I am attaching the requirements in the pdf and you have the .txt file for the assignment. I am also attaching the rubric for you to check the details. Please let me know if you need any additional information.
Do not forget to Add Screenshots of your work/codes when necessary. I am looking for 100% Full Grade for this exam.
DO NOT BID if you cannot solve the questions !!
Do Not Use Any AI language or Chatgpt The work will be submitted to Turnitin for grading Plagiarism is NOT accepted and will result in an immediate refund request!
Requirements: Explained Above | .doc file
password
123456
12345678
1234
qwerty
12345
dragon
baseball
football
letmein
monkey
abc123
mustang
michael
shadow
master
jennifer
111111
2000
jordan
superman
harley
1234567
hunter
trustno1
ranger
buster
thomas
robert
soccer
batman
test
pass
killer
hockey
george
charlie
andrew
michelle
love
sunshine
jessica
pepper
daniel
access
123456789
654321
joshua
maggie
starwars
silver
william
dallas
yankees
123123
ashley
666666
hello
amanda
orange
biteme
freedom
computer
sexy
thunder
nicole
ginger
heather
hammer
summer
corvette
taylor
austin
1111
merlin
matthew
121212
golfer
cheese
princess
martin
chelsea
patrick
richard
diamond
yellow
bigdog
secret
asdfgh
sparky
cowboy
camaro
anthony
matrix
falcon
iloveyou
bailey
guitar
jackson
purple
scooter
phoenix
aaaaaa
morgan
tigers
porsche
mickey
maverick
cookie
nascar
peanut
justin
131313
money
samantha
steelers
joseph
snoopy
boomer
whatever
iceman
smokey
gateway
dakota
cowboys
eagles
chicken
black
zxcvbn
please
andrea
ferrari
knight
hardcore
melissa
compaq
coffee
booboo
johnny
bulldog
xxxxxx
welcome
james
player
ncc1701
wizard
scooby
charles
junior
internet
mike
brandy
tennis
banana
monster
spider
lakers
miller
rabbit
enter
mercedes
brandon
steven
fender
john
yamaha
diablo
chris
boston
tiger
marine
chicago
rangers
gandalf
winter
barney
edward
raiders
badboy
spanky
bigdaddy
johnson
chester
london
midnight
blue
fishing
0
hannah
slayer
11111111
rachel
redsox
thx1138
asdf
marlboro
panther
zxcvbnm
arsenal
oliver
qazwsx
mother
victoria
7777777
jasper
angel
david
winner
crystal
golden
butthead
viking
jack
iwantu
shannon
murphy
angels
prince
cameron
girls
madison
wilson
carlos
willie
startrek
captain
maddog
jasmine
butter
booger
angela
golf
lauren
rocket
tiffany
theman
dennis
liverpoo
flower
forever
green
jackie
muffin
turtle
sophie
danielle
redskins
toyota
jason
sierra
winston
debbie
giants
packers
newyork
jeremy
casper
bubba
112233
sandra
lovers
mountain
united
cooper
driver
tucker
helpme
pookie
lucky
maxwell
8675309
bear
gators
5150
222222
jaguar
monica
fred
happy
hotdog
gemini
lover
xxxxxxxx
777777
canada
nathan
victor
florida
88888888
nicholas
rosebud
metallic
doctor
trouble
success
stupid
tomcat
warrior
peaches
apples
fish
qwertyui
magic
buddy
dolphins
rainbow
gunner
987654
freddy
alexis
braves
2112
1212
cocacola
xavier
dolphin
testing
bond007
member
calvin
voodoo
7777
samson
alex
apollo
fire
tester
walter
beavis
voyager
bonnie
rush2112
beer
apple
scorpio
jonathan
skippy
sydney
scott
red123
power
gordon
travis
beaver
star
jackass
flyers
232323
zzzzzz
steve
rebecca
scorpion
doggie
legend
ou812
yankee
blazer
bill
runner
birdie
555555
parker
topgun
asdfasdf
heaven
viper
animal
2222
bigboy
4444
arthur
baby
private
godzilla
donald
williams
lifehack
phantom
dave
rock
august
sammy
cool
brian
platinum
jake
bronco
paul
mark
frank
heka6w2
copper
billy
garfield
willow
little
carter
albert
kitten
super
jordan23
eagle1
shelby
america
11111
jessie
house
free
123321
chevy
white
broncos
horney
surfer
nissan
999999
saturn
airborne
elephant
marvin
action
adidas
qwert
kevin
1313
explorer
walker
police
christin
december
benjamin
wolf
sweet
therock
king
online
brooklyn
teresa
cricket
sharon
dexter
racing
gregory
teens
redwings
dreams
michigan
hentai
magnum
87654321
nothing
donkey
trinity
digital
333333
stella
cartman
guinness
123abc
speedy
buffaloCriteria
Meets
Web Form and
Tools
56.25 points
Cipher Tools
33.75 points
In this exercise you will update your web site to include a password update form and provid
check. Specifically you should create:
a. Password update Form – This Python form allows a previously registered user to reset the
successfully logged in.
