Please follow the exact instructions, I need this done this exact way or I will fail this assignment. ALL other posts I
Posted: Sun Jul 10, 2022 11:30 am
Please follow the exact instructions, I need this donethis exact way or I will fail this assignment. ALL other posts Ihave seen on this site do not do this.
Here is my code, I have labeled it to indicate which files are.py files and which ones are .html files. Toreiterate, PLEASE FOLLOW THE EXACT INSTRUCTIONS OR IWILL FAIL.
application.py
forms.py
login.html
register.html
Week 8 Deliverables Overview: This week, you have studied Web application vulnerabilities, password complexity, logs and cryptographic algorithms. The Lab for this week demonstrates your knowledge of this additional knowledge applied using Python functionality. Submission requirements for this project include 2 files. (Zipping them into one file is acceptable and encouraged): Python Web Application Code (Python code for all routes, templates, static files and other files) • Word or PDF file containing your test, pylint results and Cryptographic results. Python Applications for this lab: (total 100 points): 1. (50 points) In this exercise you will update your web site to include a password update form and provide additional validation on the password check. Specifically you should create: a. Password update Form - This Python form allows a previously registered user to reset their password after they have successfully logged in. b. Authentication functions - These Python functions will check the following NIST SP 800-63B criteria are met upon password update: • Use the previous criteria for password length and complexity. (This work should already be done.) Compare the prospective secrets against a list that contains values known to be commonly- used, expected, or compromised (Provided as Common Passwords.txt). • If the chosen secret is found in the list, the application SHALL advise the subscriber that they need to select a different secret. c. Logger - Create a log to log all failed login attempts. The Log should include date, time and IP address. Hints: 1. Start early. This will take you longer than you think. 2. Leverage the File I/O, Flask and Data structures work previously performed in the class. 3. Use functions to enhance code reuse and modularity. 4. Use Python Lists or other data structures to store the Common Passwords and then appropriate search functions to expedite comparisons. Use comments to document your code 5. 6. Test with many combinations. 7. Use pylint to verify the code style - the goal is a 10!
Here is my code, I have labeled it to indicate which files are.py files and which ones are .html files. Toreiterate, PLEASE FOLLOW THE EXACT INSTRUCTIONS OR IWILL FAIL.
application.py
forms.py
login.html
register.html
Week 8 Deliverables Overview: This week, you have studied Web application vulnerabilities, password complexity, logs and cryptographic algorithms. The Lab for this week demonstrates your knowledge of this additional knowledge applied using Python functionality. Submission requirements for this project include 2 files. (Zipping them into one file is acceptable and encouraged): Python Web Application Code (Python code for all routes, templates, static files and other files) • Word or PDF file containing your test, pylint results and Cryptographic results. Python Applications for this lab: (total 100 points): 1. (50 points) In this exercise you will update your web site to include a password update form and provide additional validation on the password check. Specifically you should create: a. Password update Form - This Python form allows a previously registered user to reset their password after they have successfully logged in. b. Authentication functions - These Python functions will check the following NIST SP 800-63B criteria are met upon password update: • Use the previous criteria for password length and complexity. (This work should already be done.) Compare the prospective secrets against a list that contains values known to be commonly- used, expected, or compromised (Provided as Common Passwords.txt). • If the chosen secret is found in the list, the application SHALL advise the subscriber that they need to select a different secret. c. Logger - Create a log to log all failed login attempts. The Log should include date, time and IP address. Hints: 1. Start early. This will take you longer than you think. 2. Leverage the File I/O, Flask and Data structures work previously performed in the class. 3. Use functions to enhance code reuse and modularity. 4. Use Python Lists or other data structures to store the Common Passwords and then appropriate search functions to expedite comparisons. Use comments to document your code 5. 6. Test with many combinations. 7. Use pylint to verify the code style - the goal is a 10!