Proposal: The technology that you will be targeting Two vulnerabilities that you

Responsive Centered Red Button

Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.

Proposal:
The technology that you will be targeting
Two vulnerabilities that you will be reproducing and exploiting
must submit a progress report of 10-12 pages excluding the appendix
Report:
The report should use font size 11, single line space, and standard margins.
The report must provide detailed technical descriptions of the two vulnerabilities, exploitation methods, attack steps, encountered challenges and solutions.
The project report has to include the following 4 sections:
Vulnerability research
This part should answer questions such as:
What are the root causes of the 2 vulnerabilities? How were the vulnerabilities introduced? How common are the vulnerabilities for this technology? How do the vulnerabilities work technically? How can the vulnerabilities be exploited and what do they provide to an attacker? How easy or difficult is it to exploit the vulnerabilities?
Vulnerability reproduction
This section should cover the setup you had to perform to reproduce the vulnerability in an isolated environment, like a VM.
This part should answer questions such as:
What isolation/virtualization platform are you using to ensure the vulnerability is not exposed unnecessarily and does no affect any production systems? What software stacks and versions did you install? How did you configure the installed software?
How did you validate that the vulnerability is present?
Exploitation
This section should cover the steps you performed to stage and run an attack against each of the 2 vulnerabilities.
This part should answer questions such as: Are you using an off-the-shelf exploit (e.g., Metasploit module), a PoC exploit (e.g., exploit-db.com) or an original exploit/implementation? What does the exploit do and how does it work? How reliable is the exploit? What conditions need to be met on the target for the exploit to be successful? What type and level of access does the exploit provide? What payloads can you execute with this exploit?
Post-exploitation
This section should cover actions you were able to perform on the target after a successful run of the exploit.
Examples include: privilege escalation, persistence, collection, exfiltration.

How to create Testimonial Carousel using Bootstrap5

Clients' Reviews about Our Services