subject

You will describe the various methods used to identify vulnerabilities in the source code.

A. Describe how and when you used methods to visually inspect the code to identify the vulnerabilities you found.

B. Describe how and when you utilized the compiler errors and/or warnings to identify the vulnerabilities you found.

C. Explain how and when you used a static analysis tool to identify the vulnerabilities you found.

Code:#include "Login. h" using namespace std; void Login::enterPassword(void){ puts("Enter 8 character password"); gets(Password); } void Login::copyUsername(string str1, string str2){ strcpy(name, str1.c_str()); strcat(name, " = "); strcat(name, str2.c_str()); cout << name; } int Login::copyPassword(){ strcpy(a, "copypassword"); strcpy(b, "copypassword"); strcpy(c, a); strcat(c, b); printf("a = %s\n", a); return 0; } int Login::testUsernamePassword(void) { arg1 = "Test Username and Password."; while (arg1[i] != '\0') { buff[i] = arg1[i]; i++; } buff[i] = '\0'; printf("buff=%s\n", buff); } void Login::isPasswordOK(void) { puts("Enter Password"); gets(passwordCheck); PwStatus = (strcmp(passwordCheck, "goodpass") == 0); if (PwStatus == false) { puts("Access Denied"); } else { puts("Access Granted"); } } Login::Login() { // TODO Auto-generated constructor stub } Login::~Login() { // TODO Auto-generated destructor stub }

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 08:30
1.the index finger on your right hand types the f r v 4 j u m 7 h y 6 n lo.9 j u 7 m g t 5 b 2.if you need to multiply 400, 2, and 1 ½, what would you type on the numeric keypad? 400*2*1.5 400/2*1.5 400/2/1.5 400*2*1½ 3.select all examples of proper keyboarding technique. rest your fingers gently on the home row or home keys. slouch in your chair. rest your palms on the keyboard. relax your fingers. keep your hands lower than your elbows.
Answers: 1
question
Computers and Technology, 22.06.2019 10:00
When is an original work considered public domain? a. when posted via social media b. when it is posted on the internet c. when a copyright symbol is not included with the piece of work d. when explicit permission is given by the author / owner
Answers: 1
question
Computers and Technology, 22.06.2019 21:40
Develop a function to create a document in the mongodb database “city” in the collection “inspections.” be sure it can handle error conditions gracefully. a. input -> argument to function will be set of key/value pairs in the data type acceptable to the mongodb driver insert api call b. return -> true if successful insert else false (require a screenshot)
Answers: 2
question
Computers and Technology, 22.06.2019 23:50
List a few alternative options and input and output over the standerd keyboard and monitor. explain their functioning in details.
Answers: 2
You know the right answer?
You will describe the various methods used to identify vulnerabilities in the source code.
Questions
question
Mathematics, 17.12.2020 22:30
question
Mathematics, 17.12.2020 22:30
question
Social Studies, 17.12.2020 22:30
question
Mathematics, 17.12.2020 22:30
question
Mathematics, 17.12.2020 22:30
question
Mathematics, 17.12.2020 22:30
question
Social Studies, 17.12.2020 22:30
Questions on the website: 13722361