美女扒开腿免费视频_蜜桃传媒一区二区亚洲av_先锋影音av在线_少妇一级淫片免费放播放_日本泡妞xxxx免费视频软件_一色道久久88加勒比一_熟女少妇一区二区三区_老司机免费视频_潘金莲一级黄色片_精品国产精品国产精品_黑人巨大猛交丰满少妇

代寫COMP6236 Buffer Overflow Attacks

時間:2024-02-26  來源:  作者: 我要糾錯


COMP6236

2024

Coursework 1: Buffer Overflow Attacks and Software Hijacking

This coursework is divided into two parts. Part one is on buffer overflow attacks, which are based on Buffer Overflow Lab. You will be assessed on your ability to successfully exploit buffer overflows and other vulnerabilities and explain your methodology. Part two is on software hijacking, based on Reverse Engineering Lab and will assess your ability to carry out the successful exploitation of software. The coursework is an individual coursework and is worth 30% of the module marking in total.

Notes

The following notes are intended to highlight some common ”gotchas”.

1. Remember that Metasploit’s pattern create can be set to a length of your choice and does not have to be 100.

2. If you get stuck, try consulting the man page for the tools you are using.

3. If an exploit seems to work but closes out immediately instead of giving you a shell, remember that both “Cat” and “binsh” can be forced to remain open. Have a look at their man pages (by running “man cat” and “man /bin/sh”).

4. Remember that if you are counting characters including hex values, then the “x” should be omitted from the count.

5. You might want to increase the memory allocation to your VM when running Ghidra (VirtualBox -> settings -> system).

6. Remember that in Ghidra you can search for functions under the Symbol tree to the left, but you can also click the search option at the top and then select to search for other things, such as strings.

7. The application you have to compromise in part 2 will have multiple popups coming up to communicate both flags and errors, with more than one coming at a time. So please do not close down the application as soon as you get a popup but instead wait a few seconds.

8. Part 2 has more than one flag, so please read all the information displayed by the application on every popup and in the main window as these may change after you patched something.

9. In the settings tab for your VM, find the advanced section (settings -> general -> advanced) and then enable shared clipboard for ”host to virtual machine”. This will allow you to type commands on your host system and then copy them over to the VM.

Submission Instructions

Please use the template provided and submit using Turnitin on the module blackboard page at this link. (You should be able to see the “Assignments” tab on the left panel)

Marking Criteria

Your submission will be marked out of 35 and then refactored to a mark out of 30. The following criteria will be used.

Part

Criteria

Marking Scheme



Part 1


Ability to identify and exploit the vulnerabilities introduced during main lectures and labs, such as buffer overflows.

Up to 20 marks, awarded based on (i) how many flags are correctly retrieved and (ii) the correctness and completeness of the description about vulnerabilities and exploits.



Part 2



Ability to decompile, reverse engineer and patch a given application.

Up to 15 marks, awarded based on (i) how many flags are correctly retrieved and (ii) the correctness and completeness of the description about each

process in the licence-checking function.



Marks calculation

This coursework counts for 30% of the module mark. It has a total of 35 points available which are then refactored to a mark out of 30.





File format

Submitted file is in PDF format, the report is compliant with the provided template. If the format is not PDF, a 5 marks penalty will be applied. If the report is corrupted or cannot be opened, 0 mark will be awarded for the coursework.


Part 1

Setup

As in Reverse Engineering Lab, we will have to use an OVA image. Please download the VM from here, and import it into Virtualbox. To import the OVA, first open VirtualBox, then hit ”CTRL + I” or select ”import appliance” from the ”File” menu (top left). Then click next and follow the installation procedure. Thereafter please check the following before launching the VM:

VirtualBox 6 and earlier - Most university machines

1. Once the machine is imported, single-click on it in VirtualBox and then to the right go to ”networking” and select ”Bridged adaptor”

2. Wait for the VM to boot, and on boot login with User: info and Password: info to see the current IP address printed.

VirtualBox 7

1. You need to go File → Tools → Network Manager and make a host network if one doesn’t exist already.

2. Make sure DHCP enabled is ticked as illustrated in Figure 1 or the VM will hang at boot forever.

3. Then go to VM network settings and check it’s set to that host-only network, and specify the network you created or the one that exists.

4. Wait for the VM to boot, and on boot login with User: info and Password: info to see the current IP address printed.

Troubleshooting: If, after successfully importing it, the VM fails to launch with a networking error, just go to networking settings and change the option to one not already selected.



