Reference no: EM133032966
Lab 11.
Installation
This lab utilizes the Ghidra Reverse engineering tool. To install the tool we need to install both a Java Runtime and Ghidra.
Please run the following commands
sudo apt install default-jdk
wget
unzip ghidra_10.0.4_PUBLIC_20210928.zip
To run Ghidra you need to enter the unzipped ghidra directory and run the ghidraRun file
cd ghidra_10.0.4_PUBLIC
./ghidraRun
Lab 11-1
Download lab11-1 Download lab11-1and determine the necessary input to get the 'Correct' output. You will likely want to use a python file for your input.
Lab 11-2
Download lab11-2 Download lab11-2and determine the necessary input to get the 'Correct' output. This lab is almost certainly the hardest of the class. I recommend that you examine the different functions and flow of the program. Start at the end. What makes 'Correct' appear? What data is being compared against? How is user input manipulated and checked? Determine the operations that manipulate the input and write a python program to reverse them (similar to the decrypt step in Lab 6).
Questions
1. How does lab11-1 manipulate the data in the program? How did you determine the correct answer?
2. What operations are occurring in lab11-2? Describe the steps you took to arrive at your solution.
Deliverables
[lab11-1.py]: A python file that when run with lab11-1 will result in the correct output
[lab11-2.py]: A python file that when run with lab11-2 will result in the correct output. This file should essentially work backwards from the provided data within the program. It is not acceptable to just print out the answer.
Attachment:- Lab 11.rar