Answered step by step
Verified Expert Solution
Question
1 Approved Answer
This assignment uses a GCU - provided virtual machine that will be specified by your instructor. Databases are the engines behind the information age, from
This assignment uses a GCUprovided virtual machine that will be specified by your instructor. Databases are the engines behind the information age, from keeping track of your users to tracking millions of products for online retail websites. Structured Query Language SQL is the most common language of databases. Not all databases are developed with security in mind and may have input validation issues, which makes them the perfect target for an attacker. Refer to "From SQL injection to Shell," found in the topic Resources, as a guide. Using the GCUprovided virtual machine and SQL Injection to Shell" VM from Vulnhub, perform an SQL recon and injection. Document your findings under Phase Testing in the "ITT PEN Testing Report Guidelines," located in Class Resources. Refer to "Writing a Penetration Testing Report," by the SANS Institute, located in Class Resources, for examples of PEN testing reports. Append this assignment to the PEN testing report and resubmit the report Passive Corporate Recon Automating Information RECON NMap Scan Vulnerability Assessment Applied Exploitation using Metasploit Custom Payload Website Vulnerability Assessment SQL Injection While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
This assignment uses a GCUprovided virtual machine that will be specified by your instructor. Databases are the engines behind the information age, from keeping track of your users to tracking millions of products for online retail websites. Structured Query Language SQL is the most common language of databases. Not all databases are developed with security in mind and may have input validation issues, which makes them the perfect target for an attacker. Refer to "From SQL injection to Shell," found in the topic Resources, as a guide. Using the GCUprovided virtual machine and SQL Injection to Shell" VM from Vulnhub, perform an SQL recon and injection. Document your findings under Phase Testing in the "ITT PEN Testing Report Guidelines," located in Class Resources. Refer to "Writing a Penetration Testing Report," by the SANS Institute, located in Class Resources, for examples of PEN testing reports. Append this assignment to the PEN testing report and resubmit the report Passive Corporate Recon Automating Information RECON NMap Scan Vulnerability Assessment Applied Exploitation using Metasploit Custom Payload Website Vulnerability Assessment SQL Injection While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access with AI-Powered Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started