Figure 1: DHCP enabled

Marks Breakdown

This Lab contains 4 flags. Once you complete each challenge, you will need to submit your flag alongside a step-by-step guide of how you found it on the marking form.

The marks for this are broken down as follows:

1 Mark For each flag.

4 Marks For your step-by-step guide on how you completed the challenge, consisting of:

1 Mark: For clarity of your description.

1 Mark: For identifying and deploying an appropriate exploit.

2 Mark: For the process you used and the troubleshooting and problem-solving you performed.

Ultimately, The aim of the step-by-step guide is to provide the marker with evidence that you have an in- depth understanding of the task at hand. The more creative your guide, the better.

Task1 - Authentication Please

Go to the IP address of your VM in a web browser to open the first challenge. For example

http://192.168.56.101/

Buffer overflow this login system to get to the next task.

Look around the page for clues to help you. Everything you need is there!

When you complete this challenge, you will be given a flag and login details for the next challenge.

Task 2 - Return to win

Login as Task 2 using the credentials you were given at the end of the last challenge. The challenge2 binary is setuid and compiled with an executable stack.

Buffer overflow the binary to become the task2-win user.

Read flag2.txt to proceed to obtain your flag and proceed to the next challenge.

Task 3 - Shellcoding

Login as Task 3 using credentials from the previous task.

The challenge3 binary is setuid and compiled with an executable stack.

Buffer overflow the binary by injecting and returning to some shellcode to become the task3-win user. Read flag3.txt to proceed to obtain your flag and proceed to the next challenge.

Task 4 - Root shell through Ret2Libc

Login as Task 4 using the credentials you got from the previous task. The challenge4 binary is setuid but does not have an executable stack.

Using the ret2libc technique covered in Lab 1, buffer overflow the binary to become root. Read flag4.txt to proceed to obtain your flag.

Submit flags and Methodology

Follow the submission instructions above to submit the flags you found with a step-by-step guide of how you found them.

Part 2

Task 5: Decompile the application

5 Marks Decompile the application and figure out:

1 Marks: Which function checks the license. ( write the function name only)

2 Marks: When this function is run. ( Code and explain the sequence)

2 Marks: How the license key is checked? (What makes a valid license?) ( Code and explain the sequence)

Task 6: Initial patching

5 Marks Initial patching process:

2 Marks Generate an unpatched key to enable app (check value). ( Flag and explain the process)

3 Marks Patch the application to disable online license checks. ( Flag and explain the process)

Task 7: Secondary patching

5 Marks Secondary patching exploits:

2 Marks Patch the application to enable the advanced features. ( Flag and explain the process)

3 Marks Patch the application to remove reporting metrics. ( Code and explain the sequence)

Setup

You may use any Linux distro of your choice so long as you are able to run Ghidra. However, do not use the VM from the previous lab as it will not be able to run the coursework application.

Kali Vagrant The official Kali rolling release Vagrant machine can be installed as follows: For this machine, the username and password are both “vagrant” and this user is in the sudoers group. Create a directory on your host machine, then from the command line run the following commands:

vagrant init kalilinux/rolling vagrant up

Once the machine launches, give it a bit of time and you will be presented with a GUI login. Enter “vagrant” and “vagrant”. Then you can open a terminal in the new VM and install Ghidra.

go to settings in VirtualBox and adjust as needed (be sure to enable 3D acceleration under "display" options) double click the VM to launch it

sudo apt update

sudo apt install openjdk-17-jdk

wget https://github.com/NationalSecurityAgency/ghidra/releases/download/Ghidra_10.2.3

_build/ghidra_10.2.3_PUBLIC_20230208.zip unzip ghidra_10.2.3_PUBLIC_20230208.zip

cd ghidra_10.2.3_PUBLIC

./ghidraRun (wait for a second or two after running this command)

Kali for VirtualBox You can also get the official Kali release for VirtualBox, where both username and password are ’kali’.

https://cdimage.kali.org/kali-2023.3/kali-linux-2023.3-virtualbox-amd64.7z extract with 7zip

Double-click on the "Virtual machine definition" file (blue icon) go to settings in VirtualBox and adjust as needed (be sure to enable 3D acceleration under "display" options)

double click the VM to launch it sudo apt update

sudo apt install openjdk-17-jdk

wget https://github.com/NationalSecurityAgency/ghidra/releases/download/Ghidra_10.2.3

_build/ghidra_10.2.3_PUBLIC_20230208.zip unzip ghidra_10.2.3_PUBLIC_20230208.zip

cd ghidra_10.2.3_PUBLIC

./ghidraRun (wait for a second or two after running this command)

For other Kali install options, please see:

https://www.kali.org/get-kali/#kali-platforms Video guide: https://www.youtube.com/watch?v=Hu1Gs3Jqymw

Thereafter, open a web browser to download the application for this part your coursework.

