首页
网站开发
桌面应用
管理软件
微信开发
App开发
嵌入式软件
工具软件
数据采集与分析
其他
首页
>
> 详细
代做 FIT3173、代写 SQL 编程设计
项目预算:
开发周期:
发布时间:
要求地区:
FIT3173 Software Security Assignment-2 (S1 2025)
Total Marks 100
Please see Moodle for the due date.
1 Overview
The primary learning objective of this assignment is to provide you with firsthand experience in exploiting
SQL Injection, Cross-site Scripting and Cross-site Request Forgery vulnerabilities. Additionally, it aims
to deepen your understanding of these vulnerabilities. This assessment does not require a specific virtual
machine (VM) and can be executed on any operating system. You can utilize the same setup as the Lab07
and Lab08.
2 Submission
For this assignment, you need to submit two files using a single submission link on Moodle:
? A PDF file with relevant screenshots, and
? a singlevideo filecontaining the recording of you carrying out all tasks.
Typeset your report into .pdf format (make sure it can be opened with Adobe Reader) and name it as the
format:[Your Name]-[Student ID]-FIT3173-Assignment.pdf.
All payloads, if required, should be embedded in your report. In addition, if a demonstration video is
required, you should record your screen demonstration with your voice explanation. You can use this free
tool to make the video:https://monash-panopto.aarnet.edu.au/ ; other tools, such as Zoom, are also fine.
Important notes and penalties:
? A part of the submitted video (at a corner) must clearly show your face at all times. Penalties may
apply when that’s not the case.
? Video demonstration should be a live exploitation of the vulnerabilities.
? Late submissions incur a 5-point deduction per day. For example, if you submit 2 days and 1 hour
late, that incurs 15-point deduction. Submissions more than 7 days late will receive a zero mark.
? If you require extension or special consideration, refer tohttps://www.monash.edu/students/
admin/assessments/extensions-special-consideration. No teaching team mem-
ber is allowed to give you extension or special consideration, so please do not reach out to a teaching
team member about this. Follow the guidelines in the aforementioned link.
? The maximum allowed duration for the recorded video is 15 mins in total. Therefore, only the first
15:00 mins of your submitted video will be marked. Any exceeding video components will be ignored.
? If your device does not have a camera (or for whatever reason you can’t use your device), you can
borrow a device from Monash Connect or Library. It’s your responsibility to plan ahead for this.
Monash Connect or Library not having available devices for loan at a particular point in time is not a
valid excuse.
? You can create multiple video parts at different times, and combine and submit a single video at the
end. Make sure that the final video is clear and understandable.
1
? You can do (online) research in advance, take notes and make use of them during your video recording.
You may also prepare exploit scripts in advance. But you cannot simply copy-paste commands to carry
out the tasks without any explanations. Explanations (of what the code does) while completing the
tasks are particularly important.
? Zero tolerance on plagiarism and academic integrity violations: If you are found cheating, penalties
will apply, e.g., a zero grade for the unit. The demonstration video is also used to detect/avoid plagia-
rism. University policies can be found athttps://www.monash.edu/students/academic/
policies/academic-integrity.
3 Web Application Vulnerabilities
Q1: Complete three labs fromPortSwigger Labs, one from SQL Injection, one from Cross-Site
Scripting, and one from Cross-Site Request Forgery section. Please select labs designated as PRAC-
TITIONER or EXPERT; APPRENTICE labs will not be accepted. You are permitted to utilize the
solutions and demonstrations available on the PortSwigger website for assistance. However, please
do not copy walkthroughs from the PortSwigger website. You will approach the labs as a penetration
tester, simulating a real-world scenario where you exploit each target as if you were doing it for the
first time. Your solution should include the logical steps that lead to the exploitation, which may not
be covered in the walkthroughs on the PortSwigger website.[60 Marks]
Record a video and write a report to answer the following questions for each lab. At the beginning
of each lab recording, please state your name, student ID, and the name of the lab you are solving;
no marks can be awarded without this information.
1. How did you identify the vulnerability? (5 Marks)
2. Which payload was chosen for exploitation and why? (5 Marks)
3. What an attacker could achieve using the vulnerability? (5 Marks)
4. How the vulnerability can be mitigated? (theoretically, no demonstration is required) (5 Marks)
The video submission must demonstrate solving the lab, addressing the questions outlined above. In
case time runs short during the video, you may use the report to address any unanswered questions,
making references to relevant sections of the video. However, it is important that the video includes,
at a minimum, a demonstration of the lab. The report does not need to be in detail, it should briefly
address the mentioned questions, i.e. it can contain one or two-line answer for each question, pay-
loads and important screenshots (if necessary). The marks mentioned above are for the videos and
report combined.The word limit for each sub-question is 200 words, i.e. maximum 800 words
are allowed for Q1 per lab.
2
Q2: Download theQ2.htmlfile from Moodle. Assume you are browsingmonash.edu, and
it is hypothetically vulnerable to various web attacks (although it is not).While navigating
monash.edu, assume you open another tab in the same browser, and visitattacker.com(as-
suming attacker convinced you to do that). You click theSubmitbutton on theattacker.com
webpage, which containsQ2.html, initiating attacks onmonash.edu. ExamineQ2.html(you
can open the file in the browser and intercept the request in BurpSuite if desired) and respond to the
following questions.No video is required for this question. The word limit for each sub-question
is 200 words, i.e. maximum 600 words are allowed for Q2. [20 Marks]
1. Which vulnerability/vulnerabilitiesattacker.comis trying to exploit onmonash.edu?
(please explain the scenario outlining how this exploitation could occur) (10 Marks)
2. If successful, what is the consequence of the attack(s)? (5 Marks)
3. What mitigation(s) would you suggest formonash.eduto counter attack(s) launched by
attacker.com? (5 Marks)
Note: The parameter values in the HTML file are URL encoded.
