP GET request with the following format: Note: you must use the above address and format, so that the stealcookie.php on my EC2 instance can receive and verify your submission record Hint: you don t need to make any change to this existing XSS Web application. You simply need to demonstrate the vulnerability by cleverly constructing input to this XSS Web application. Question 8: (15 points) Describe the details of your attacks (including the input you used). What is the public DNS of your EC2 instance used in this task? What are your verification results? Fall 2011 CS Lab 3 Web Security Page 5 of 5
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.
Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
WELCOME TO CITUS CLOUD LOAD TEST
USER S GUIDE CONTENTS Contents... 2 Chapter 1: Welcome to Citus Cloud Load Test... 3 1. What is Citus Cloud Load Test?... 3 2. Why Citus Cloud Load Test?... 3 3. Before using this guide... 3 Chapter 2:
EECS 398 Project 2: Classic Web Vulnerabilities
EECS 398 Project 2: Classic Web Vulnerabilities Revision History 3.0 (October 27, 2009) Revise CSRF attacks 1 and 2 to make them possible to complete within the constraints of the project. Clarify that
Secure Web Development Teaching Modules 1. Threat Assessment
Secure Web Development Teaching Modules 1 Threat Assessment Contents 1 Concepts... 1 1.1 Software Assurance Maturity Model... 1 1.2 Security practices for construction... 3 1.3 Web application security
Installation Guide. Research Computing Team V1.9 RESTRICTED
Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
WebCruiser User Guide
WebCruiser User Guide - Web Vulnerability Scanner 1. Software Introduction...2 2. User Guide...3 2.1. Scanner...3 2.2. SQL Injection...5 2.3. Cookie Injection Demo...6 2.4. Cross Site Scripting...10 2.5.
How To Create A Virtual Private Cloud In A Lab On Ec2 (Vpn)
Virtual Private Cloud - Lab Hands-On Lab: AWS Virtual Private Cloud (VPC) 1 Overview In this lab we will create and prepare a Virtual Private Cloud (VPC) so that we can launch multiple EC2 web servers
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Web Same-Origin-Policy Exploration Lab
Laboratory for Computer Security Education 1 Web Same-Origin-Policy Exploration Lab (Web Application: Collabtive) Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
DVS-100 Installation Guide
DVS-100 Installation Guide DVS-100 can be installed on any system running the Ubuntu 14.04 64 bit Linux operating system, the guide below covers some common installation scenarios. Contents System resource
Step by Step. Use the Cloud Login Website
Step by Step HOW TO Use the Cloud Login Website This How To article will show you how to use the Cloud Login Website to upload and download your files from the cloud. For a complete list of available How
Parental Control Setup Guide
Parental Control Setup Guide This guide will show you how to setup parental controls on your Genexis router. The parental controls used in this guide are provided by OpenDNS. By using this you can either
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29. Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB
USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29 Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB Table of Contents UNIT 1: Lab description... 3 Pre-requisites:... 3 UNIT 2: Launching an instance on EC2...
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
How to Log in to LDRPS-Web v10 (L10) https://enterprise.strohlservices.com
How to Log in to LDRPS-Web v10 (L10) https://enterprise.strohlservices.com Contents First Time Login Instructions... 1 1) Use the Internet Explorer (IE) Web browser*... 1 2) Install the.net Framework...
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Configure Single Sign on Between Domino and WPS
Configure Single Sign on Between Domino and WPS What we are doing here? Ok now we have the WPS server configured and running with Domino as the LDAP directory. Now we are going to configure Single Sign
Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok
CLOUD COMPUTING PRACTICE 82 Chapter 9 PUBLIC CLOUD LABORATORY Hand on laboratory based on AWS Sucha Smanchat, PhD Faculty of Information Technology King Mongkut s University of Technology North Bangkok
Load testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
DVS-100 Installation Guide
DVS-100 Installation Guide DVS-100 can be installed on any system running the Ubuntu 14.04 64 bit Linux operating system, the guide below covers some common installation scenarios. Contents System resource
Online Vulnerability Scanner Quick Start Guide
Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.
JAVASCRIPT AND COOKIES
JAVASCRIPT AND COOKIES http://www.tutorialspoint.com/javascript/javascript_cookies.htm Copyright tutorialspoint.com What are Cookies? Web Browsers and Servers use HTTP protocol to communicate and HTTP
Zend Server Amazon AMI Quick Start Guide
Zend Server Amazon AMI Quick Start Guide By Zend Technologies www.zend.com Disclaimer This is the Quick Start Guide for The Zend Server Zend Server Amazon Machine Image The information in this document
AWS Account Setup and Services Overview
AWS Account Setup and Services Overview 1. Purpose of the Lab Understand definitions of various Amazon Web Services (AWS) and their use in cloud computing based web applications that are accessible over
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Online Backup Guide for the Amazon Cloud: How to Setup your Online Backup Service using Vembu StoreGrid Backup Virtual Appliance on the Amazon Cloud
Online Backup Guide for the Amazon Cloud: How to Setup your Online Backup Service using Vembu StoreGrid Backup Virtual Appliance on the Amazon Cloud Here is a step-by-step set of instructions to get your
InHand Device Cloud Service DN 4.0 Quick Start Guide
InHand Device Cloud Service DN 4.0 Quick Start Guide Contents 1. Overview... 3 2. Device Manager... 4 2.1 Get an account by self-registration... 4 2.2 Remotely Configure Gateway and Upgrade firmware...
