Lab 3: Web Application Vulnerability Analysis
Lab Objective: Web Application Vulnerability Assessment
Why This Lab Matters:
Web applications are the primary attack target for cybercriminals. SQL injection, cross-site scripting, and other web vulnerabilities enable data theft, account takeovers, and system compromises. This lab teaches you to analyze vulnerability scan results and prioritize fixes that protect your organization's web assets.
Real-World Application:
Application security teams use tools like OWASP ZAP, Burp Suite, and Nessus to scan web applications for vulnerabilities. After each scan, analysts must sort through hundreds of findings, calculate risk scores using CVSS methodology, and create executive reports that guide remediation efforts. This lab simulates that critical workflow.
Skills You'll Learn:
- Vulnerability Management: Categorizing and prioritizing security findings by severity
- Risk Scoring: Calculating quantitative risk scores using industry-standard methodologies
- Executive Reporting: Translating technical findings into business-focused security reports
- Remediation Planning: Understanding which vulnerabilities require immediate attention vs. long-term fixes
Security Scan Data You'll Process
scan_output.json
Website security check resultsExpected Vulnerabilities
- SQL Injection (Critical)
- Cross-Site Scripting (High)
- CSRF Token Issues (Medium)
- Missing Security Headers (Medium)
- Information Disclosure (Low)
Analysis Tasks
Group vulnerabilities by risk level (Critical, High, Medium, Low)
Apply CVSS methodology for risk quantification
High-level risk assessment and recommendations
Comprehensive vulnerability analysis with remediation
Interactive Typing Lab - Web Vulnerability Analysis
Type each line exactly as shown. Press Enter after each line to continue. For empty lines, just press Enter.
Interactive Terminal
Progress: 0/30 lines completed
Expected Output - Compare Your Results
WEB SECURITY ASSESSMENT ========================= High Risk: 3 Medium Risk: 5 Low Risk: 12 Total Issues: 20 Risk Score: 87 CRITICAL FINDINGS: - SQL Injection vulnerabilities detected - Cross-Site Scripting (XSS) found - Missing security headers identified RECOMMENDATIONS: 1. IMMEDIATE: Fix SQL injection (data breach risk) 2. HIGH PRIORITY: Implement XSS protection 3. MEDIUM: Add security headers (HSTS, CSP) 4. Schedule regular security testing
What This Output Means:
- High Risk (3): Critical vulnerabilities like SQL injection that could lead to data breaches
- Risk Score 87: High-risk rating requiring immediate security team attention
- SQL Injection: Attackers could steal database contents or delete data
- Cross-Site Scripting: Malicious scripts could hijack user accounts
Grading Criteria (20 points total)
- Critical vulnerability identification (5 points)
- High severity analysis (5 points)
- Risk score calculation (5 points)
- Remediation recommendations (5 points)
CVSS v3.1 Scoring Reference
Critical
9.0 - 10.0High
7.0 - 8.9Medium
4.0 - 6.9Low
0.1 - 3.9OWASP Top 10 2021 Reference
- Broken Access Control
- Cryptographic Failures
- Injection
- Insecure Design
- Security Misconfiguration
- Vulnerable and Outdated Components
- Identification and Authentication Failures
- Software and Data Integrity Failures
- Security Logging and Monitoring Failures
- Server-Side Request Forgery (SSRF)