Download as:
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Language:EN
Pages: 3

The page limit for the report pages the file pdf format moodle gmt

http://13.54.173.115/brokenapp.php

This web app give access to registered members of a `Broken App’ group to access some information common to the group members (provided using the PHP server script at brokenapp.php) as well as personal private information for each group member (via the script at brokenapp-personal.php on the same domain).

In this part, your aim is to do security testing of the personal private information part of the web app. For this, you are given member 1’s password, namely:

Ro4mvSemq45xfepvaEr24

(3)Look at the details in the brokenapp.php PHP script available on Moodle to see how user input is read in from the user's browser request and how the authentication check is performed. You should read the PHP documentation on the PHP functions used in the script, see http://php.net/manual/en/ and search for the relevant functions. The shared group password, whose cryptographic hash is hard-coded in the script, was generated using the php function call password_hash(pwd, PASSWORD_DEFAULT),where pwd is the password to be hashed (note that the hash includes also a salt value generated at random). To help your security tests, you are also given a simple PHP script called password_hasher.php (the code is available on Moodle, it can be run by pointing your browser to http://13.54.173.115/password_hasher.php ; alternatively, you could run it by copying it into the web server folder /var/www/html/ of your FIT2093 Ubuntu-64 VM and then pointing your VM Firefox browser to http://localhost/password_hasher.php ). The script takes an input password from a user and displays its hash value (generated using the php function call above) when the user clicks the small button below the text box.

Using the above information/tools, attempt to identify a vulnerability in brokenapp.php. If you found a vulnerability, explain how it can be exploited, provide any secret information revealed, and briefly explain how the brokenapp.php code could be modified to eliminate this vulnerability. In any case, explain what tests you did, the results, and your interpretation of them. (2 marks)

The 5 marks full grade allocated for this assignment will be distributed among the tasks as indicated above. For each of those tasks, 80% of the marks will be based on correctness of the vulnerability identification and/or exploitation technique (as appropriate) and the remaining 20% to the written answer editorial quality (clarity, accuracy, style).

IMPORTANT: This is an INDIVIDUAL assignment for students to complete on their own. You MUST NOT work with any other student (or person) on this assignment.

Copyright © 2009-2023 UrgentHomework.com, All right reserved.