...Week 3 Lab Part 1: Web and Database Attacks & Malware and Malicious Software Learning Objectives and Outcomes Upon completing this lab, students will be able to: * Identify web application and web server backend database vulnerabilities as viable attack vectors * Develop an attack plan to compromise and exploit a web site using cross-site scripting (XSS) against sample vulnerable web applications * Conduct a manual Cross-site Scripting (XSS) attack against sample vulnerable web applications * Perform SQL injection attacks against sample vulnerable web applications with e-commerce data entry fields * Mitigate known web application and web server vulnerabilities with security countermeasures to eliminate risk from compromise and exploitation Overview This Lab will demonstrate a Cross-site Scripting (XSS) exploit and an SQL Injection attack on the test bed web application and web server using the Damn Vulnerable Web App (DVWA) loaded on an Apache Web Server on “TargetUbuntu01” Linux VM server. They will first identify the IP target host, identify known vulnerabilities and exploits, and then attack the web application and web server using XSS and an SQL Injection to exploit the web application using a web browser and some simple command strings. Assignment Requirements Watch the Demo Lab in Learning Space Unit 5 and then answer questions 1-10 below. Lab Assessment Questions & Answers 1. Why is it critical...
Words: 1054 - Pages: 5
...What are 4 security measures that can be implemented to restrict access to a computer? 1. Something the user knows 2. Something the user has 3. Something the user is 4. Something the user does What advantage does a wired network have over a wireless network in terms of security? The advantage that a wired network has over a wireless is that they do not have to worry about the network working properly and taking the time to troubleshoot. What is WPA and how can it help your wireless network’s security? WPA (Wi-Fi Protected Access) is a secure network versus the WEP (Wireless Equivalent Privacy). It supports a key length from 8 up to 63 alphanumeric characters or 64 hex characters, and supports the use of a RADIUS authentication server in corporate environments. What is the difference between a MAC address and an SSID? It is the serial number of the device and an SSID is the ID for your WIFI connection. Write a complex password and explain why it is a good password. d@wu4bw is a good password because it is 7 characteristics, there isn’t a word in this password, and it has a special character in the password and has a number. What is the purpose of a firewall? It is to protect in bound threats or against unauthorized inbound and outbound traffic. Describe each of the following malware. Spyware- Software that spies on system activities and transmits details of Web searches or other activities to remote computers. Adware-Software that displays pop-up...
Words: 584 - Pages: 3
...Today we will come to understand how to find, interpret, and explain the materials released by major antivirus vendors about new malware threats. In addition we will show how you will be able to document the malware lifecycle; in addition to explaining the threats that the malware creates both at the current time and how they may change. One of the sites that we have taken a look at is McAfee.com, the portion of information we are looking at today is the virus definition, what it is a how it will affect you the consumer. One virus we will be looking at will be RDN/BackDoor-FBSA!a!EFA0D651938C. This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc. The indication of having this infection would mean your machine would have the files, registry, and network communication referenced in the characteristics section. However not to worry the following is a plan of attack as per instructions of McAfee: Please use the following instructions for all supported versions of Windows: 1. Disable Windows System Restore. For instructions, please refer to: http://www.mcafee.com/us/downloads/free-tools/disabling-system-restore...
Words: 772 - Pages: 4
...follows • Malware • Malicious software • Unprecedented of Spam Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software, and other malicious programs; the majority of active malware threats are usually worms or trojans rather than viruses. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. States. Malware is different from defective software, which is a legitimate software but contains harmful bugs that were not corrected before release. However, some malware is disguised as genuine software, and may come from an official company website in the form of a useful or attractive program which has the harmful malware embedded in it along with additional tracking software that gathers marketing statistics. Software such as anti-virus, anti-malware, and firewalls are relied upon by users at home, small and large organizations around the globe to safeguard against malware attacks which helps in identifying and preventing the further spread of malware in the network. 2) In what ways has...
