Description
Use NetBeans to create two different unique and complete demonstrations of Risky Resource Management such as Use of Potentially Dangerous Function, Incorrect Calculationof Buffer Size, Uncontrolled Format String, and Integer Overflow or Wraparound. You will demonstrate and describe how to fix each of the problems. Therefore, a total of four code samples will be created.Twowith Risky Resource Management and two will have the issuesfixed.
Assignment Details
1. Select 2 CWE/SANS Top 25 vulnerabilities under the category of Risky ResourceManagement
from one of these specificissues:
a. Use of Potentially DangerousFunction,
b. Incorrect Calculation of BufferSize,
c. Uncontrolled Format String,and
d. Integer Overflow orWraparound,
Review and try the existing examples in links in the classroom. Use NetBeans to experiment.Work in multiple languages wherepossible.
2. Using NetBeans, create your own unique, full example for each of the 2 vulnerabilities in this category. Note: by unique and full I mean, this should not just be a code snippet. It shouldbe part of a small application. In other words, you need to adapt the examples provided inthe documentation to something more meaningful and substantive. It doesn’t have to be alarge, overly complex application, but it needs to be complete, and runnable and demonstratehow this vulnerability may appear in the realworld.
3. Demonstrate for each of the two applications they are vulnerable to this attack. You need to show explicitly the attack you use and demonstrate the impact of the vulnerability. The demonstration should occur through screen shots and detailed walkthrough of the steps you performed.
4. Finally, using the information in the CWE/SANS Top 25 vulnerabilities, fix the issues in eachof the two examples you created in step2.
5. Document the vulnerabilities and describe specifically how the issues were corrected. Note:You may need to conduct additional research to better understand the vulnerability or thefeatures associated with a specificlanguage.
Deliverables
Provide all of your source files for this assignment. Two source code files will have software vulnerabilities. The remaining two will have the issues fixed. Provide any supplemental orutility files supporting your main sourcefiles.
Prepare a word or PDF file describing and demonstrating the vulnerabilities in each of yoursource files and specifically how you fixed the issue. You should demonstrate with screen shots andcode within the document to report your findings. Note: Be sure to provide all screen shots in oneword of PDF document. You can compress the files using a zip application for easierupload.
