Question

In: Computer Science

Use the sample entry from an Apache web server log below to answer the following questions....

Use the sample entry from an Apache web server log below to answer the following questions. (10 marks total) CSE1CPR 2020 Final Exam Page 8 10.10.0.2 - - [1/Jan/2020:10:02:45 +0000] “GET /login.php?username=admin&password=password&submit=TRUE HTTP/1.1 302

i. Identify the key information in this message and briefly describe what this log entry is telling you?

ii. What security threat or vulnerability can you see from this log entry?

iii. How might this cause harm? iv. Suggest how the website developer or administrator might mitigate this threat or vulnerability?

Solutions

Expert Solution

Please find the following answer for the given question.

Answer I:

Given log "10.10.0.2 - - [1/Jan/2020:10:02:45 +0000] “GET /login.php?username=admin&password=password&submit=TRUE HTTP/1.1 302" denotes

10.10.02 - It is the ip address of the client

Next two hypens meaning:

1st "-": Identify of the client machine is hidden here, hence '-' is used

2nd "-": User id of the client is hidden, since it is not authenticated.

[1/Jan/2020:10:02:45 +0000] - The time at which the client request is received

GET /login.php?username=admin&password=password&submit=TRUE HTTP/1.1 - It denotes the http request method the client used and the HTTP/1.1 is the http's version.

More info: Here its a GET request from the web page "login.pgp" with the parameters username and password and submit is set to TRUE.

302 - It is the status code which is sent back to client from the server. Here 302 refers tto found.

Answer II:

From the given log we can identify client machine's username and password, which pave a way for the attackers to intrude into their network/machine.

Answer III:

Since username and password are visible to the outside world it is vulnerable for the security by someone who knows its password/username can break into and cause issues.

Answer IV:

Here the developer can encrypt the username and password's and pass it with the http get request,with this approach we can protect the client machine's details to become vulnerable for such attacks. Hence this provides protection.


Related Solutions

Use the sample entry from an Apache web server log below to answer the following questions....
Use the sample entry from an Apache web server log below to answer the following questions. 10.10.0.2 - - [1/Jan/2020:10:02:45 +0000] “GET /login.php?username=admin&password=password&submit=TRUE HTTP/1.1 302 i. Identify the key information in this message and briefly describe what this log entry is telling you? ii. What security threat or vulnerability can you see from this log entry? iii. How might this cause harm? i v. Suggest how the website developer or administrator might mitigate this threat or vulnerability?
Use the sample entry from an Apache web server log below to answer the following questions....
Use the sample entry from an Apache web server log below to answer the following questions. 10.10.0.2 - - [1/Jan/2020:10:02:45 +0000] “GET /login.php?username=admin&password=password&submit=TRUE HTTP/1.1 302 i. Identify the key information in this message and briefly describe what this log entry is telling you? ii. What security threat or vulnerability can you see from this log entry?   iii. How might this cause harm? iv. Suggest how the website developer or administrator might mitigate this threat or vulnerability?
The following is a mock-up of a Nginx web server access log. There are a few...
The following is a mock-up of a Nginx web server access log. There are a few entries that might indicate someone is searching for an attack vector. Write a command that will do all of the wollowing; Read the lines from a file Use a single regular expression to find all lines where; Someone tried to access a file starting with a period (example ".htaccess") OR Someone attempted to open one of; "php.ini" or "wp.conf" OR Someone tried to retrieve...
A small company network have multiple servers (including a web server, a log server, DNS servers,...
A small company network have multiple servers (including a web server, a log server, DNS servers, a file server for inventory information and customer orders, but no email server) , two firewalls, DMZ, and PCs. The company sales products online. a). Suppose that you are a system administrator. What types of network connections will you allow to be established with the servers in the DMZ from the Internet? b). What are the points of entry for attackers? c). How do...
Below is what I usually eat daily. Answer the following questions on the food log below....
Below is what I usually eat daily. Answer the following questions on the food log below. What are the functions of each nutrient? Did you consume enough or too much of each (deficiencies / excesses)? What are the health benefits of each, as well as the risks to health if too much or too little are consumed? Did you select good sources of each (fried vs baked, simple vs complex carbs, saturated vs unsaturated fats, etc.)? What would be your...
1.) Use the given information below to answer the following questions. a.) A sample of 25...
1.) Use the given information below to answer the following questions. a.) A sample of 25 lightbulbs was taken and it was found that the mean lifetime of a certain bulb for a movie projector is 520 hours with a standard deviation of 50 hours. The standing assumption of the manufacturing company is that the lifetime of this type pf bulb is no more than 500 hours. Assume a normal distribution. Does the data support the company’s claim at a...
Use the following information to answer the questions below:
Use the following information to answer the questions below: note: all sales are credit sales Income Stmt info: 2016 2017 Sales $ 975,000 $        1,072,500 less Cost of Goods Sold: 325,000 346,125 Gross Profit 650,000 726,375 Operating Expenses 575,000 609,500 Earnings before Interest & Taxes 75,000 116,875 Interest exp 25,000 31,000 earnings before Taxes 50,000 85,875 Taxes 20,000 34,350 Net Income $ 30,000 $              51,525 Balance Sheet info: 12/31/2016 12/31/2017 Cash 60,000 $ 63,600 Accounts Receivable 80,000 $ 84,000 Inventory...
Use the following data to answer the questions below:
Use the following data to answer the questions below:             Q                 VC             MC           AVC              1                 $10              ___            ___                                   2                16              ___            ___                       3                20              ___            ___                                   4                25              ___            ___              5                31              ___            ___              6                  38              ___            ___                  7                  46              ___            ___8                  55              ___            ___9                  65              ___            ___         a. Calculate the marginal cost and average variable cost for each level of production.b. How much would the firm produce if it could sell its product for...
Use the following information to answer the questions below. The balances listed below were taken from...
Use the following information to answer the questions below. The balances listed below were taken from the ABC Inc.’s unadjusted trial balance on January 31st. The company’s reporting period began on January 1st . Accounts Receivable $23,000 Accumulated Depreciation 27,000 Accounts Payable 40,000 Cash 22,000 Common Stock 50,000 Equipment 72,000 Land 2,000 Long-term investment 55,000 Prepaid Rent 18,000 Retained Earnings (Beginning) 56,000 Salaries Expense 15,200 Service Revenue 42,200 Supplies 5,000 Utilities Expense 3,000 In addition, assume the following: A. There...
Describe the process involving the transmission of a Web page from a Web server to a...
Describe the process involving the transmission of a Web page from a Web server to a user’s computer.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT