A case is investigated, where bigger threats are identified. The investigation process concentrates on finding risks for both the clients and the users. The issues present in the case will be explained, with few probable process of mitigation. There are number of chances for the attackers to perform system operation. This report will completely explain the code, which is used in the investigation process. The different types of system investigation will be studied. The techniques used as a prevention in this case will be identified. The vulnerabilities and security issues of this case will be understood.
Virtual Machine (VM) is a competition of a system. It purely depends on the computer designs. In addition with the architectures, it provides numerous functions for the computer system. The implementation of the Virtual Machine may contain particular software or hardware and a combination of both (Sectools.org, 2017).
The Virtual Machine (VM) is implemented with the help of Ubuntu which is running under tools of VMWare (Pubs.vmware.com, 2017). The below screenshot clearly shows that the Virtual Machine ware tool, for the Linux software is downloading.
The below screenshot shows that, it is successfully downloaded. Then, it asks for login, in to the system.
It is made sure that, it is logged on into the guest operating system.
The below screenshots show that, it is logged on to the Ubuntu window.
The command named ‘ls’ is used for displaying the username of the system. The username is widgets.
The password must be changed. Thus, for creating new password the command named is typed. It is necessary to enter the UNIX password and it asks the user to retype the password. Once the password is given, then it automatically says that the password is updated successfully.
The UNIX system is booted normal mode and then click on OK button.
The system is logged on by giving the credentilas, as shown below in the given screenshot.
To check whether the system is well known regarding the IP address, the command named is used. This helps in providing the details about Internet Protocol address of the UNIX system.
For the virtual machine, it is checked whether it is connected with internet facility. The device status shows whether the system is connected or not.
The following command checks whether it is connected to the internet or not. The command is shown below in the screenshot.
The below screenshot shows that the packages are reading and the state information is done. The packages are automatically installed and the extra packeges are also installed.
With the help of nmap, command the details about the particular ports will be known whether it is openrd or not. These information can be easily collected from the UNIX system. When the command ‘nmap’ is used initially, then the needed requirements should be installed accordingly. Even though, it is not installed earlier (Tipstrickshack.blogspot.in, 2017). as the investigated IP address is the IP address used in this command.
The manual IP address is given to check the process.
The injection in SQL is a security activity that the attacker additionally adds (SQL) Structured Query Language code into a Net related input box for the purpose of gaining admission to resources or to make changes.
The SQL injection is a kind of code injection method for attack. The technique is mainly used to attack the data driven application. This is also known to insert malicious number of SQL in which, it gets into the entry field for processing the named execution. In order to maintain security for the data of the company, the process is mandatory for recovering the injection of SQL vulnerabilities in this case. This testing will be conducted for checking purpose. With the help of the SQL injections, the vulnerabilities occur and the attackers of the vulnerabilities are able to submit the commands, which are directly stored in the database.
The participation of the users are used for the purpose of integrating the queries of SQL. It has the fundamental form of the database. It is considered as the bigger threat to the attack occurred. The following are the possibilities of the SQL injection process (Veracode, 2017).
Few applications of web allows participation of more number of users accordingly. It helps in integrating the queries of SQL into the fundamental form of database, which have bigger threats through this attack. The main reason behind this kind of vulnerabilities include inadequate field of authentication of the user input (BinaryTides, 2017). It can easily be understood that the attackers try to login with the help of the password as ‘password’.
There are more malicious SQL code in the SQL injection, which can be injected into the application through more number of methods (Sqlmap.org, 2017). There are numerous ports which are in an open state in the virtual machine. So that, the SQL injection is performed by the attacker. The operation is performed by various number of SQL mechanisms (Secureworks.com, 2017).
The vulnerability of the widgets system is conducted based on two different phases. The first phase is purely tested in the Ubuntu terminal. The credentials namely, the username and the password are provided accordingly. The attack for the system is usually indicated by the SQL Injection. The SQL injection helps in representing the attack where the one who attacks, perform cruel process in SQL. It is also said, as the payload that is malicious which helps in controlling an application of web for the server of the database. It is generally represented as RDBMS. The login page of the Widgets Inc is shown below. To open this login page, enter the Widget IP address in the browser.
The mkdir command is used for creating the new directory.
The below screenshot shows the installing git repository.
The screenshot shows installing packages in git repository.
