Explain how could exploit the format string vulnerability

Assignment Help Computer Engineering
Reference no: EM131724734

Question 1 The following is a program that tests a shellcode:

/* To compile, use
gcc -m32 -g -z execstack -o sc2_tiny sc2_tiny.c */
#include <string.h>
char shellcode[]=
"x31xc0x50x68x2fx2fx73x68x68x2fx62x69x6ex89xe3x50x89xe2x53x89xe1xb0x0bxcdx80";
main() {
char buff[2400];
void (*fp)(void);
strcpy(buff, shellcode);
fp = (void *)buff;
fp();
}

Encode the shellcode so that only printable ASCII characters are used. Note that the encoded version must be the same as the original one after it is decoded. You need to:

1) Modify only the shellcode string in the above program so that it will work properly as the original program (i.e., to create a shell). You need to attach your code along with the evidence that it works properly.

2) Demonstrate that the decoded version is the same as the original shellcode. You can use gdb.

Question 2 Explain how you could exploit the format string vulnerability in the program so that you can cause the program to display the following message: 

I am on the way to become the King of Penetration Testing.
However, you cannot show the following the message:
I am still a novice Penetration Tester.
Then you need to implement and demonstrate your exploitation.

Question 3 Develop and implement an exploitation of the format string vulnerability in the program so that you can create a shell when function exit() is called. For this question, you can assume that the stack is executable (by compiling the program with -z execstack flag). Here you have the freedom to define additional environmental variables.

Reference no: EM131724734

Questions Cloud

Write a class called book : Write a class called Book, that contains instance data for the title, author, publisher, and copyright date. Define the Book constructor to accept
What are the rules used to read faces : What are the rules used to read faces? Why do we control our facial expressions?Why are women better at reading facial expressions than men?
Describe ecosystems theory and provide an example : Describe ecosystems theory and provide an example of how a hypothetical client might interact within various systems in their local community.
Compare nikola tesla and thomas edison : Amongst science scholars, few debates get more heated than the ones that compare Nikola Tesla and Thomas Edison. So, who was the greater inventor?
Explain how could exploit the format string vulnerability : Explain how you could exploit the format string vulnerability in the program so that you can cause the program to display
Determine the wavelength of the light : The movable mirror is displaced 0.373 mm, causing the central spot in the interferometer pattern to change from bright to dark and back to bright 1862 times.
What does the family like to do together : What are the names (first name only), ages, and birth order of all family members?What are the roles of each family member?
What are the expectations each of you has for the other team : What are the expectations each of you has for the other team members?
What is the profit for year after adjusting for these errors : Closing inventories, which had been used in calculating gross profit had been overvalued by £3,000. What is profit for the year after adjusting for these errors

Reviews

Write a Review

Computer Engineering Questions & Answers

  How many words are required for virtual memory

A system has a virtual memory space of 8 virtual pages for a process with 8 blocks per page and 4 words per block. The main memory consists of 4 page frames with 4 blocks per page and 8 words per block. How many words are required for virtual memo..

  Improving the response to disaster

Also determine if you may find how the plans helped officials improve the response to disaster. How do the plans help the recovery?

  How does rsa algorithm differ from data encryption standard

How does the RSA algorithm differ from the Data Encryption Standard (DES)? A security engineer uses a digital certificate and Pretty Good Privacy (PGP) when sending an e-mail. What is the digital certificate used for?

  Discuss difference between application and systems program

Discuss in details the difference between an application program and a systems program? Make sure to provide examples to justify your response.

  Improve understanding of propositional predicate logic

Improve your understanding of propositional and first-order predicate logic, including their use in mechanized reasoning.

  Calculate the slope and length of sides

Write a program that calculates the slope and length of sides and the perimeter of a rectangle given four of its vertices as ordered pairs (x,y).

  Give description on wireless communication

As an IT consultant, you have been tasked to implement wireless communication for a car company with about with 1500 associates. In four locations.

  What would be the average disk access time

Are the people who are against adding RAID to the system correct in their assertion that 50% slower disks will result in revenues declining to $5,000 per hour?

  Perform a swot analysis on the viability of upgrading to

you are a junior network administrator for wingtip toys a medium-sized toy manufacturing company with approximately 100

  Define place to manage ongoing security

what kinds of corporate procedures will you put in place to manage ongoing security of the banking industry resources

  Determine the type of the appointment to be loaded

Improve your Appointment program by giving the user the option to add new Appointments. The user must specify the type of the appointment, the description, and the date and time.

  What are the feelings positive or negative

IT administrators in small companies must often execute several functions at the same time like network administrator, database administrator, user consultant and others. Compared to their situation, their colleagues in larger companies can get mo..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd