” FIT 2093编程 写作、Web课程设计编程 辅导Monash UniversityFIT 2093 Introduction to Cyber SecurityAssignment 2: Web Hacking ChallengeIn this assignment, your goal is to do security testing of a mini web application to try find vulnerabilitiesin it using techniques covered in our Web security lecture, and exploit them to break the apps security.You can access the web application at the following URL: https://13.54.173.115/brokenapp.phpThis web app give access to registered members of a `Broken App group to access some informationcommon to the group members (provided using the PHP server script at brokenapp.php) as well aspersonal private information for each group member (via the script at brokenapp-personal.phpon the same domain).Visit the web application URL above using your web browser. If all is well, the browser should displaya page that looks like this:Tasks. Your task is to perform the following security tests on this web application.Part A: Personal Private Information Security TestIn this part, your aim is to do security testing of the personal private information part of the web app.For this, you are given member 1s password, namely:Ro4mvSemq45xfepvaEr24(1) Here, we consider an attack against member 1 by some outsider (non-member) attacker. Trylogging in with the given member 1 password, and examining that members private information.Based on the application behavior, where on this page could there be a possible point where areflected XSS vulnerability might exist? Why? Perform a test to see if an XSS vulnerability existsfor an attack against member 1, and explain your test, its results, and conclusion on why/why notsuch a vulnerability exists and can be exploited. (1 mark)FIT 2093作业 写作、Web课程设计作业 辅导(2) Test the application against an attacker who is one of the authorized group members, in particularthe member with ID number 1. Can that member gain unauthorized access to another memberspersonal private data? If so, explain the vulnerability you found and how member 1 can exploitit, show any private member data exposed by the attack, and briefly explain how the vulnerabilitycould be eliminated. In any case, explain the tests you did, the results, and your interpretation ofthem. (2 marks)Part B: Shared Group Private Information Security TestIn this part, your aim is to do security testing of the shared group private information part of the webapplication, from the point of view of an outsider (non-member) attacker trying to reveal the groupprivate information. Although you are not given the shared group password, you are given the php codefor the relevant script brokenapp.php (available for download on Moodle).(3) Look at the details in the brokenapp.php PHP script available on Moodle to see how userinput is read in from the users browser request and how the authentication check is performed.You should read the PHP documentation on the PHP functions used in the script, see https://php.net/manual/en/ and search for the relevant functions. The shared group password,whose cryptographic Hash is hard-coded in the script, was generated using the php function callpassword_hash(pwd, PASSWORD_DEFAULT),where pwd is the password to be hashed(note that the hash includes also a salt value generated at random). To help your security tests,you are also given a simple PHP script called password_hasher.php (the code is availableon Moodle, it can be run by pointing your browser to https://13.54.173.115/password_hasher.php ;alternatively, you could run it by copying it into the web server folder /var/www/html/ ofyour FIT2093 Ubuntu-64 VM and then pointing your VM Firefox browser to https://localhost/password_hasher.php ). The script takes an input password from a user anddisplays its hash value (generated using the php function call above) when the user clicks thesmall button below the text box.Using the above information/tools, attempt to identify a vulnerability in brokenapp.php. Ifyou found a vulnerability, explain how it can be exploited, provide any secret informationrevealed, and briefly explain how the brokenapp.php code could be modified to eliminatethis vulnerability. In any case, explain what tests you did, the results, and your interpretation ofthem. (2 marks)Note: You should assume the attacker will NOT have any network eavesdropping/modification access(the current web application under test is running on an unencrypted https connection, but to protectagainst network Eavesdropping/modification will be implemented over an encrypted httpss connection inthe final production version).SubmissionSubmit a report consisting Of your answers to tasks (1), (2), (3). You may include screen shots and anycode used to solve each part of the task. The page limit for the report is 5 pages.Upload the file in PDF format on Moodle by 11:59pm GMT, Sunday 21 June, 2020.The 5 marks full grade allocated for this assignment will be distributed among the tasks as indicatedabove. For each of those tasks, 80% of the marks will be based on correctness of the vulnerabilityidentification and/or exploitation technique (as appropriate) and the remaining 20% to the written answereditorial quality (clarity, accuracy, style).IMPORTANT: This is an INDIVIDUAL assignment for students to complete on their own. You MUSTNOT work with any other student (or person) on this assignment.如有需要,请加QQ:99515681 或邮箱:99515681@qq.com
“
添加老师微信回复‘’官网 辅导‘’获取专业老师帮助,或点击联系老师1对1在线指导。