Fill in order details

  • Submit your instructions
    to writers for free!

Chat with the writer

  • Chat with preferred expert writers
  • Request a preview of your paper
    from them for free

Editing

  • Project edited by the quality evaluation department

Download Your Completed Project

  • Download the completed project from your account or have it sent to your email address

Research a recent website intrusion. Describe the

Website Vulnerability Assessment

Websites are the most vulnerable services on an organization’s network. Performing a vulnerability assessment on these services is critical. Often a compromised website/server is the perfect jumping off point for an attacker to pivot into the rest of a network.

  1. Using GCU Approved Virtualization Solution and BurpSuite or other website vulnerability assessment tool available in Kali Linux, perform a website vulnerability assessment on the Metasploitable 2 VM.
  2. Document findings under Phase Testing in the “PEN Testing Report Guidelines,” located in the Course Materials. Refer to the SANS Institute industry-standard “Writing a Penetration Testing Report,” for examples of PEN Testing Report.
  3. Append this assignment to the PEN testing report and resubmit the report (Passive Corporate Recon + Automating Information RECON + NMap Scan + Vulnerability Assessment + Applied Exploitation using Metasploit + Custom Payload + Website Vulnerability Assessment).

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

SQL Injection

Databases are the engines behind the information age, from keeping track of your users to tracking millions of products for online retail websites. Structured Query Language (SQL) is the most common language of databases. Not all databases are developed with security in mind and may have input validation issues, which makes them the perfect target for an attacker.

  1. Follow the “Pentester Lab: From SQL injection to Shell,” found in the Course Materials, as a guide.
  2. Using GCU Approved Virtualization Solution and ” SQL Injection to Shell,” VM from Vulnhub, perform an SQL recon and injection.
  3. Document findings under Phase Testing in the “PEN Testing Report Guidelines,” located in the Course Materials. Refer to the SANS Institute industry-standard “Writing a Penetration Testing Report,” for examples of PEN Testing Report.
  4. Append this assignment to the PEN testing report and resubmit the report (Passive Corporate Recon + Automating Information RECON + NMap Scan + Vulnerability Assessment + Applied Exploitation using Metasploit + Custom Payload + Website Vulnerability Assessment + SQL Injection).

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

Topic 5 DQ 1

Research a recent website intrusion. Describe the intrusion, the vulnerabilities, and the tools that the attacker used. How can understanding this type of attack be beneficial to the security practitioner? What kind of defensive measures can you take to avoid website exploitation?

What our customers say
_____

error: Content is protected !!