Assessing Web Security in E-Learning Systems
Downloads
The exponentially evolution of the internet and the increasing sophistication of cyber threats have made securing web servers and web applications a critical concern in today's digital landscape. This research explores the security vulnerabilities of e-learning platforms, particularly Moodle, and demonstrates practical exploitation methods to highlight the risks. A key focus is the development and deployment of a custom script to create a trojan virus leveraging the Right-to-Left Override (RLO) technique. This malware, disguised as a legitimate e-learning material, infiltrates the platform, lists system files, and injects malicious code into Python files, showcasing a high-impact threat vector.
Downloads
S. Qadir and S. Quadri, "Information Availability: An Insight into the Most Important Attribute of Information Security," Journal of Information Security, 2015.
M. Walker, "Certified Ethical Hacker Exam Guide," SYBEX, 2012, pp. 48-55.
D. Ghimiray and O. Buxton, "Hacker Types: Black Hat, White Hat, and Gray Hat Hackers," 03 11 2023. [Online]. Available: https://www.avast.com/c-hacker-types. Accessed September 7, 2024.
R. Messier, C|EH - Certified Ethical Hacker - Study guide, SYBEX, 2023.
J. Grossman, R. Hansen, P. Petkov, A. Rage and S. Fogie, "XSS Attacks: Cross Site Scripting Exploits and Defense," in XSS Attacks: Cross Site Scripting Exploits and Defense, Syngress, 2007, pp. 67-75.
Malwarebytes, "Malware," [Online]. Available: https://www.malwarebytes.com/malware. Accessed October 15, 2024.
M. ATT&CK, "Masquerading: Right-to-Left Override," 14 10 2021. [Online]. Available: https://attack.mitre.org/techniques/T1036/002/. Accessed October 9, 2024.