Starting from:

$50

SDEV325-Homework 5 Demonstrating Porous Defenses Final Solved

In this homework you use AWS Cloud 9 to create two different unique demonstrations of Porous Defenses such as Use of a Broken or Risky Cryptographic Algorithm, Improper Restriction of Excessive Authentication Attempts, and Use of a One-Way Hash without a Salt. 

You will provide unique code that contains the vulnerability and then provide an updated version of the code that fixes the vulnerability. You should also describe why the original code was vulnerable and discuss specific attack methods a user could try to exploit the vulnerability. Finally discuss how the new code fixes the vulnerability. 

Assignment Details
Be sure you have carefully read and understand the materials in weeks 7 and 8.

Select 2 CWE/SANS Top 25 vulnerabilities under the category of Porous Defenses from one of these specific issues: Use of a Broken or Risky Cryptographic Algorithm,
Improper Restriction of Excessive Authentication Attempts, and
Use of a One-Way Hash without a Salt
Review and try the existing examples in links in the classroom.  Use AWS Cloud 9 to experiment. Work in multiple languages where possible. 

Using AWS Cloud 9, create your own unique example for each of the 2 vulnerabilities in this category.
Your code examples do not need to large or fully functional from an application standpoint. However; they need to include all of the code such that the vulnerability can be fully explained and corrected.
Use the information in the CWE/SANS Top 25 vulnerabilities to understand and experiment.
Be sure your documentation and descriptions are detailed and completed.
You may need to conduct additional research to better understand the vulnerability or the features associated with a specific language.
Document the vulnerabilities and describe specifically how the issues were corrected. Note: You may need to conduct additional research to better understand the vulnerability or the features associated with a specific language.

More products