Write an attack script or a program to display the secret

Assignment Help Computer Engineering
Reference no: EM131309097

COMPUTER SECURITY (SYSTEM SECURITY) ASSIGNMENT

Objectives:

The main objective of this assignment is for the students to understand the security mechanisms in Unix-like operating systems and their interplay with software security, in particular:

-  to learn practical access control mechanisms in Unix operating system, such as files and folder permissions and SUID programs, and how application security is affected by them;

-  to learn how software vulnerabilities can be exploited to circumvent security mechanisms in both applications and operating systems. 

Problem Description:

There are three problems in this assignment. To do this assignment, you will make use of an installation of Ubuntu Linux 12.04 (32 bit) in the Oracle VirtualBox virtual machine. The VirtualBox image of the Ubuntu installation is provided with this document and can be downloaded from the NTULearn site for this assignment, under the Group assignment menu. The assessment of the solutions to the problems listed below will be entirely done inside this particular installation of Ubuntu. 

The Ubuntu installation for this assignment is a clone of the Ubuntu image provided for the tutorial sessions. In particular, it has the following users: admin, alice, bob, charlie, dennis, eve and fong. User admin has the administrative privilege over the system, i.e., it can escalate its privilege to the root user.

The user bob maintains several applications that allows a user to access a certain 'secret', when the right password is provided. These passwords are different from the user account passwords. To distinguish the two, we shall call these passwords as application passwords. Every user is assigned a unique secret and a unique application password. The secrets take the form of a string of alpha numeric characters. The application passwords and the secrets are stored in individual files.  The locations for these files are summarized in Table 1.  The application passwords are strings of lower-case letters, of length at most 14 characters.

Problem 1 - Your first task is to write an attack script or a program to display the secret of any of the following users: alice, charlie, dennis, eve, or fong. The attack program takes one argument, which is the user you want to attack. The attack must work when executed by user charlie.

Problem 2 - For this problem, you are asked to write an attack script/program to display bob's secret. The attack program takes no argument. As in Problem 1, this attack must work when launched by user charlie.

Problem 3 - For Problem 3, you are asked to write a script/program to display the application password and the secret of the admin user. The attack program takes no argument. A successful attack should output something like the following:

Assessment

The assessment is based on two components:

1. Attack code execution: This is broken down to 15% for Problem 1, 15% for Problem 2 and 20% for Problem 3. The assessment of the correctness of your attack will be partially automated, so please make sure you follow the suggested output format as mentioned in the problem description above. Your solutions will be tested in the same virtual machine that is provided with this assignment, but with all password and secret values modified (except for charlie's passwords and secret). So you should make sure that you do not hardcode any of the sample passwords/secrets, other than charlie's, mentioned above in your solutions, as they will not work in the assessment process. Each attack must be successfully executed within 2 (two) minute. This is really a gross approximation; if you implement the attacks correctly, each attack should take only a few seconds to solve the given problem.

2. Report: There is no definitive structure of the report, but here are some guidelines of what we would expect from the report: 

  • As a general guideline we expect a division into three parts, corresponding to the division of the problems. But if you are able to find a single attack that solves all problems, in which case, the division per problem does not work so well and the report will be judged more holistically.
  • We expect a detailed analysis of what are the vulnerabilities and how you exploit them. It is not enough, for example, to say that you do a 'stack overflow' attack. You'd need to explain about the memory layout, what is the effect of the overflow, how do you subvert the control flow of the program, etc. Similarly, where the problem/solution concerns Unix security mechanism, I expect you to articulate clearly the aspects of the control mechanism that cause the vulnerability, and how you exploit them.