Download the lab6 application from the following URL: https://git.soton.ac.uk/comp6236/lab6/-

/raw/master/lab6app.zip

Use Ghidra and a hex editor of your choice to reverse engineer the binary and complete the tasks instroduced under ”Tasks and marks breakdown.

You may find the following Assembly instruction reference useful: http://ref.x86asm.net/coder64.html

If you are unable to install Ghidra please ping google or any other site to check your network connection. You will have to close the VM and then change the network options of the VM (VirtualBox -> settings -> network).

FAQ

Question: I made an error in the submission, can I resubmit?

Answer: You can resubmit as many times as you want, until the coursework deadline.

Question: What do you mean by ( Code and explain the sequence ) ?

Answer: It depends on the question, if you want to copy the code and explain what the code does, then it’s fine. You will get some marks for explaining the obvious. However, in Q2 I used the keyword “when”. This means I am looking for the sequence of events in regard to the timeline. Another example, in Q3 When I used the keyword “how” then I am looking for the function/algorithm that is used to generate the key.

Question: How much code are we expected to add for these questions? Obviously, we could add the whole decompiled function, but for the example, I’ve found it in two areas and this would add a lot of source code to my answer. Any recommendations?

Answer: The code itself is not important. In the end, I don’t care how you present it. What is important your problem solving ability to answer the question. I care how you show me, “What you learned, Not what you can do”. (Hint: The use of Pseudo code is highly encouraged.)

Question: What do you mean by ( Flag and explain the sequence ) ?

Answer: Follow the same logic in the previous question. But, this has more weight, so here is a further breakdown