3
Q3: Assume you visitmonash.eduand it tries to talk tolms.monash.edu, the browser issues
an OPTIONS method tolms.monash.eduand gets a response, below is the HTTP request and
its response:
OPTIONS /doc HTTP/1.1
Host: lms.monash.edu
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:71.0)
Accept: text/html,application/xhtml+xml,application/xml
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Connection: keep-alive
Origin: monash.edu
Access-Control-Request-Method: POST
Access-Control-Request-Headers: x-requested-with
HTTP/1.1 204 No Content
Date: Mon, 01 Dec 2008 01:15:39 GMT
Server: Apache/2
Access-Control-Allow-Origin:
*
Access-Control-Allow-Methods: POST, GET, OPTIONS
Access-Control-Allow-Headers: x-requested-with
Access-Control-Allow-Credentials: true
Access-Control-Max-Age: 86400
Vary: Accept-Encoding, Origin
Keep-Alive: timeout=2, max=100
Connection: Keep-Alive
Explain the Cross-Origin Resource Sharing (CORS) HTTP headers in the above HTTP request and
response. Please avoid listing each header with an explanation; instead, gather the key information
and present it in a concise paragraph.
Would browser change future requests based on the above HTTP response?No video is required
for this question. The word limit for Q3 is 300 words. [10 Marks]
4 Report Completion and Quality of Presentation [10 Marks]
Marks are allocated to the quality and clarity of presentation in the report and the video.
软件开发、广告设计客服
QQ:99515681
邮箱:99515681@qq.com
工作时间:8:00-23:00
微信:codinghelp
热点项目
更多
代做ecet 35901 computer base...
2025-06-07
代做beco011 economics for bu...
2025-06-07
代写data9001 fundamentals of...
2025-06-07
代写econ 4465 public economi...
2025-06-07
代做module 4: organizing for...
2025-06-07
代做fit9137 assignment 3调试...
2025-06-07
代写sola 5053: assignment 1 ...
2025-06-07
代写st337 and st405 bayesian...
2025-06-07
代写15-122: principles of im...
2025-06-07
代做etb1100 a regression ana...
2025-06-07
代做eb3891 research methods ...
2025-06-07
代做minimalism test 2代做pyt...
2025-06-07
代写st3370 bayesian forecast...
2025-06-07
热点标签
mktg2509
csci 2600
38170
lng302
csse3010
phas3226
77938
arch1162
engn4536/engn6536
acx5903
comp151101
phl245
cse12
comp9312
stat3016/6016
phas0038
comp2140
6qqmb312
xjco3011
rest0005
ematm0051
5qqmn219
lubs5062m
eee8155
cege0100
eap033
artd1109
mat246
etc3430
ecmm462
mis102
inft6800
ddes9903
comp6521
comp9517
comp3331/9331
comp4337
comp6008
comp9414
bu.231.790.81
man00150m
csb352h
math1041
eengm4100
isys1002
08
6057cem
mktg3504
mthm036
mtrx1701
mth3241
eeee3086
cmp-7038b
cmp-7000a
ints4010
econ2151
infs5710
fins5516
fin3309
fins5510
gsoe9340
math2007
math2036
soee5010
mark3088
infs3605
elec9714
comp2271
ma214
comp2211
infs3604
600426
sit254
acct3091
bbt405
msin0116
com107/com113
mark5826
sit120
comp9021
eco2101
eeen40700
cs253
ece3114
ecmm447
chns3000
math377
itd102
comp9444
comp(2041|9044)
econ0060
econ7230
mgt001371
ecs-323
cs6250
mgdi60012
mdia2012
comm221001
comm5000
ma1008
engl642
econ241
com333
math367
mis201
nbs-7041x
meek16104
econ2003
comm1190
mbas902
comp-1027
dpst1091
comp7315
eppd1033
m06
ee3025
msci231
bb113/bbs1063
fc709
comp3425
comp9417
econ42915
cb9101
math1102e
chme0017
fc307
mkt60104
5522usst
litr1-uc6201.200
ee1102
cosc2803
math39512
omp9727
int2067/int5051
bsb151
mgt253
fc021
babs2202
mis2002s
phya21
18-213
cege0012
mdia1002
math38032
mech5125
07
cisc102
mgx3110
cs240
11175
fin3020s
eco3420
ictten622
comp9727
cpt111
de114102d
mgm320h5s
bafi1019
math21112
efim20036
mn-3503
fins5568
110.807
bcpm000028
info6030
bma0092
bcpm0054
math20212
ce335
cs365
cenv6141
ftec5580
math2010
ec3450
comm1170
ecmt1010
csci-ua.0480-003
econ12-200
ib3960
ectb60h3f
cs247—assignment
tk3163
ics3u
ib3j80
comp20008
comp9334
eppd1063
acct2343
cct109
isys1055/3412
math350-real
math2014
eec180
stat141b
econ2101
msinm014/msing014/msing014b
fit2004
comp643
bu1002
cm2030
联系我们
- QQ: 9951568
© 2021
www.rj363.com
软件定制开发网!