首页 > 其他分享 >FIT5003 Software Security

FIT5003 Software Security

时间:2024-09-18 12:15:08浏览次数:1  
标签:monash FIT5003 Marks video edu report Security your Software

FIT5003 Software Security Assignment-2 (S2 2024)

Total Marks 100

Due on Oct 4th, 2024, Friday midnight, 11:55:00 pm

1 Overview

The primary learning objective of this assignment is to provide you with firsthand experience in exploiting SQL Injection, Cross-site Scripting and Cross-site Request Forgery vulnerabilities.  Additionally, it aims to deepen your understanding of these vulnerabilities.  This assessment does not require a specific virtual machine (VM) and can be executed on any operating system.  You can utilize the same setup as the Lab07 and Lab08.

Submission

You will need to submit a report (one single PDF file).  Typeset your report into  .pdf format (make sure it can be opened with Adobe Reader) and name it as the format: [Your Name]-[Student ID]-FIT5003- Assignment.pdf.

All payloads, if required, should be embedded in your report.  In addition, if a demonstration video is required, you should record your screen demonstration with your voice explanation and upload the video to your Monash Google Drive or any online service which allows you to share videos.  The shared URL of the video should be mentioned in your report wherever required. You can use this free tool to make the video:https://monash-panopto.aarnet.edu.au/ ; other tools, such as Zoom, are also fine.

Important notes and penalties:

•  It is the student’s responsibility to ensure that the video content is accessible to the teaching staff. Failure to provide accessible video will result in the relevant task being assessed without consideration of the video.

•  A part of the submitted video (at a corner) must clearly show your face at all times.  Penalties may apply when that’s not the case.

• Video demonstration should be a live exploitation of the vulnerabilities.

•  Late submissions incur a 10-point deduction per day.  For example, if you submit 2 days and 1 hour late, that incurs 30-point deduction. Submissions more than 7 days late will receive a zero mark.

•  If you require extension or special 代 写FIT5003 Software Security consideration, refer to https://www.monash.edu/students/ admin/assessments/extensions-special-consideration. No teaching team mem-ber is allowed to give you extension or special consideration, so please do not reach out to a teaching team member about this. Follow the guidelines in the aforementioned link.

•  The maximum allowed duration for the recorded video is 15 mins in total.  Therefore, only the first 15:00 mins of your submitted video will be marked. Any exceeding video components will be ignored.

•  If your device does not have a camera (or for whatever reason you can’t use your device), you can borrow a device from Monash Connect or Library.  It’s your responsibility to plan ahead for this. Monash Connect or Library not having available devices for loan at a particular point in time is not a valid excuse.

•  You can create multiple video parts at different times, and combine and submit a single video at the end. Make sure that the final video is clear and understandable.

•  You can do (online) research in advance, take notes and make use of them during your video recording. You may also prepare exploit scripts in advance. But you cannot simply copy-paste commands to carry out the tasks without any explanations.  Explanations (of what the code does) while completing the tasks are particularly important.

•  Zero tolerance on plagiarism and academic integrity violations: If you are found cheating, penalties  will apply, e.g., a zero grade for the unit. The demonstration video is also used to detect/avoid plagia-  rism. University policies can be found at https://www.monash.edu/students/academic/ policies/academic-integrity.

Web Application Vulnerabilities

Q1:  Complete three labs from PortSwigger Labs, one from SQL Injection, one from Cross-Site Scripting, and one from Cross-Site Request Forgery section. Please select labs designated as PRAC- TITIONER or EXPERT; APPRENTICE labs will not be accepted.  You are permitted to utilize the solutions and demonstrations available on the PortSwigger website for assistance.  However, please do not copy walkthroughs from the PortSwigger website.  Your solution should include the logical steps that lead to the exploitation, which may not be covered in the walkthroughs on the PortSwigger website. [60 Marks]

Record a video and write a report to answer the following questions for each lab.  At the beginning of each lab recording, please state your name, student ID, and the name of the lab you are solving; no marks can be awarded without this information.

1.  How did you identify the vulnerability? (5 Marks)

2.  Which payload was chosen for exploitation and why? (5 Marks)

3.  What an attacker could achieve using the vulnerability? (5 Marks)

4.  How the vulnerability can be mitigated? (theoretically, no demonstration is required) (5 Marks)

The video submission must demonstrate solving the lab, addressing the questions outlined above. In case time runs short during the video, you may use the report to address any unanswered ques- tions, making references to relevant sections of the video.  However, it is important that the video includes, at a minimum, a demonstration of the lab. The report does not need to be in detail, it should briefly address the mentioned questions,i.e. it can contain one or two-line answer for each question, payloads, important screenshots (if necessary) and the video link(s).  The marks mentioned above are for the videos and report combined. The word limit for each sub-question is 200 words, i.e. maximum 800 words are allowed for Q1 per lab.

Q2:  Download the Q2 .html file from Moodle.   Assume you are browsing monash.edu, and it  is hypothetically vulnerable to various web attacks (although it is not).  While  navigating monash .edu, assume you open another tab in the same browser, and visit attacker .com (as- suming attacker convinced you to do that).  You click the Submit button on the attacker .com webpage, which contains Q2 .html, initiating attacks on monash .edu. Examine Q2 .html (you can open the file in the browser and intercept the request in BurpSuite if desired) and respond to the following questions. No video is required for this question. The word limit for each sub-question is 200 words, i.e. maximum 600 words are allowed for Q2. [20 Marks]

1.  Which vulnerability/vulnerabilities attacker .com is trying to exploit on monash .edu? (please explain the scenario outlining how this exploitation could occur) (10 Marks)

2.  If successful, what is the consequence of the attack(s)? (5 Marks)

3.  What mitigation(s) would you suggest for monash .edu to counter attack(s) launched by attacker.com? (5 Marks)

Note: The parameter values in the HTML file are URL encoded.