Attachment:- Assignment.rar

Reference no: EM131309097

Questions Cloud

Analyze your findings about one identified thief : Analyze your findings about one identified thief. How can you learn from your chosen thief to acknowledge and recognize the motives and behavioral indicators that someone might be spying against the company you work for?
Different type of conflict at a workplace : Read an article or two about different type of conflict at a workplace and give your opinion on what you think about them. Glaring example should be taken from your experience on such conflicts.
Provide all aspects of it implementation into project plan : Provide all aspects of the information technology implementation into the project plan. Describe the goals and objectives of the project. Give a detailed, realistically estimated cost analysis of the entire project.
Create a questionnaire about a new restaurant : Determine the suitability of a seafood restaurant in Ft. Collins, you are preparing a short questionnaire to be completed by people living in the Ft. Collins area.
Write an attack script or a program to display the secret : CE4062-CZ4062: COMPUTER SECURITY (SYSTEM SECURITY) ASSIGNMENT. Your first task is to write an attack script or a program to display the secret of any of the following users: alice, charlie, dennis, eve, or fong. The attack program takes one argumen..
Prepare cover letter to introduce the questionnaire prepared : Prepare a cover letter to introduce the questionnaire prepared for Exercise. The letter should encourage readers to complete the questionnaire and return it quickly in the stamped, addressed envelope.
First time to manage a large business meeting : You have been asked for the first time to manage a large business meeting. The corporate executives will attend, and if they like the way you organize the event, there will be some great recommendations.
What is the government spending multiplier : If government purchases and taxes are increased by $100 billion simultaneously, what will the effect be on equilibrium output (income)?
Rewrite the set of productions in extended backus-naur form : Course: IST 230/CMPSC 360- Rewrite the set of productions above in Extended Backus-Naur Form (EBNF).  Using a Push Down Automaton (PDA), determine if the following function is valid code according to the given set of productions.

Reviews

len1309097

12/12/2016 4:52:36 AM

You can program your solutions using C, Python or bash shell script. All of the problems can be solved with very small programs. If you use C, please make sure that your codes can be compiled from within the virtual machine using gcc. Similarly, if you use Python, please make sure the script can be run inside the provided virtual machine. The Python version installed in the provided virtual machine is version 2.7.3. The solutions are simple enough that each will fit in one C/Python/shell script file so you do not need to use complicated project-base code structures.

Write a Review

Computer Engineering Questions & Answers

  Question1 write down an sql statement to show tables owned

question1. write down an sql statement to show tables owned by user newyear. 2. write down an sql statement to show the

  How many total ip hosts did zenmap find on the network

Based on your interpretation of the Intense Scan, describe the purpose/results of each tests script performed during the report. How many total IP hosts did Zenmap find on the network?

  The chief executive has some sympathy with the notion that

woolsmorth is a large retail company specializing in groceries and clothing. it was founded in 1995 and currently has

  Questionwrite down mips program that prompts user for a

questionwrite down mips program that prompts user for a string reads the string and returns the number of occurrences

  Indicating the main factors that influenced policy decision

Hardware maintenance is usually provided by a defined service contract negotiated between the organization purchasing the hardware and the vendor selling the hardware.

  What are the advantages of modular programming in rts

What are the advantages of modular programming in RTS and can all the tasks  meet their respective deadlines when priority ceiling protocol is used for resource scheduling?

  Cross-validation and percentage split

Comparing the accuracies received utilizing the three "test options": "Utilize the training set", "cross-validation" and "percentage split".

  How standards are intended to create unity

standard issued by either the International Telecommunication Union.It was also stated that "Although standards are intended to create unity, they can have the opposite effect".

  Write a python program to compute the fibonacci numbers

Write a python program to compute the Fibonacci numbers F8, F28, F48. What are the three values? What is the total number of additions needed by your program? Provide your answers as well as your source code.

  How does each theory affect the views of society

How does each theory apply to the family. What are the similarities and the differences. How does each theory affect the views of the individual who is part of the family. How does each theory affect the approach to social change within the family..

  Find a set of criteria for assessment of video clips

find a set of criteria for assessment of video clips suitable for inclusion in Multimedia presentations over the web. Discuss your choices and where they differ from choices you would make for a CD presentation.

  How to generate a class diagram for the entity classes

How to generate a class diagram for the entity classes

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd