subject

You will describe the various methods used to identify vulnerabilities in the source code.

A. Describe how and when you used methods to visually inspect the code to identify the vulnerabilities you found.

B. Describe how and when you utilized the compiler errors and/or warnings to identify the vulnerabilities you found.

C. Explain how and when you used a static analysis tool to identify the vulnerabilities you found.

Code:#include "Login. h" using namespace std; void Login::enterPassword(void){ puts("Enter 8 character password"); gets(Password); } void Login::copyUsername(string str1, string str2){ strcpy(name, str1.c_str()); strcat(name, " = "); strcat(name, str2.c_str()); cout << name; } int Login::copyPassword(){ strcpy(a, "copypassword"); strcpy(b, "copypassword"); strcpy(c, a); strcat(c, b); printf("a = %s\n", a); return 0; } int Login::testUsernamePassword(void) { arg1 = "Test Username and Password."; while (arg1[i] != '\0') { buff[i] = arg1[i]; i++; } buff[i] = '\0'; printf("buff=%s\n", buff); } void Login::isPasswordOK(void) { puts("Enter Password"); gets(passwordCheck); PwStatus = (strcmp(passwordCheck, "goodpass") == 0); if (PwStatus == false) { puts("Access Denied"); } else { puts("Access Granted"); } } Login::Login() { // TODO Auto-generated constructor stub } Login::~Login() { // TODO Auto-generated destructor stub }

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 16:20, kimmmmmmy333
Octothorpe is another name for what common computer keyboard symbol?
Answers: 1
image
Computers and Technology, 23.06.2019 03:00, SKYBLUE1015
What are the different parts of computer
Answers: 2
image
Computers and Technology, 23.06.2019 03:00, jarteria0
State 7 common key's for every keyboard
Answers: 1
image
Computers and Technology, 23.06.2019 12:30, umimgoingtofail
What is the difference between the internet and the world wide web?
Answers: 1