{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

INFOSYS 727 Lab 07- Web hacking 03

INFOSYS 727 Lab 07- Web hacking 03 - Lab test info Lab test...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Lab test info
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Lab test will be in Week 11 Format Multiple choice Web based 15 questions in 45 minutes Regular lab time Preparation tips • Understand the concepts behind each exercise that you’ve done rather than just doing them. • The questions will be based on application of your understanding of the concepts – so memorizing wont help! • Understanding of how XOR works – Transformation of Alphabet – ASCII - Binary • For labs like Cryptography, Forensics which were covered in the class using the text book to strengthen your concepts is recommended
Background image of page 2
E xample question - 1 JOUFHSJUZ - This is a substitution cipher text that was encrypted using the Key entry ‘B’. What would the cipher text be if the Key was 'D' instead of 'B'? 1. PDOZDUH 2. ZDUFULPH 3. GDQJHU 4. LQWHJULWB
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
E xample question - 2 Which of the following measures is not used as a method to analyze a cryptogram? 1. Hash Product 2. N-Gram 3. Histogram 4. E ntropy
Background image of page 4
E xample question - 3 Which of the following options are considered as the main reasons for vulnerabilities in web applications? 1. Flaw in code 2. Lack of proper input validation 3. Poor security protocol 4. All the above
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
U sing Gruyere to understand XSS and elevation of privileges Web Application Hacking 03
Background image of page 6
In this exercise, we will use Google Web Application E xploits and Defences online training material know as “Gruyere” To access Gruyere, go to http://google-gruyere.appspot.com/start
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 14

INFOSYS 727 Lab 07- Web hacking 03 - Lab test info Lab test...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon bookmark
Ask a homework question - tutors are online