Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question 1. Analyze the malware found in the file Lab09-01.exe using OllyDbg and IDA-Pro to answer the following questions.a. How can you get this malware to install itself?b. What are the command-line options for this program? What is the password requirement?c. How can you use OllyDbg to permanently patch this malware, so that it doesn't require the special command-line password?d. What are the host-based indicators of this malware?e. What are the different actions this malware can be instructed to take via the network?f. 6. Are there any useful network-based signatures for this malware?
Question 2. Analyze the malware found in the file Lab09-02.exe using OllyDbg to answer the following questions.a. What strings do you see statically in the binary?b. What happens when you run this binary?c. How can you get this sample to run its malicious payload?d. What is happening at 0x00401133?e. What arguments are being passed to subroutine 0x00401089?f. What domain name does this malware use?g. What encoding routine is being used to obfuscate the domain name?h. What is the significance of the CreateProcessAcall at 0x0040106E?
Question 3. Given vulnerableserver.exe, use Windows 10, Windbg, and Kali Linux to write an exploit string. Your final deliverable should be:a. A screen shot of the corrupted stack
b. A screenshot of your exploit (from Kali Linux)
Specifics:1) Please leave your EIP as a "dummy placeholder" (0x42424242 in my screenshot above) (no need to find the address of JMP ESP (or equivalent))2) Please set a 0xCC as the first character of your payload3) You must store your student number as the following digits of the payload. Make sure to mask off any illegal characters.
Attachment:- PROG8300 - Assignment.rar
Perfectly done work I am surprised to see that how your weritre has managed to write a quality work in such a limited time.
Marking Rubric: Q1: 30% Q2: 30% Q3: 40% Partial marks awarded for partial answers, but all answers must support your observations/conclusions. Standard deductions: 5% for not having name and assignment # in your Word document 10% for zipping submission 25% for submitting screenshots not inserted/formatted into Word document 100% for any question that does not include supporting screenshots 100% for any question whose screenshots do not have date/time stamp or date/time
Please include screen shots(full screen only) of all tool output that supports your answers to the questions. Paste these screenshots into a MS Word document, add required text/explanation/annotations and submit before due date. The required executable files for 1 and 2 are found in the practical malware zipfile and vulnerableServer.exe can be found on eConestoga in a file named PROG8300_W19_Assignment3_files.zip ( have extracted and sent it along with this document)
What are the authentic websites about the frontiers of the medical research? By the way, it had better be Chinese.
Compare between morality and professional ethics - explain the rationale behind adoption of normative theories and professional codes of conduct.
each stakeholder in the selection process - line managers coworkers and applicants - has distinctly different needs
Which of the following is NOT power of the person?
Restate opposition and most significant arguments in favor of not making a change.
A main body, containing the "meat" of the paper, where you provide the requested information supported by class readings and with your analysis.
Evaluate potential ethical issues that should be considered or guarded against when developing treatment interventions for children or adolescents. Describe steps that should be followed to ensure that potential ethical issues are addressed proper..
How can a nurse improve quality through demonstrating leadership in nursing management in their unit or facility
What foods and liquids she should avoid , What changes she should make and Barriers she will face in making these changes and how they can be overcome.
For this discussion, describe one journal article's findings on validity. The author's overall interpretation of the results
Which of the following statements concerning the maintenance of balance within each risk or rate classification of a life company is (are) correct?
Summarize the kinds of evidence typically used for each constructed argument related to the issue. Be sure to discuss the reasons these kinds of evidence are used and/or are most effective.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd