Understand the stack smashing buffer exploit thoroughly

Assignment Help Software Engineering
Reference no: EM132721488

CPIS 605 Software Security - University of Jeddah

Objective: Understand the stack smashing buffer exploit thoroughly.

1. From the paper "Smashing the stack for fun and profit" by Alephone do the following
a. Download the article by Aleph One (see References). You will be extracting the source code of exploit3.c and exploit4.c files from it.
b. Improve the code of exploit3.c and exploit4.c so that there are no warning messages from gcc even after using the flags as in gcc -ansi -pedantic -Wall.
c. Reduce the size of their compiled binaries by at least 5% as seen by the size command when exactly the same flags are used in the compilation. Make sure no functionality is lost. Do not just remove printf's. Do not use gcc optimization flags.
d. Login as a non-root user. Verify that the exploit still works on the vulnerable program. (It may not!)
e. Turn in a report but also with answers to the questions below, and thoroughly describing your changes, and how you verified that there was no loss of functionality. Include properly indented versions of your exploit[34].c files. Use indent -kr.
f. Answer the question: What is the "environment"?
g. Answer the question: Why does exploit3.c run system("/bin/bash") at the end of main()?

2. Search the web and report on at least four recent (within last five years) buffer overflow attacks or SQL injection. Explain the attacks in two to three pages using your own words.

Attachment:- Software Security.rar

Reference no: EM132721488

Questions Cloud

Compute what is the target unit cost : Target Costing, If company management desires a return equal to 10 percent of the final selling price, what is the target unit cost?
What was lower case cash flow from operations : What was Lower Case's cash flow from operations for 2018? In 2018, Lower Case Productions had cash flows from investing activities of +$50,000
What is a project and what are its main attributes : What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance.
What is the amount of Maren bargain element : Eighteen months later she sold all of the shares for $22 per share. What is the amount of Maren's bargain element
Understand the stack smashing buffer exploit thoroughly : Understand the stack smashing buffer exploit thoroughly - Reduce the size of their compiled binaries by at least 5% as seen by the size command
What does the market expect the two-year treasury rate : According to the unbiased expectations hypothesis, what does the market expect the two-year Treasury rate to be three years from today, E( 4r2)?
Describe prioritizing systems and functions for recovery : Write a 3-4 page APA formatted paper comparing your organization's disaster recovery and business continuity plans with the best practices outlined in your.
What is the net income for the year ended : Ortiz Co.had income from continuing operations of $1,600,000 in 2018. What is the net income for the year ended 31, 12, 2018
Which part of the federal reserve buys and sells securities : Which part of the Federal Reserve buys and sells securities as part of its monetary policy? The US Department of the Treasury. / Board of Governors

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd