Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: November 30th, 2021

Demonstrate your knowledge of testing security controls aligned with

Note: RECOMMENDED ONLY TO A CYBER SECURITY TUTOR IN THIS FIELD PERIOD. PLEASE …READ THE ASSIGNMENT FULLY BEFORE CONTACTING ME!

Using the readings from weeks 7 and 8 as a baseline, analyze, test and document the results for the tutoring web application found on the SDEV virtual machine. ( I PREFER USING YOUR OWN VM HERE CAUSE I WOULDN’T SHARE PERSONAL INFO) Use both manual means and automated tools (e.g., ZAP). The latter will enable you to discover more information than a cursory manual examination. Specific tests to be conducted include: 

1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)      What is the importance of testing for this vulnerability?  How many occurrences of the vulnerability did an automated scan discover?  What is your recommendation to address any issues?  Can you place a simple JavaScript alert (e.g., DeleteSession.php as an example)? 

2. Testing for Stored Cross site scripting (OTG-INPVAL-002) 

 

 What is the importance of testing for this vulnerability?   What happens when you attempt to add a pop-up window (e.g., <script>alert(document.cookie)</script>) to the email input field within the “index.html” field?  Can you introduce Stored Cross site scripting? 

3. Testing for SQL Injection (OTG-INPVAL-005)   Did your manual and automated testing discover any SQL Injection vulnerabilities – if so, how many? (Note: There should be at least one occurrence).  Name two or more steps you can take according to the reading to resolve the issue.  Fix and test at least one occurrence of the vulnerabilities – displaying your resulting source code and output results. 

 

4. Testing for Code Injection (OTG-INPVAL-012)   What is the importance of testing for this vulnerability?   What are at least two measures you can take to remediate this issue?  Can you input some simple html code or exploit Remote File Inclusion (RFI)? 

  

 

5. Test business logic data validation (OTG-BUSLOGIC-001)  

 What are at least two examples of business logic errors? This could be from various input forms or areas you discovered in previous HW assignments.  How can you mitigate against such errors? 

 6. Test integrity checks (OTG-BUSLOGIC-003)   Do Drop down menus exist and are they sufficient for the application? Why does the use of drop-down menus help mitigate against this risk?  Does your manual or automated scan reveal the use of password “AUTOCOMPLETE”? What issue, if any, does the use of AUTOCOMPLETE pose? 

7. Test defenses against application misuse (OTG-BUSLOGIC-007) 

  What is the importance of testing for this vulnerability?   Can adding additional characters in input fields cause unexpected results? Verify for at least two instances. 

General Guidelines 

You should document the results for the tests, your comments, and recommendations for improved security for each security control tested in a word or PDF document. The format of your document should be the format that is recommended in chapter 5 of the OWASP testing guide. Provide screen captures and descriptions of your tests conducted. Discuss any issues found and possible mitigations. 

 Deliverables: 

 

You should submit your document by the due date. Your document should be well-organized, use the OWASP recommended reporting format, include all references used and contain minimal spelling and grammar errors. 

MUST FOLLOW THE ATTACHED ~ Hire our professional writers now and experience the best assignment help online with our custom paper writing service. We ensure your essays and assignments are expertly researched, written and delivered on time. ~ Grading RUBRIC: 

Order | Check Discount

Paper Writing Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Professional Writers

We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing

Discounted Prices

Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.

AI & Plagiarism-Free

Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.

How it works

When you decide to place an order with Nurscola, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.