Words: 830 - Pages: 4
...Removing Malware: Tools and Techniques Devan A. Dunham American Military University, ISSC342, Instructor Peter Mylonakos In the digital world, there are many tools and techniques to harm your computer, but there are also the same for protecting your computer as well. Malware, or malicious software, is software that is intended to damage or disable computers and computer systems. It is very dynamic and can be hard to detect sometimes because it may disguise itself as something that should be running on your computer. For example, after installing a program, Jim doesn’t realize that the executable file he downloaded was infected with malware named “Wajam” but disguised itself as “Software Updater” under Control Panel. It ran in the background and updated itself automatically without Jim’s knowledge. So how would Jim detect and remove this virus? First, Jim should always be aware what is running on his computer. On Windows machines specifically, opening the Task Manager and taking a quick look at processes will give the user a good outlook on what is running on the computer. Users should look for anything suspicious or unknown processes and do further research upon discovering them. Another simplified way to discover malware is to use an anti-virus program. There are many available to users and doing a quick internet search will yield thousands of programs, but sticking with reputable programs will serve its purposes. Scanning for malware and other viruses is as simple as click...
Words: 579 - Pages: 3
...Malware: Evil Software Malicious software, or Malware for short, is designed to access computer systems secretly without the owner’s knowledge or consent. Malware is a general term used by professionals in the computer industry to describe a variety of hostile, invasive, or aggravating software programs. Software is considered to be malware based on the suspected intentions of the designer rather than any particular features the software may or may not have. Malware, also known as computer containment, has grown to include computer viruses, worms, Trojan horses, spyware, dishonest adware, crimeware, and other malicious and unwanted software programs. Symantec published in 2008 that “the release rate of malicious codes and other unwanted programs may be exceeding that of legitimate software applications”. According to F-Secure, “As much malware was produced during 2007 as in the previous 20 years altogether.” Malware has become the most common pathway on the Internet for criminals to access users: especially through e-mail and the World Wide Web. The frequency of malware use for organized Internet crime, along with the inability of anti-malware protection products to protect against the incessant stream of newly produced malware, has encouraged a new mind-frame for business owners who operate on the Internet. Business owners acknowledge that a large percent of Internet customers will always be infected for one reason or another, and they need to continue doing business...
Words: 1653 - Pages: 7
...in which millions of credit cards and customer personal information was stolen by malware that was installed onto their network. This information was to be sold on the black market to others for their illegal use. Target Corporation was indeed made aware that there was some peculiar activity within the network before the information was stolen. Their million dollar malware software, monitored by FireEye, picked up on the attack several days before any information was removed from the Target Corporation servers. Target Corporation could have easily prevented the majority of the attack and reduced if not eliminated the amount of credit cards and personal information that was stolen. The fact that Target Corporation was warned of the initial breach, as well as an additional breach, and did not respond for two weeks is unfathomable and unethical. The Target Corporation has a duty to secure any and all credit card and personal information that they collect from their customers. I believe that in this case Target Corporation did not act accordingly and should be held liable. Target Corporations lack of response and inability to take action goes against all ethics and how the situation should have been handled. Target Security Breach In mid 2013 Target Corporation hired a security firm, FireEye, to install a malware detection tool and monitor their network. This malware detection tool was estimated to cost around $1.6 million (Businessweek.com) and seemed...
Words: 2925 - Pages: 12
...Antivirus is used to detect and remove virus in a computer, smartphones, tablets and other technical devices. Before knowing about the antivirus lets first study why antivirus is use and how it is used and what it is. Now the first question arise is what is the need to use antivirus so the answer is computer virus yes because of computer virus we use antivirus. A computer virus is a mischievous computer program. It enters in the computer without the permission or without the knowledge of user and even run without the permission of user in the computer. Computer virus are very dangerous and mischievous that they automatically copy the date and pasted it to memory over memory its transferring power is to much that it copy the data over network and network very quickly it sometime damage the computer program also computer virus is too dangerous it can create lots of loss to the user. The user who don’t pay attention to the virus and don’t listen about it it’s a great mistake they are doing. The person who are working on the computer whether the small work or the big should have the knowledge of computer virus. Virus is like our enemy and pre protection from enemy is good. And to protect computer from virus antivirus is use. Virus are off different type boot sector virus, macro...
