Ch 5 Mutillidae Web Site and Execute the First Attack Lab Questions

User Generated




Lab 3-4-5 Linux

Lab 3-4-5 Linux

Lab 3-4-5 Linux

Lab 3-4-5 Linux

Lab 3-4-5 Linux

Lab 3-4-5 Linux

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

I will send in few hours
Here is chapter 5:

Chapter 5
Lab 5.1|i: Questions
Step 2: connect to the Mutillidae web site and execute the first attack:
2b. what is the current version?
version: 2.1.19
20a. What version of PHP is being used?
PHP 5.2.4
20b. what version of SQL is being used?
MySQL 5.0

20c. How many available databases are there?
7 available databases are there.

22a.What information is displayed?
The Information displays about the database and Credit card numbers.
22b. Should you be able to see this information? why or why not?
Yes, we are able to grab sensitive data by passing queries to the SQL database.
step 3:Execute the second attack.

3a. Are you logged in?
3b. Who are you logged in as?

Lab 5.1 Analysis Questions
1. What is a SQL injection attack, and what are the potential results (impact on

confidentiality, integrity, and availability)?
a. A SQL injection attack consists of insertion or "injection" of a SQL query via the
input data from the client to the application. A successful SQL injection exploit
can read sensitive data from the database, modify database data
(Insert/Update/Delete), execute administration operations on the database (such as
shutdown the DBMS), recover the content of a given file present on the DBMS
file system and in some cases issue commands to the operating system. SQL
injection attacks are a type of injection attack, in which SQL commands are
injected into data-plane input in order to effect the execution of predefined SQL

b. Confidentiality will be compromised if a successful attack occurs because
sensitive data can be read from the database without permission. The integrity is
compromised because a hacker could delete, update or insert data into a database.
If an attacker is successful th...

Awesome! Perfect study aid.