INSTALLING KAAZING WEBSOCKET GATEWAY - HTML5 EDITION ON AN AMAZON EC2 CLOUD SERVER
INSTALLING KAAZING WEBSOCKET GATEWAY - HTML5 EDITION ON AN AMAZON EC2 CLOUD SERVER A TECHNICAL WHITEPAPER Copyright 2012 Kaazing Corporation. All rights reserved. kaazing.com Executive Overview This document
Background (http://ha.ckers.org/slowloris)
CS369/M6-109 Lab DOS on Apache Rev. 3 Deny Of Service (DOS): Apache HTTP web server DOS attack using PERL script Background (http://ha.ckers.org/slowloris) The ideal situation for many denial of service
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Maximizing Performance on Cognos, Workflow, and BDMS
Maximizing Performance on Cognos, Workflow, and BDMS System Configuration In order Cognos, Banner Document Management (ApplicationXtender), and Banner Workflow to work optimally, some initial configuration
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER XSS-BASED ABUSE OF BROWSER PASSWORD MANAGERS Ben Stock, Martin Johns, Sebastian Lekies Browser choices Full disclosure: Ben was an intern with Microsoft
Single Node Hadoop Cluster Setup
Single Node Hadoop Cluster Setup This document describes how to create Hadoop Single Node cluster in just 30 Minutes on Amazon EC2 cloud. You will learn following topics. Click Here to watch these steps
SQL Injection Attack Lab Using Collabtive
Laboratory for Computer Security Education 1 SQL Injection Attack Lab Using Collabtive (Web Application: Collabtive) Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document
Tutorial: Using HortonWorks Sandbox 2.3 on Amazon Web Services
Tutorial: Using HortonWorks Sandbox 2.3 on Amazon Web Services Sayed Hadi Hashemi Last update: August 28, 2015 1 Overview Welcome Before diving into Cloud Applications, we need to set up the environment
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Network Security, ISA 656, Angelos Stavrou. Snort Lab
Snort Lab Purpose: In this lab, we will explore a common free Intrusion Detection System called Snort. Snort was written initially for Linux/Unix, but most functionality is now available in Windows. In
Hands on Lab: Building a Virtual Machine and Uploading VM Images to the Cloud using Windows Azure Infrastructure Services
Hands on Lab: Building a Virtual Machine and Uploading VM Images to the Cloud using Windows Azure Infrastructure Services Windows Azure Infrastructure Services provides cloud based storage, virtual networks
Akita International University Online Application System. Usage Manual
Akita International University Online Application System Usage Manual Please Check the Following Before You Begin To Access the System: Ensure you are using one of the following Operating Systems (OS)
Dynamic DNS How-To Guide
Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Web attacks and security: SQL injection and cross-site scripting (XSS)
Web attacks and security: SQL injection and cross-site scripting (XSS) License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
WebCruiser Web Vulnerability Scanner User Guide
WebCruiser Web Vulnerability Scanner User Guide Content 1. Software Introduction...2 2. Key Features...3 2.1. POST Data Resend...3 2.2. Vulnerability Scanner...6 2.3. SQL Injection...8 2.3.1. POST SQL
Performing a Web Application Security Assessment
IBM Software Group Performing a Web Application Security Assessment 2007 IBM Corporation Coordinate the Time of the Audit Set up a time window with the application owner Inform your security team Inform
CPE111 COMPUTER EXPLORATION
CPE111 COMPUTER EXPLORATION BUILDING A WEB SERVER ASSIGNMENT You will create your own web application on your local web server in your newly installed Ubuntu Desktop on Oracle VM VirtualBox. This is a
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
What about MongoDB? can req.body.input 0; var date = new Date(); do {curdate = new Date();} while(curdate-date<10000)
Security What about MongoDB? Even though MongoDB doesn t use SQL, it can be vulnerable to injection attacks db.collection.find( {active: true, $where: function() { return obj.credits - obj.debits < req.body.input;
Lesson 7 - Website Administration
Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their
Preventing credit card numbers from escaping your network
Preventing credit card numbers from escaping your network The following recipe describes how to configure your FortiGate to use DLP (Data Loss Prevention) so that credit card numbers cannot be sent out
Moving Drupal to the Cloud: A step-by-step guide and reference document for hosting a Drupal web site on Amazon Web Services
Moving Drupal to the Cloud: A step-by-step guide and reference document for hosting a Drupal web site on Amazon Web Services MCN 2009: Cloud Computing Primer Workshop Charles Moad
Source Code Management for Continuous Integration and Deployment. Version 1.0 DO NOT DISTRIBUTE
Source Code Management for Continuous Integration and Deployment Version 1.0 Copyright 2013, 2014 Amazon Web Services, Inc. and its affiliates. All rights reserved. This work may not be reproduced or redistributed,