Words: 1444 - Pages: 6
...Maryam Ahmadi CIM 220 Section B Professor Ali Niknam March 20, 2015 IBM Zone Trusted Information Channel (ZTIC) 1. What are some common types of malicious software, or malware? What best describes the ‘man-in-the-middle’ type attack? * The common types of malicious software or malware are adware, bot, bug, ransomware, rootkit, spyware, Trojan horse, virus, and worm. A ‘man in the middle attack’ is one in which the attacker intercepts messages in a public key exchange and then retransmits them, substituting his own public key for the requested one, so that the two original parties still appear to be communicating with each other. 2. Provide some examples of each type of authentication factor. What are your personal experiences with each? * Personal factor is a personal question that may be used to recover passwords. An authentication factor is a piece of information or process used to verify the identity of a person requesting access to a restricted asset or area. I have never encountered this personal experience in my life thus far with using technology. 3. Can you think of any drawbacks of the ZTIC device? * The drawbacks that the ZTIC device would be a transaction is initiated on a computer with malware installed, the security of the transaction is compromised. Not even a padlocked areas of the internet that would otherwise be secure can protect against this. 4. How might malicious attackers try to get around devices like the ZTIC? *...
Words: 475 - Pages: 2
...Identifying Types of Malware Infection 1) You notice that your computer is getting slower each day. You have terminated unneeded programs, disabled unneeded services, and have recently defragmented the disks. Your computer has plenty of memory but it still seems slow. Since it only started getting slow within the last two weeks, you suspect a malware attack. You have carefully examined each of the programs running but there are no unusual programs. However, you do notice that there is substantial disk activity, even when no programs are running that should be using the disk. What kind of malware do you think is present in your computer? Rootkit and likely another type of malware – Closing all programs and still seeing disk usage would suggest that a rootkit has installed and is actively hiding the actual program running. The rootkit would hide the program while a virus or worm is likely behind the scenes wreaking havoc. 2) You download a new program to display the current weather on your desktop. Since you installed the weather application you noticed a lot of network activity and your computer is getting slow. When you terminate the weather application your computer speeds up. What kind of malware do you think is present in your computer? Trojan Horse – Acting as a useful program, it actually infects and runs amuck inside of the pc and network. 3) Within a week after ordering a new widescreen television (TV) from an online retailer, you start getting many email...
Words: 407 - Pages: 2
...Computer Security: Worms and viruses Nowadays, in the domain of computer sciences, there is a big problem to face: Worms and viruses. Being in the technology is a good thing, but being n the technology without knowing how to avoid the consequences of the technology is worse. Viruses and worms affect the computer and damage, or in other words corrupt some files that are important to the good functioning of the computer. Viruses have many ways of penetration that computers user ignore, and that’s what makes the damage even more severe. First of all, let’s start by defining a viruses and a worm. A virus is a malware program (not a computer program), that auto run, and replicates by adding copies of their code into other computer program, any other type of data that it comes across. This will create an overall corruption of your database and your computer. In reality, there are three categories of computer infections malwares and we defined the first one which is viruses. The two second malwares are worms and Trojan horses. In a questions of codes or designs they are all similar, but the differences come in the way these three categories act. Contrarily to viruses that need a human action to spread, such as sharing files, running an infected program, and so on, worms have the ability to auto spread themselves, which mean that they don’t require the action of a human. They can travel by themselves by taking advantages on files and other information’s that runs through the system. A Trojan...
Words: 1076 - Pages: 5
...can be vulnerable to malware. Vulnerabilities differ depending on how the computer or device is used and what software is installed. For each of the scenarios below, select the most likely type of malware that is present on the computer or device. Select from: a. Virus b. Worm c. Trojan horse d. Rootkit e. Spyware Suspected malware scenarios: d 1. You notice that your computer is getting slower each day. You have terminated unneeded programs, disabled unneeded services, and have recently defragmented the disks. Your computer has plenty of memory but it still seems slow. Since it only started getting slow within the last two weeks—you suspect malware. You have carefully examined each of the programs running but there are no unusual programs. However, you do notice that there is a substantial disk activity, even when no programs are running that should be using the disk. What kind of malware do you think is present in your computer? c 2. You downloaded a new program to display the current weather on your desktop. Since you installed the weather application, you noticed a lot of network activity, and your computer is getting slow. When you terminate the weather application your computer speeds up. What kind of malware do you think is present in your computer? e 3. Within a week after ordering a new widescreen television (TV) from an online retailer, you start getting many e-mail messages advertising products related to TVs. What kind of malware do you think is present...