1 Mark: Just the flag.

1 Mark: How you did it.

1 Mark: Why it worked.

1 Mark: Other possible solutions.

1 Mark: What would have been a better implementation.

Please note: Although there is no marks for style, or grammar. If I can’t tell one category from another, I will award a mark for one and not both. For example, if I can’t distinguish between “How you did it” and 請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫 CSC8636 Visual Analysis of the Ocean Microbiome
  • 下一篇:代寫MANG6346 Business Analytics and Risk
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區
    昆明西山國家級風景名勝區
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    美女扒开腿免费视频_蜜桃传媒一区二区亚洲av_先锋影音av在线_少妇一级淫片免费放播放_日本泡妞xxxx免费视频软件_一色道久久88加勒比一_熟女少妇一区二区三区_老司机免费视频_潘金莲一级黄色片_精品国产精品国产精品_黑人巨大猛交丰满少妇
    亚洲熟妇无码av| 中文字幕五月天| 538国产视频| 99成人在线观看| 中文幕无线码中文字蜜桃| 涩视频在线观看| 久久国产高清视频| 少妇的滋味中文字幕bd| 欧美性猛交xxxx乱| theav精尽人亡av| 久久人人爽人人人人片| 玖玖爱在线精品视频| 亚洲一二三四五| 中文字幕一区二区三区人妻在线视频 | 五月婷婷综合激情网| 欧美视频www| chinese全程对白| 永久看片925tv| 尤物在线免费视频| 乳色吐息在线观看| 老女人性淫交视频| 久久久精品人妻一区二区三区| 亚洲一区电影在线观看| 国产老头老太做爰视频| 午夜在线观看一区| 又色又爽的视频| www男人天堂| 精品无码人妻少妇久久久久久| 免费一级黄色录像| 中文字幕免费在线看线人动作大片| 国产香蕉精品视频| a毛片毛片av永久免费| 一区二区黄色片| av片在线免费看| 欧美一级片在线免费观看| 国产真实乱人偷精品| 微拍福利一区二区| 国产大学生自拍| 瑟瑟视频在线观看| 亚洲天堂黄色片| jizz日本免费| 强制高潮抽搐sm调教高h| 精人妻一区二区三区| 国产1区2区在线观看| 成人在线电影网站| 欧美人与禽zoz0善交| 2018国产精品| 亚洲熟女毛茸茸| www.色天使| 波多野结衣办公室双飞 | 日本二区在线观看| 亚洲欧美精品aaaaaa片| 性活交片大全免费看| 先锋影音av在线| 99久久久无码国产精品性波多 | 欧美极品jizzhd欧美仙踪林| 中文字幕一区二区人妻在线不卡 | 亚洲AV无码国产精品| 懂色av懂色av粉嫩av| 懂色av蜜桃av| 野外性满足hd| 特级西西人体wwwww| 国产成人精品综合久久久久99| 免费黄在线观看| 日本一二三不卡视频| 永久免费看mv网站入口78| 成年人网站免费看| 久久久久9999| 好吊一区二区三区视频| 无遮挡aaaaa大片免费看| 黄色在线免费播放| 欧美熟妇精品黑人巨大一二三区| 青青草视频网站| 性欧美13一14内谢| 中字幕一区二区三区乱码| 91精品国自产在线| 久久视频一区二区三区| 午夜精品一区二区三级视频| 日韩视频在线观看免费视频| 亚洲天堂视频一区| 久艹在线观看视频| 国产在线a视频| 国产精品无码网站| 中文字幕国产专区| 老司机深夜福利网站| 日本xxxx免费| 亚洲av无码国产精品久久| b站大片免费直播| 91麻豆免费视频网站| 日韩精品xxx| 国产呦小j女精品视频| 日本理论中文字幕| 中文字幕在线国产| 国产美女永久免费无遮挡| 在线看的片片片免费| 亚洲国产精品无码久久久久高潮 | 男人晚上看的视频| 成人欧美精品一区二区| 欧美黑人欧美精品刺激| 国产视频精品免费| 免费观看av网站| 中文字幕在线观看2018| www.17c.com喷水少妇| 欧洲av一区二区三区| 在线观看欧美一区二区| 男女做爰猛烈刺激| 91超薄肉色丝袜交足高跟凉鞋| 97伦伦午夜电影理伦片| 中文字幕在线观看二区| 中文字幕乱妇无码av在线| 国产精品国产三级国产专业不| 四虎免费在线视频| 国产精品www爽爽爽| 男男做爰猛烈叫床爽爽小说| 强制高潮抽搐sm调教高h| www..com.cn蕾丝视频在线观看免费版| 国产激情无码一区二区三区| 亚洲一区二区自偷自拍 | 日本精品久久久久中文| 无码人妻一区二区三区精品视频| 在线小视频你懂的| 日本黄色录像片| 女性生殖扒开酷刑vk| 男人av资源站| 欧美黄色高清视频| 女人十八毛片嫩草av| 欧洲女同同性吃奶| 黄色aaa视频| 丰满少妇一区二区| 日韩网站在线播放| 亚洲一区二区在线免费| 国产伦精品一区二区免费| 国产婷婷在线观看| 一级少妇精品久久久久久久| 精品国产午夜福利在线观看| 青青草原在线免费观看| 台湾佬美性中文| 男男做爰猛烈叫床爽爽小说| 泷泽萝拉在线播放| 天堂久久精品忘忧草| 亚洲女人毛茸茸高潮| 国产高清视频免费在线观看| 日本妇女毛茸茸| 国产69视频在线观看| 国产精品亚洲无码| 国内毛片毛片毛片毛片毛片| 久草综合在线视频| 在线观看国产网站| 天堂资源在线视频| 美国黄色小视频| 国模私拍在线观看| 久久亚洲无码视频| 绯色av蜜臀vs少妇| www.日本高清| 欧美在线视频第一页| 国产一级免费片| 999福利视频| 91丨porny丨对白| 91社区视频在线观看| 欧美性生交xxxxx| 国产精品国产三级国产专业不| 欧美又粗又大又长| jizz欧美性20| 手机在线播放av| 男人舔女人下部高潮全视频| 黄色片子免费看| 中文字幕在线1| 亚洲熟女乱综合一区二区三区| 美国黄色特级片| 一区二区视频观看| 久久久久亚洲av无码专区首jn| 欧美黄色一级生活片| 中文字幕一区二区三区乱码不卡| 日日噜噜夜夜狠狠久久波多野| 黄色在线观看av| 网站免费在线观看| 一级黄色大片免费看| 蜜桃视频最新网址| 欧美巨胸大乳hitomi| 国产美女喷水视频| 欧美在线一级片| 国产老头和老头xxxx×| 国产精品成人69xxx免费视频| 无码人妻精品一区二区三区温州 | 中文写幕一区二区三区免费观成熟| 欧美午夜激情影院| 免费在线观看污| 国产中年熟女高潮大集合| 丰满少妇一区二区三区| 亚州av综合色区无码一区| 最新版天堂资源在线| 波多野结衣先锋影音| 白丝女仆被免费网站| 黄免费在线观看| 成人黄色短视频| 国产在线免费av| а天堂中文在线资源| 国产精品成人69xxx免费视频| 懂色av粉嫩av蜜臀av一区二区三区| 欧美激情 一区|