Edwin Analytics Getting Started Guide
Edwin Analytics Getting Started Guide This guide provides assistance for accessing and using Edwin Analytics, the Department of Elementary and Secondary Education s (ESE) online tool for expanding data
Eucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
owncloud Configuration and Usage Guide
owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,
Elastic Detector on Amazon Web Services (AWS) User Guide v5
Elastic Detector on Amazon Web Services (AWS) User Guide v5 This guide is intended for Elastic Detector users on AWS. Elastic Detector is available as SaaS or deployed as a virtual appliance through an
1. Building Testing Environment
The Practice of Web Application Penetration Testing 1. Building Testing Environment Intrusion of websites is illegal in many countries, so you cannot take other s web sites as your testing target. First,
CycleServer Grid Engine Support Install Guide. version 1.25
CycleServer Grid Engine Support Install Guide version 1.25 Contents CycleServer Grid Engine Guide 1 Administration 1 Requirements 1 Installation 1 Monitoring Additional OGS/SGE/etc Clusters 3 Monitoring
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Cloud Homework instructions for AWS default instance (Red Hat based)
Cloud Homework instructions for AWS default instance (Red Hat based) Automatic updates: Setting up automatic updates: by Manuel Corona $ sudo nano /etc/yum/yum-updatesd.conf Look for the line that says
Easy Setup Guide for the Sony Network Camera
-878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer
Connecting to HomeRun over the Web
(o HomeRun Integrated Clinical and Financial Homecare Software Connecting to HomeRun over the Web White Oak Systems, LLC 8 Research Parkway Wallingford, CT 06492 Phone: 866-679-7702 [email protected]
Cloudera Manager Training: Hands-On Exercises
201408 Cloudera Manager Training: Hands-On Exercises General Notes... 2 In- Class Preparation: Accessing Your Cluster... 3 Self- Study Preparation: Creating Your Cluster... 4 Hands- On Exercise: Working
Rstudio Server on Amazon EC2
Rstudio Server on Amazon EC2 Liad Shekel [email protected] June 2015 Liad Shekel Rstudio Server on Amazon EC2 1 / 72 Rstudio Server on Amazon EC2 Outline 1 Amazon Web Services (AWS) History Services
CASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu
PaperStream Connect Setup Guide Version 1.0.0.0 Copyright Fujitsu 2014 Contents Introduction to PaperStream Connect... 2 Setting up PaperStream Capture to Release to Cloud Services... 3 Selecting a Cloud
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy
Lab 7 - Exploitation 1 NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy Lab 7 - Exploitation 2 Item I. (What were you asked to do?) Metasploit Server Side Exploits Perform the exercises
Lucid Key Server v2 Installation Documentation. www.lucidcentral.org
Lucid Key Server v2 Installation Documentation Contents System Requirements...2 Web Server...3 Database Server...3 Java...3 Tomcat...3 Installation files...3 Creating the Database...3 Step 1: Create the
Secure Web Browsing in Public using Amazon
Technical White Paper jwgoerlich.us Secure Web Browsing in Public using Amazon J Wolfgang Goerlich Written July 2011 Updated August 2012 with instructions for Mac users by Scott Wrosch. Abstract The weary
IDS and Penetration Testing Lab III Snort Lab
IDS and Penetration Testing Lab III Snort Lab Purpose: In this lab, we will explore a common free Intrusion Detection System called Snort. Snort was written initially for Linux/Unix, but most functionality
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
USING CAMPUS ANYWARE OVER THE VPN (WINDOWS XP)
USING CAMPUS ANYWARE OVER THE VPN (WINDOWS XP) This document will explain how to install Campus Anyware on your machine (if needed), and how to run Campus Anyware from your machine while you are connected
How to configure the DBxtra Report Web Service on IIS (Internet Information Server)
How to configure the DBxtra Report Web Service on IIS (Internet Information Server) Table of Contents Install the DBxtra Report Web Service automatically... 2 Access the Report Web Service... 4 Verify
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Online Fuzzy-C-Means clustering
Online Fuzzy-C-Means clustering Authors: Author s Addresses: Contact: Dezső Kancsár, Ágnes B. Simon H-1157 Budapest, Nyírpalota u. 79/C 2/8; College of Nyíregyháza, Rákóczi út 69. [email protected], [email protected]
Lab 3.4.2: Managing a Web Server
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5
MICROSTRATEGY 9.3 Supplement Files Setup Transaction Services for Dashboard and App Developers
NOTE: You can use these instructions to configure instructor and student machines. Software Required Microsoft Access 2007, 2010 MicroStrategy 9.3 Microsoft SQL Server Express 2008 R2 (free from Microsoft)
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Cloud Backup Express
Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...