Words: 319 - Pages: 2
...ask? In the form of malware that is targeting your financial institutions. Though, the machines creating this malware do not have to target the institution, rather your Internet browser. By changing what you see in the browser, the attackers now have the ability to steal any information that you enter and display whatever they choose. This has become known as the Man-in-the-Browser (MITB) attack. AD Copyright SANS Institute Author Retains Full Rights Analyzing Man in the Browser Attacks | 1 Analyzing Man-in-the-Browser (MITB) Attacks GIAC (GCFA) Gold Certification Author: Chris Cain, cicain08@gmail.com Advisor: Dominicus Adriyanto Accepted: December 22nd 2014 Abstract The Matrix is real and living inside your browser. How do you ask? In the form of malware that is targeting your financial institutions. Though, the machines creating this malware don’t have to target the institution, rather your Internet browser. By changing what you see in the browser, the attackers now have the ability to steal any information that you enter and display whatever they choose. This has become known as the Man-in-the-Browser (MITB) attack. No one is safe from a MITB once it is installed, which easily bypasses the security mechanisms we all rely on. By infecting the browser and changing what is displayed we now have to wonder what world we are living in? Take the Red Pill and learn how this attack occurs to better allow you to hide from malware that target us every...
Words: 5973 - Pages: 24
...Chapter 8 Securing Information Systems Case 1: IBM Zone Trusted Information Channel (ZTIC) Tags: Malware; personal banking applications; hardware security solutions. Summary: More and more attacks to online banking applications target the user's home PC, changing what is displayed to the user, while logging and altering key strokes. In order to foil these threats, the IBM Zurich Research Lab has introduced the Zone Trusted Information Channel (ZTIC), a hardware device that can counter these attacks in an easy-to-use way. L= 3:07. URL: http://www.youtube.com/watch?v=mPZrkeHMDJ8 Case Online banking is growing in popularity due to its convenience and ease of use. However, as with any transactions that take place over the Internet, online banking transmissions are vulnerable to various forms of malicious attacks. Although phishing is still a common method hackers use to commit bank fraud, another method that is difficult to combat is a 'man-in-the-middle' attack, referred to in the video as a 'manin-the-browser' attack. Banking transactions are traditionally conducted via two-factor authentication (T-FA). An authentication factor is a piece of information or process used to authenticate or verify a person's identity or other entity requesting access under security constraints. Two-factor authentication is a system in which two different factors are used in conjunction to authenticate. Authentication factors are classified into three groups: human factors (biometrics, for example...
Words: 748 - Pages: 3
...TRADITIONAL SECURITY SOLUTIONS ARE NOT ENOUGH Your current security measures only solve part of the problem. They are focused on detecting malware, but advanced attacks now rely on sophisticated techniques that go beyond malware. YOUR SECURITY SYSTEMS CAN’T STOP WHAT THEY CAN’T SEE. WHY CURRENT TECHNIQUES ARE FAILING: Traditional approaches only address the 40 percent of breaches that use malware They don’t enable proactive hunting to find and block adversary activity Most security tools only address part of the cyber ‘kill-chain’ When existing approaches fail, they provide no visibility, resulting in ‘silent failure’ IT’S TIME FOR A NEW APPROACH FALCON: THE BREACH PREVENTION PLATFORM Cloud Delivered NEXT-GEN AV EDR MANAGED HUNTING Continous Breach Prevention CrowdStrike has revolutionized endpoint protection by combining three crucial elements: next-gen AV, endpoint detection and response (EDR), and a 24/7 - managed hunting service — all powered by intelligence and uniquely delivered via the cloud in a single integrated solution. Falcon uses the patented CrowdStrike Threat Graph™ to analyze and correlate billions of events in real time, providing continous breach prevention and five-second visibility across all endpoints. WHY CROWDSTRIKE? Prevent Attacks – Both Malware and Malware-free – that Your Existing Security Tools Can’t Stop 5-Second Visibility to Discover and Investigate Current and Historic Endpoint Activity ...
Words: 535 - Pages: 3