b. Authentication functions – These Python functions will check the following NIST SP 800
update:
• Use the previous criteria for password length and complexity. (This work should already b
• Compare the prospective secrets against a list that contains values known to be commonly
(Provided as CommonPasswords.txt).
• If the chosen secret is found in the list, the application SHALL advise the subscriber that th
c. Logger – Create a log to log all failed login attempts. The Log should include date, time a
Using the Decrypting Secret Messages sites found in this week’s readings, decrypt the follow
Documentation
22.5 points
Document your results of the application running from your programming environment.
You should also include and discuss your pylint results for the application.
Provide your test results for each requirement in the Web application, associated functions a
Discuss the log file and how it could be used to possibly detect patterns of abuse.
Describe the results of your NIST password complexity functions and how you tested each r
Include the Cipher tool results and write up in this document as well.
Total
Score of Lab 8 -Grading Guidelines,
/ 112.5
Week 8 Deliverables
Overview: This week, you have studied Web application vulnerabilities, password complexity, logs and
cryptographic algorithms. The Lab for this week demonstrates your knowledge of this additional
knowledge applied using Python functionality.
Submission requirements for this project include 2 files. (Zipping them into one file is acceptable and
encouraged):
Python Web Application Code (Python code for all routes, templates, static files and other files)
Word or PDF file containing your test, pylint results and Cryptographic results.
Python Applications for this lab: (total 100 points):
1. (50 points) In this exercise you will update your web site to include a password update form and
provide additional validation on the password check. Specifically you should create:
a. Password update Form – This Python form allows a previously registered user to reset their
password after they have successfully logged in.
b. Authentication functions – These Python functions will check the following NIST SP 800-63B
criteria are met upon password update:
Use the previous criteria for password length and complexity. (This work should already be
done.)
Compare the prospective secrets against a list that contains values known to be commonlyused, expected, or compromised (Provided as CommonPasswords.txt).
If the chosen secret is found in the list, the application SHALL advise the subscriber that they
need to select a different secret.
c. Logger – Create a log to log all failed login attempts. The Log should include date, time and IP
address.
Hints:
1.
2.
3.
4.
Start early. This will take you longer than you think.
Leverage the File I/O, Flask and Data structures work previously performed in the class.
Use functions to enhance code reuse and modularity.
Use Python Lists or other data structures to store the Common Passwords and then appropriate
search functions to expedite comparisons.
5. Use comments to document your code
6. Test with many combinations.
7. Use pylint to verify the code style – the goal is a 10!
2. (30 points) Using the Decrypting Secret Messages sites found in this week’s readings, decrypt the
following messages.
a.
– …. .. … / … -.. . …- / …– —– —– / -.-. .-.. .- …
… / …. .- … / … — — . / … – .-. .- -. –. . / .-. . –…- . … – … .-.-.-
1
b.
c.
U28gdGhpcyBpcyBiYXNlNjQuIE5vdyBJIGtub3cu
— Psuwb Ysm —W oa gc qzsjsf. Bc cbs qcizr dcggwpzm twuifs hvwg cih.
— Sbr Ysm —
Provide the decoded message along with the Cipher and any other parameters you used to solve each
puzzle.
Hints:
1. Use the rumkin site
2. You will need to experiment some to narrow down the possible algorithms used. Some are more
obvious than others.
3. You will know when you have selected the correct Cipher
3. (20 points) Document your results of the application running from your programming environment.
You should also include and discuss your pylint results for the application. Provide your test results for
each requirement in the Web application, associated functions and provide your resulting log files.
Discuss the log file and how it could be used to possibly detect patterns of abuse. Describe the results of
your NIST password complexity functions and how you tested each requirement. Include the Cipher tool
results and write up in this document as well.
Any submissions that do not represent work originating from the student will be submitted to the
Dean’s office and evaluated for possible academic integrity violations and sanctions.
2