Marymount University



Mohammed AlkhelaiwiIT-335 Corporate Cybersecurity9.16.2014Lab3Project 3-1: Scan Web Browser Plug-insSteps 1-6 The main goal of this project is to scan web browser plug-ins and check if there is any issue with the browser plug-ins. First I went to then I read about the features that they provided. The final steps were to start scanning and see the results. I found out that I need to update Java to the newest version in order to be secure as the web shows me. I like the fact that I did not need to download an application to be able to scan my browser.Project 3-2: Configure Microsoft Windows Data Execution Prevention (DEP)Steps 1- 10 The purpose of this project is to have almost an absolute protection against buffer overflow attack. First I needed to know if my computer supports NX or not. In order to know that I had to download ScurableAble and launch it see the result. As it shows in the above picture that my comuter supports NX which is really good to have this for protection purposes. I followed the rest of the steps and chose “DEP for all programs” as it appeared on the above photo. Project 3-3: Set Web browser Security Steps 1-9This project asks first to check the browser history and see the information that different cookies have. After I went over the list of cookies files, I deleted the browser history as instructed on the beginning of the steps of this project. Steps 10-19The objective of this part of the project is to inform the student about the Manage add-ons feature, adding website to restricted site, and choosing the level of privacy against cookies. Steps 20-25 The last steps showed how to turn on tracking protection. It also shows me how to personalize my list. I visited a website to download one as I was instructed in the book. Project 3-4: Hosts File AttackSteps: 1-14This project guide students on how to add fraudulent entry to the local hosts file. What I did is, I substitute the ip address of cengage .com with Google IP address, and everytime I put and hit enter I go to google instead of Project 3-5: ARP PoisoningSteps 1-11The steps of this project basically guide the users how to delete the ARP table entry of the default gateway. Also, these steps show how to add to the ARP table by entering arp –s . Even though, I face some difficulty working on this project, but I enjoyed working on it due to the fact that I had to try until it worked and see the results. Project 3-6: Create an HTTP HeaderSteps 1-7 This project shows how to use Referer, and the steps go through how to do it. Finally, in the last steps there is a question “how can an attacker use this in an HTTP header attack?” I think the answer for this question is that an attacker could use the Referer to redirect the target computer to a harmful website whether if it is the attacker’s website or other websites that the attacker wants his target to be visiting. Project3-7: Manage Flash Cookies Steps 1- 6This project is about Managing Flash Cookies, this project shows me how to delete the cookies that cannot be deleted using the browser’s normal configuration settings as regular cookies. Personally I learned a new thing doing this project because before this project I thought all cookies can be deleted from the browser’s configuration. ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download