Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Task: You are required to create and deliver a presentation providing an analysis of an existing software exploit (therefore you are not required to craft a new, unknown exploit yourself).

You should describe the history of the exploit, show clearly how it works, provide a small runnable code example that illustrates the problem and show how the exploit can be fixed. As a second example of the exploit, you must also include code from a reasonably-sized working application that exhibits the problem and provide a patch to fix the exploit in that application.

Note: the code can be in any language running on any operating system as long as the exploit can be demonstrated safely in-class and assessed. Demonstrated safely means that you many not hack into any systems internal or external to the University, nor may you engage in any conduct that would violate the Student

Charter.
Choose from:
• Buffer overflows (heap-based only)
• SQL injections (second-order only)
• Shellcoding
• Cross-site scripting (XSS)
• Insecure protocols
• Exploiting a device (hardware e.g., modem, printer, router etc.)

Put your team members and your choice on the unit discussion board. There are four deliverables for this assignment:
1. A PowerPoint presentation (60 slides, minimum) about your chosen exploit which you will both deliver to the class. Use the standard SCSS template. As part of the presentation you must demonstrate your exploit and fix it live. Allow 45 minutes for your presentation and 15 minutes for questions.

2. A user manual that describes how to install and configure a system to demonstrate your exploit, exactly as per your presentation.
3. Any software required to demonstrate your exploit.
4. Copies of any files used as references in digital format (e.g. pdf files for journal articles or mht files for web pages).

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91607931

Have any Question?


Related Questions in Computer Engineering

Design a combinational circuit with three inputs a b and c

Design a combinational circuit with three inputs: A, B, and C, D and the output W. The output should be 1 only when the values of A, B interpreted as an unsigned integer (AB) is equal to the values of C, D interpreted as ...

The mean household income in a country in a recent year was

The mean household income in a country in a recent year was about ?$69,762 and the standard deviation was about ?$85,000. ?(The median income was ?$55,148?.) ?a) If a Normal model was used for these? incomes, what would ...

Question need two different postsresponses with 200 words

Question: need two different posts(responses) with 200 words each on the below topic. There are three levels of management hierarchy: strategic, managerial and operational. Part 1: Review at least 4 academically reviewed ...

We have seen how dynamic arrays enable arrays to grow while

We have seen how dynamic arrays enable arrays to grow while still achieving constant-time amortized performance. This problem concerns extending dynamic arrays to let them both grow and shrink on demand. a) Consider an u ...

What effect does the teacher have on creating a learning

What effect does the teacher have on creating a learning environment with little to no behavior problems?

You are a systems analyst at outback outsourcing a firm

You are a systems analyst at Outback Outsourcing, a firm that handles payroll processing for many large companies. Outback Outsourcing uses a combination of payroll package programs and in-house developed software to del ...

Jamie dimon changed the business model for jpmorgan chase

Jamie Dimon changed the business model for JPMorgan Chase in 2008. In the process, the bank gave enormous trading authority to one individual. What are the ERM strengths and weaknesses of this strategy?

What is the transmission type transmission form

What is the Transmission Type, Transmission Form, Transmission Speed, Address for Transmission and Collusion for hubs?

Question as a junior congress person you have been asked to

Question: As a junior congress person you have been asked to help promote a bill to allow casino gambling in your state. There is much opposition to this bill. Using distributive bargaining, discuss the pros and cons whi ...

A report claims that for the investment portfolios with a

A report claims that for the investment portfolios with a single stock had a standard deviation of 0.57, while the returns for portfolios with 31 stocks have a standard deviation of 0.325. Explain how the standard deviat ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As