Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question 1 The following is a program that tests a shellcode:

/* To compile, use
gcc -m32 -g -z execstack -o sc2_tiny sc2_tiny.c */
#include
char shellcode[]=
"x31xc0x50x68x2fx2fx73x68x68x2fx62x69x6ex89xe3x50x89xe2x53x89xe1xb0x0bxcdx80";
main() {
char buff[2400];
void (*fp)(void);
strcpy(buff, shellcode);
fp = (void *)buff;
fp();
}

Encode the shellcode so that only printable ASCII characters are used. Note that the encoded version must be the same as the original one after it is decoded. You need to:

1) Modify only the shellcode string in the above program so that it will work properly as the original program (i.e., to create a shell). You need to attach your code along with the evidence that it works properly.

2) Demonstrate that the decoded version is the same as the original shellcode. You can use gdb.

Question 2 Explain how you could exploit the format string vulnerability in the program so that you can cause the program to display the following message: 

I am on the way to become the King of Penetration Testing.
However, you cannot show the following the message:
I am still a novice Penetration Tester.
Then you need to implement and demonstrate your exploitation.

Question 3 Develop and implement an exploitation of the format string vulnerability in the program so that you can create a shell when function exit() is called. For this question, you can assume that the stack is executable (by compiling the program with -z execstack flag). Here you have the freedom to define additional environmental variables.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92533422
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question classyou need to research the topic and discuss

Question: Class, You need to research the topic and discuss the topic in at 500 words with references. Then, reference will not count as a discussion. Question: What would be the impact of predictive modeling on healthca ...

Regional blocs like the eu are straining the british have

Regional blocs like the EU are straining. The British have voted to Brexit! What has caused the tension and what does the future hold - for Brexit and beyond?

If a wooden car has 30 independent components that all must

If a wooden car has 30 independent components that all must function for the wooden car to operate successfully during a race, and the probability of successful operation for any single component is 0.999, what is the pr ...

Query to reterieve data from a customers table in mysql for

Query to reterieve data from a customers table in MySQL for instance who have not placed any orders yet, How to sort results by customers number,How to Modify the query to list customers who have placed fewer than five o ...

Nfs allows the file system on one linux computer to be

NFS allows the file system on one Linux computer to be accessed over a network connection by another Linux system. Discuss the security vulnerabilities of NFS in networked Linux systems, and possible mitigation solutions ...

Question having separate level 1 caches for instructions

Question : Having separate level 1 caches for instructions and data is a popular technique. Describe how this might pay off if a short loop of code that is operating on a giant array. Imagine that instructions and data e ...

Explain the difference between penetration tests and

Explain the difference between penetration tests and security tests. Emphasize that this book will explain things from a security testing perspective.

Question a small computer on a smart card has four page

Question : A small computer on a smart card has four page frames. At the first clock tick, the R bits are 0111 (page 0 is 0, the rest 1). At subsequent clock ticks, the values are 1011, 1010, 0101, 1010, 0010, 1100, and ...

Imagine a small city chambana with a labor demand function

Imagine a small city Chambana with a labor demand function E=200-1/2w and a labor supply function E=2w-100. Assume that there is a sudden influx of 40 perfect substitutes immigrants. a. How does this affect the natives i ...

Explain the difference between penetration tests and

Explain the difference between penetration tests and security tests. Emphasize that this book will explain things from a security testing perspective.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As