Q3: Assume you visit monash .edu and it tries to talk to lms .monash .edu, the browser issues an OPTIONS method to lms .monash .edu and gets a response, below is the HTTP request and its response:

OPTIONS  /doc  HTTP/1 . 1 Host:  lms .monash .edu

User-Agent:  Mozilla/5 . 0   (Macintosh;  Intel  Mac  OS  X  10 . 14;  rv:71 . 0) Accept:  text/html,application/xhtml+xml,application/xml

Accept-Language:  en-us,en;q=0 .5 Accept-Encoding:  gzip,deflate

Connection:  keep-alive

Origin:  monash .edu

Access-Control-Request-Method:  POST

Access-Control-Request-Headers:  x-requested-with

HTTP/1 . 1  204  No  Content

Date:  Mon,  01  Dec  2008  01:15:39  GMT Server:  Apache/2

Access-Control-Allow-Origin:  *

Access-Control-Allow-Methods:  POST,  GET,  OPTIONS Access-Control-Allow-Headers:  x-requested-with

Access-Control-Allow-Credentials:  true

Access-Control-Max-Age:  86400   Vary:  Accept-Encoding,  Origin   Keep-Alive:  timeout=2,  max=100 Connection:  Keep-Alive

Explain the Cross-Origin Resource Sharing (CORS) HTTP headers in the above HTTP request and response. Would browser change future requests based on the above HTTP response? No video is required for this question. The word limit for Qis 300 words. [10 Marks]

Report Completion and Quality of Presentation [10 Marks]

Marks are allocated to the quality and clarity of presentation in the report and the video.

 

标签:monash,FIT5003,Marks,video,edu,report,Security,your,Software
From: https://www.cnblogs.com/qq---99515681/p/18418215

相关文章

  • 48730-32548, Cyber Security
    48730-32548,CyberSecurityWeek-6LabdesignedbyAshishNanda,basedondocuments“SEEDLabs”providedbyWenliangDu,SyracuseUniversity1UnderstandingTCP/IPbasedAttacksContinuedLabEnvironmentSetupYouneedtofollowtheLab-4(Week5)virtu......
  • 159.251 - Software Design and Construction
    MasseyUniversity159.251-SoftwareDesignandConstructionAssignment1DeadlineandLateSubmissionPenaltiesYoumustsubmityourfinalworkusingthestreamsubmissionsystemnolaterthan9October2024at11.59pm.Thepenaltyis20%deductedfromt......
  • SpringSecurity初学总结
    springSecurity安全框架   基于Java的安全框架主要有:SpringSecurity和Shiro   介绍基础概念      安全框架是对用户访问权限的控制,保证应用的安全性。         其主要的工作是用户认证和用户授权|鉴权      主要应用于Spri......
  • 安全:modsecurity加ip白名单
    一,创建目录和文件,并添加规则1,创建目录和文件[root@blogmodsecurity]#mkdircustom_rules[root@blogmodsecurity]#cdcustom_rules/[root@blogcustom_rules]#viipwhitelist.conf命令的内容:[root@blogcustom_rules]#moreipwhitelist.confSecRuleREMOTE_ADDR"@......
  • SpringSecurity原理解析(二):认证流程
    1、SpringSecurity认证流程包含哪几个子流程?   1)账号验证   2)密码验证   3)记住我—>Cookie记录   4)登录成功—>页面跳转2、UsernamePasswordAuthenticationFilter   在SpringSecurity中处理认证逻辑是在UsernamePasswordAuthenticationFilter这个过......
  • SpringSecurity原理解析(二):认证流程
    1、SpringSecurity认证流程包含哪几个子流程?   1)账号验证   2)密码验证   3)记住我—>Cookie记录   4)登录成功—>页面跳转2、UsernamePasswordAuthenticationFilter   在SpringSecurity中处理认证逻辑是在UsernamePasswordAuthenticationFilter这个过......
  • COMPSCI 316: Cyber Security
    Assignment1COMPSCI316:CyberSecurity,Semester2,2024Thisassignmentisworth100marks.Theweightofthisassignmentis10%ofthecourse.ThedeadlinetosubmitthisassignmentisFriday,September13,23:59hrsNZTime.Nolatesubmissionsarea......
  • 48730-32548, Cyber Security
    48730-32548,CyberSecurityWeek-5Thelabisbasedondocuments“SEEDLabs”providedbyWenliangDu,SyracuseUniversityUnderstandingTCP/IPbasedAttacksLabOverviewThelearningobjectiveofthislabistogainfirst-handexperienceonTCP/IPvuln......
  • Spring Security 4大核心架构图与21种安全验证策略场景分析
    一、SpringSecurity架构设计图二、SpringSecurity架构流程设计图三、SpringSecurity4大架构模块图四、21种安全验证策略原创Solomon肖哥弹架构SpringSecurity是一个功能强大且高度可定制的Java安全框架,用于保护基于Spring的应用程序。它提供全面的安全......
  • IBM AI Developer 专业证书专项课程-Introduction to Software Engineering-Unit2-前
    前端网站开发前端开发简介用户交互:用户在浏览在线购物网站时,主要与网站的前端进行交互。这包括浏览不同的页面、选择不同的产品类别、比较产品等活动。前端的作用:前端是用户直接接触的部分,它决定了用户如何与网站或应用进行交互,以及他们的视觉体验。网站开发基础HTML(Hyp......