The screenshot displays the connecting sqlmap command into the git.
The below screenshot displays the sqlmap (Howtoforge.com, 2017).
The below screenshot shows the MySQL database test.
Open port test
In the last steps, port 22 is used for the secure SSH login, port forwarding and file transfer.
Port 80 is used for nmap. nmap and WebDAV are used to test these ports. The distributed algorithms are used to store the metadata, file locking and overwriting.
After the installation of nmap, mysql and apache, the following test is performed.
Http request method is used by this developer. The requested data is get from the specified resource using GET method. It also catches the history of the web browser. Hence, this method will not be suitable for the sensitive information. Because, it shows the user name and password details in the URL. Example screenshot is shown below. Here, it is observed that the URL link shows the username and password.
The test results of the developers test can be checked from the widget README file. The feature issues and the vulnerability issues are shown below. It shows the vulnerabilities and issues in the system.
Security Enhancement for WidgetInc
The test results show that the system has low security. Hence, the security of the system should be increased to avoid the malicious attacks and data hacking. It is an online webpage and it is also used to make online payments. Thus, it is important to save the customer details and other sensitive information.
Increasing the Firewall Security
The incoming requests cross through the firewall. Hence, the firewall should be updated in the period manner to find the threats in the incoming requests. If a firewall is configured with UFW, then it is easy to create IPV4 firewall (SearchSecurity, 2017). Hence, the UFW needs to be enabled in the system.
To enable ufw in firewall, enter the command in the below screenshot.
Next, secure the ports. Port 22 is open and it has more chances for vulnerable attack. Hence, it is important to secure this port by allowing SSH (Acunetix, 2017). To allow SSH in port 22, enter the following command in the below screenshot. The updated rules of port 22 is shown below.
To stop the SSH service in port 22, enter the below command and check the updated rules.
Conclusion
The examination provides a lot of data about vulnerability of the VM provided. More number of security issues occur during the investigation process. All the problems and the vulnerabilities are explained above with mitigation methods. The process is performed in VM. This paper is a good example of the system that is examined in the Linux platform and respective solutions are provided.
References
Acunetix. (2017). What is SQL Injection (SQLi) and How to Fix It. [online] Available at: https://www.acunetix.com/websitesecurity/sql-injection/ [Accessed 17 Aug. 2017].
BinaryTides. (2017). Sqlmap tutorial for beginners – hacking with sql injection. [online] Available at: https://www.binarytides.com/sqlmap-hacking-tutorial/ [Accessed 17 Aug. 2017].
Howtoforge.com. (2017). How to use the NMAP Security Scanner on Linux. [online] Available at: https://www.howtoforge.com/tutorial/nmap-on-linux/ [Accessed 17 Aug. 2017].
Pubs.vmware.com. (2017). vSphere Documentation Center. [online] Available at: https://pubs.vmware.com/vsphere-50/index.jsp?topic=%2Fcom.vmware.vmtools.install.doc%2FGUID-685722FA-9009-439C-9142-18A9E7C592EA.html [Accessed 16 Aug. 2017].
SearchSecurity. (2017). What is firewall? – Definition from WhatIs.com. [online] Available at: https://searchsecurity.techtarget.com/definition/firewall [Accessed 17 Aug. 2017].
Sectools.org. (2017). VMware – SecTools Top Network Security Tools. [online] Available at: https://sectools.org/tool/vmware/ [Accessed 16 Aug. 2017].
Secureworks.com. (2017). What is Firewall Security?. [online] Available at: https://www.secureworks.com/blog/firewall-security [Accessed 17 Aug. 2017].
Sqlmap.org. (2017). sqlmap: automatic SQL injection and database takeover tool. [online] Available at: https://sqlmap.org/ [Accessed 17 Aug. 2017].
Tipstrickshack.blogspot.in. (2017). HOW TO DO SQL INJECTION FROM LINUX?. [online] Available at: https://tipstrickshack.blogspot.in/2012/11/how-to-do-sql-injection-from-linux.html [Accessed 17 Aug. 2017].
Veracode. (2017). SQL Injection Cheat Sheet & Tutorial: Vulnerabilities & How to Prevent SQL Injection Attacks. [online] Available at: https://www.veracode.com/security/sql-injection [Accessed 17 Aug. 2017].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download