subject

You will describe the various methods used to identify vulnerabilities in the source code.

A. Describe how and when you used methods to visually inspect the code to identify the vulnerabilities you found.

B. Describe how and when you utilized the compiler errors and/or warnings to identify the vulnerabilities you found.

C. Explain how and when you used a static analysis tool to identify the vulnerabilities you found.

Code:#include "Login. h" using namespace std; void Login::enterPassword(void){ puts("Enter 8 character password"); gets(Password); } void Login::copyUsername(string str1, string str2){ strcpy(name, str1.c_str()); strcat(name, " = "); strcat(name, str2.c_str()); cout << name; } int Login::copyPassword(){ strcpy(a, "copypassword"); strcpy(b, "copypassword"); strcpy(c, a); strcat(c, b); printf("a = %s\n", a); return 0; } int Login::testUsernamePassword(void) { arg1 = "Test Username and Password."; while (arg1[i] != '\0') { buff[i] = arg1[i]; i++; } buff[i] = '\0'; printf("buff=%s\n", buff); } void Login::isPasswordOK(void) { puts("Enter Password"); gets(passwordCheck); PwStatus = (strcmp(passwordCheck, "goodpass") == 0); if (PwStatus == false) { puts("Access Denied"); } else { puts("Access Granted"); } } Login::Login() { // TODO Auto-generated constructor stub } Login::~Login() { // TODO Auto-generated destructor stub }

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 19:00
The fourth generation of computers emerged between 1970s and 1980s. which technological advancement brought about this generation of computers? which computer architecture was used most in this generation?
Answers: 3
question
Computers and Technology, 22.06.2019 22:30
Who needs to approve a change before it is initiated? (select two.) -change board -client or end user -ceo -personnel manager -project manager
Answers: 1
question
Computers and Technology, 23.06.2019 05:20
What did creator markus “notch" persson initially call his game
Answers: 1
question
Computers and Technology, 23.06.2019 11:30
Which excel file extension stores automated steps for repetitive tasks?
Answers: 1
You know the right answer?
You will describe the various methods used to identify vulnerabilities in the source code.
Questions
question
Mathematics, 03.02.2021 20:50
question
Mathematics, 03.02.2021 20:50
question
Chemistry, 03.02.2021 20:50
question
Chemistry, 03.02.2021 20:50
question
Biology, 03.02.2021 20:50
question
Mathematics, 03.02.2021 20:50