1. Assignment Objectives• Gain practical experience2. Task 1In this lab you will explore Linux exploits (Lecture 4). Used the Linux virtualmachine from Lab 2 or set up your own if you want to. For each task you need todocument which of the protective measures (StackGuard, StackShild, ASLR, etc) thatyou had to turn off in order for the exploit to work. Also show the compile optionsthat you used to compile the program:1) Use the gdb debugger to investigate what happens when you try the overflow.cprogram. Follow the steps of the lecture 4. You should also describe whathappens (1 – 3 paragraphs) using your own words.2) Use the gdb debugger to investigate what happens when you try the meet.cprogram. Follow the steps of the lecture 4. You should also describe whathappens (1 – 3 paragraphs) using your own words.3) Use the shellcode.c program to become root. You should document all the stepsthat you took for it to work. You should also describe what happens (1 – 3paragraphs) using your own words.4) Use the exploit.c program to become root. You should document all the steps thatyou took for it to work. This includes using the get_sp.c program to locate theESP on your system and the calculation that you used when building yoursandwich. You should also describe what happens (1 – 3 paragraphs) using yourown words.5) Use the exploit2.c program to become root. You should document all the stepsthat you took for it to work. This includes using the get_sp.c program to locatethe ESP on your system and the calculation that you used when building yoursandwich. You should also describe what happens (1 – 3 paragraphs) using yourown words.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more