Professional Documents
Culture Documents
Vulnerability Analysis
Vulnerability Analysis
Vulnerability Analysis
Vulnerability Analysis
Ms. Vinesha Selvarajah
Objectives
Resources
The resource folder is found under the XX folder in your Moodle, under XXX. You can do this by
accessing Moodle under this subject’s intake code, save the folder to your computer.
Preparation
To effectively prepare for this tutorial class, you should have done the following before coming to your
tutorial class:
Reminder: If you don’t complete these tutorial exercises during your allocated tutorial class, you should
finish them in your own time, seeking additional assistance as needed.
DSF Tutorial – Vineha Selvarajah
sure to note down the types of vulnerability detected and discuss on how to patch/overcome such
vulnerability. You may want to consider running the assessment for the following website:
https://www.hackthissite.org/
Extended Activity:
This section is only intended for students and teams who finishes early and want an additional challenge.
It is not intended or necessary for all students to complete.
You may want to watch some videos related to penetration testing and vulnerability assessment to
understand the difference between them. Subsequently, you may enhance you experience in SQL
injection to understand how SQL injection is done as one of the many penetration testing to assess the
vulnerability of a particular website or system. You may also think about the risks involved in systems that
are vulnerable to SQL injection.
SQL Injection