Description
Task 1: With reference to at least two published research papers, answer the following questions: 1. Analyze any two well-known security attacks that can target web applications. 2. Recommend any two countermeasures for enhancing the security of web applications. 3. Analyze any two well-known security attacks that can target mobile applications. 4. Recommend any two countermeasures for enhancing the security of mobile applications. Task 2: Google Gruyere is a deliberately vulnerable web application created by Google for the purpose of teaching and learning about web security vulnerabilities. It’s designed to simulate a simple web application with intentionally built-in security flaws, allowing developers, security professionals, and enthusiasts to practice identifying and exploiting common web security issues in a controlled environment. In this task, you are requested to answer the following questions: 1. Apply three different web site footprinting tools and analyze the results. 2. Apply three different scanning tools and analyze the results. 3. Ready carefully what is in the codelab of Gruyere web application, the warning and hints and apply the following techniques: a. Cross-Site Scripting (XSS) b. Cross-Site Request Forgery (XSRF) c. Path Traversal d. Denial of Service 4. For each of the following attacks, suggest appropriate countermeasures: a. Cross-Site Scripting (XSS) b. Cross-Site Request Forgery (XSRF) c. Path Traversal d. Denial of Service (Use kali lynx) Screenshot for the steps with explaining
Unformatted Attachment Preview
Task 1:
With reference to at least two published research papers, answer the following questions:
1. Analyze any two well-known security attacks that can target web applications.
2. Recommend any two countermeasures for enhancing the security of web applications.
3. Analyze any two well-known security attacks that can target mobile applications.
4. Recommend any two countermeasures for enhancing the security of mobile applications.
Task 2:
Google Gruyere is a deliberately vulnerable web application created by Google for the purpose of
teaching and learning about web security vulnerabilities. It’s designed to simulate a simple web
application with intentionally built-in security flaws, allowing developers, security professionals, and
enthusiasts to practice identifying and exploiting common web security issues in a controlled
environment. In this task, you are requested to answer the following questions:
1. Apply three different web site footprinting tools and analyze the results.
2. Apply three different scanning tools and analyze the results.
3. Ready carefully what is in the codelab of Gruyere web application, the warning and hints and
apply the following techniques:
a. Cross-Site Scripting (XSS)
b. Cross-Site Request Forgery (XSRF)
c. Path Traversal d. Denial of Service
4. For each of the following attacks, suggest appropriate countermeasures:
a. Cross-Site Scripting (XSS)
b. Cross-Site Request Forgery (XSRF)
c. Path Traversal
d. Denial of Service
(Use kali lynx)
–
Screenshot for the steps with explaining
Purchase answer to see full
attachment