网络安全|COMP60015 NETWORK AND WEB SECURITY
这是一个英国的网络与网络安全限时测试代写
a i) Briefly describe the SQL injection, Command injection and Remote file
 inclusion vulnerabilities. Specify what capabilities each vulnerability
 provides to an attacker when it is exploited on a given server.
ii) Suppose you are not allowed to access the code of a web application
 deployed on a server. Explain how you could use an Intrusion Detection
 System (IDS) to mitigate the 3 vulnerabilities from section (a.i). Discuss
 specific limitations of this approach relevant to the vulnerabilities
 considered here.
b You are tasked with a black-box pentesting exercise against cybersec.fun. The
 rules of engagement specify that: you should not use automated tools; you
 should not attempt to modify data on the server; you should not cause denial of
 service on the server. The goal is to demonstrate access to a hidden database.
i) Gather information about cybersec.fun, and find the URL for a web page
 that provides access to the hidden database. Report the flag that you see
 displayed on that page. Briefly describe the steps taken.
ii) Use SQL injection to read the secret of the record with id = 331 from the
 items table of the database. Report the secret value as a flag. Briefly
 describe the steps taken.
iii) Find a way to login as database administrator, and report the flag you
 discover when you manage to do so. Briefly describe the steps taken.
The two parts carry equal marks.
a i) The file ssl-access.log contains web logs from a server. Identify 3
 malicious entries. For each entry, describe the attack attempt and propose
 the mitigation to be deployed in the server-side code of the web application
 itself that you consider most effective and relevant, justifying your answer.
b In this part you analyse malicious scripts and websites. These are realistic
 examples but are designed not to cause any harm or other side effect to your
 computer.
i) Download the obfuscated JavaScript malware sample jquery-v331.js.
 Identify what kind of attack it is trying to perform, and report the flag you
 discover in the process.
ii) You are tasked to analyse the malicious website nah.fun. The site uses the
 browser of innocent visitors to attack a third party server. Analyse the
 attack, with the goal of tricking the attacker into thinking that the attack
 was successful. Report the 2 flags that you discover during this process,
 and briefly describe the steps you have taken.
The two parts carry, respectively, 60% and 40% of the marks.
