Skip to content

Latest commit

 

History

History
45 lines (24 loc) · 1.82 KB

week3.md

File metadata and controls

45 lines (24 loc) · 1.82 KB

Assignment 3

Result: 7/10

Question 0 ✔️

Arbitrary Code Execution

Question 1 ✔️

XSS occours when a website uses a service from another website with code/script injected. CSRF occours when a website has a copy of request structure of a service from another website and can execute it without notice.

Question 2 ✔️

To prevent code injection, or mispeled characters that can act like code that can be executed.

Question 3 ❌

To have access to a service of a website without username or password, or delete databases to slowdown a company, or get control of the system by getting access of administrator account.

Question 4 ✔️

The server have no control over what these clients are doing when using any service provided, they can changes the website copy, i.e. HTML/CSS/JavaScript, to gain an advantage or do something malicious when requesting this service. By also validating in the server side, it can deny this request and reload the page and prevent that something going really bad, and perhaps show "Something went wrong" to the user.

Question 5 ✔️

The source code is open to anyone view, audit and collaborate to the software; when a vulnerability is encountered anyone can solve and submit a fix, so the software tends to be really more secure.

Question 6 ❌

Lack of access to other software that is not in the store or has not yet been audited by the store.

Question 7 ❌

Can prevent code injection and cross website redirection.

Question 8 ✔️

When submitting a form, for exemple submitting a payment form with my credentials and credit card information on a web service like amazon.com.

Question 9 ✔️

This exploit maybe can stole user data from server database, by randomly retriving small peaces of data in every heartbeat request provided by the TLS session.