Explain how could exploit the format string vulnerability

Assignment Help Computer Engineering
Reference no: EM131724734

Question 1 The following is a program that tests a shellcode:

/* To compile, use
gcc -m32 -g -z execstack -o sc2_tiny sc2_tiny.c */
#include <string.h>
char shellcode[]=
"x31xc0x50x68x2fx2fx73x68x68x2fx62x69x6ex89xe3x50x89xe2x53x89xe1xb0x0bxcdx80";
main() {
char buff[2400];
void (*fp)(void);
strcpy(buff, shellcode);
fp = (void *)buff;
fp();
}

Encode the shellcode so that only printable ASCII characters are used. Note that the encoded version must be the same as the original one after it is decoded. You need to:

1) Modify only the shellcode string in the above program so that it will work properly as the original program (i.e., to create a shell). You need to attach your code along with the evidence that it works properly.

2) Demonstrate that the decoded version is the same as the original shellcode. You can use gdb.

Question 2 Explain how you could exploit the format string vulnerability in the program so that you can cause the program to display the following message: 

I am on the way to become the King of Penetration Testing.
However, you cannot show the following the message:
I am still a novice Penetration Tester.
Then you need to implement and demonstrate your exploitation.

Question 3 Develop and implement an exploitation of the format string vulnerability in the program so that you can create a shell when function exit() is called. For this question, you can assume that the stack is executable (by compiling the program with -z execstack flag). Here you have the freedom to define additional environmental variables.

Reference no: EM131724734

Questions Cloud

Write a class called book : Write a class called Book, that contains instance data for the title, author, publisher, and copyright date. Define the Book constructor to accept
What are the rules used to read faces : What are the rules used to read faces? Why do we control our facial expressions?Why are women better at reading facial expressions than men?
Describe ecosystems theory and provide an example : Describe ecosystems theory and provide an example of how a hypothetical client might interact within various systems in their local community.
Compare nikola tesla and thomas edison : Amongst science scholars, few debates get more heated than the ones that compare Nikola Tesla and Thomas Edison. So, who was the greater inventor?
Explain how could exploit the format string vulnerability : Explain how you could exploit the format string vulnerability in the program so that you can cause the program to display
Determine the wavelength of the light : The movable mirror is displaced 0.373 mm, causing the central spot in the interferometer pattern to change from bright to dark and back to bright 1862 times.
What does the family like to do together : What are the names (first name only), ages, and birth order of all family members?What are the roles of each family member?
What are the expectations each of you has for the other team : What are the expectations each of you has for the other team members?
What is the profit for year after adjusting for these errors : Closing inventories, which had been used in calculating gross profit had been overvalued by £3,000. What is profit for the year after adjusting for these errors

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd