日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

代寫COMP6236 Buffer Overflow Attacks

時間:2024-02-26  來源:  作者: 我要糾錯


COMP6236

2024

Coursework 1: Buffer Overflow Attacks and Software Hijacking

This coursework is divided into two parts. Part one is on buffer overflow attacks, which are based on Buffer Overflow Lab. You will be assessed on your ability to successfully exploit buffer overflows and other vulnerabilities and explain your methodology. Part two is on software hijacking, based on Reverse Engineering Lab and will assess your ability to carry out the successful exploitation of software. The coursework is an individual coursework and is worth 30% of the module marking in total.

Notes

The following notes are intended to highlight some common ”gotchas”.

1. Remember that Metasploit’s pattern create can be set to a length of your choice and does not have to be 100.

2. If you get stuck, try consulting the man page for the tools you are using.

3. If an exploit seems to work but closes out immediately instead of giving you a shell, remember that both “Cat” and “binsh” can be forced to remain open. Have a look at their man pages (by running “man cat” and “man /bin/sh”).

4. Remember that if you are counting characters including hex values, then the “x” should be omitted from the count.

5. You might want to increase the memory allocation to your VM when running Ghidra (VirtualBox -> settings -> system).

6. Remember that in Ghidra you can search for functions under the Symbol tree to the left, but you can also click the search option at the top and then select to search for other things, such as strings.

7. The application you have to compromise in part 2 will have multiple popups coming up to communicate both flags and errors, with more than one coming at a time. So please do not close down the application as soon as you get a popup but instead wait a few seconds.

8. Part 2 has more than one flag, so please read all the information displayed by the application on every popup and in the main window as these may change after you patched something.

9. In the settings tab for your VM, find the advanced section (settings -> general -> advanced) and then enable shared clipboard for ”host to virtual machine”. This will allow you to type commands on your host system and then copy them over to the VM.

Submission Instructions

Please use the template provided and submit using Turnitin on the module blackboard page at this link. (You should be able to see the “Assignments” tab on the left panel)

Marking Criteria

Your submission will be marked out of 35 and then refactored to a mark out of 30. The following criteria will be used.

Part

Criteria

Marking Scheme



Part 1


Ability to identify and exploit the vulnerabilities introduced during main lectures and labs, such as buffer overflows.

Up to 20 marks, awarded based on (i) how many flags are correctly retrieved and (ii) the correctness and completeness of the description about vulnerabilities and exploits.



Part 2



Ability to decompile, reverse engineer and patch a given application.

Up to 15 marks, awarded based on (i) how many flags are correctly retrieved and (ii) the correctness and completeness of the description about each

process in the licence-checking function.



Marks calculation

This coursework counts for 30% of the module mark. It has a total of 35 points available which are then refactored to a mark out of 30.





File format

Submitted file is in PDF format, the report is compliant with the provided template. If the format is not PDF, a 5 marks penalty will be applied. If the report is corrupted or cannot be opened, 0 mark will be awarded for the coursework.


Part 1

Setup

As in Reverse Engineering Lab, we will have to use an OVA image. Please download the VM from here, and import it into Virtualbox. To import the OVA, first open VirtualBox, then hit ”CTRL + I” or select ”import appliance” from the ”File” menu (top left). Then click next and follow the installation procedure. Thereafter please check the following before launching the VM:

VirtualBox 6 and earlier - Most university machines

1. Once the machine is imported, single-click on it in VirtualBox and then to the right go to ”networking” and select ”Bridged adaptor”

2. Wait for the VM to boot, and on boot login with User: info and Password: info to see the current IP address printed.

VirtualBox 7

1. You need to go File → Tools → Network Manager and make a host network if one doesn’t exist already.

2. Make sure DHCP enabled is ticked as illustrated in Figure 1 or the VM will hang at boot forever.

3. Then go to VM network settings and check it’s set to that host-only network, and specify the network you created or the one that exists.

4. Wait for the VM to boot, and on boot login with User: info and Password: info to see the current IP address printed.

Troubleshooting: If, after successfully importing it, the VM fails to launch with a networking error, just go to networking settings and change the option to one not already selected.



Figure 1: DHCP enabled

Marks Breakdown

This Lab contains 4 flags. Once you complete each challenge, you will need to submit your flag alongside a step-by-step guide of how you found it on the marking form.

The marks for this are broken down as follows:

1 Mark For each flag.

4 Marks For your step-by-step guide on how you completed the challenge, consisting of:

1 Mark: For clarity of your description.

1 Mark: For identifying and deploying an appropriate exploit.

2 Mark: For the process you used and the troubleshooting and problem-solving you performed.

Ultimately, The aim of the step-by-step guide is to provide the marker with evidence that you have an in- depth understanding of the task at hand. The more creative your guide, the better.

Task1 - Authentication Please

Go to the IP address of your VM in a web browser to open the first challenge. For example

http://192.168.56.101/

Buffer overflow this login system to get to the next task.

Look around the page for clues to help you. Everything you need is there!

When you complete this challenge, you will be given a flag and login details for the next challenge.

Task 2 - Return to win

Login as Task 2 using the credentials you were given at the end of the last challenge. The challenge2 binary is setuid and compiled with an executable stack.

Buffer overflow the binary to become the task2-win user.

Read flag2.txt to proceed to obtain your flag and proceed to the next challenge.

Task 3 - Shellcoding

Login as Task 3 using credentials from the previous task.

The challenge3 binary is setuid and compiled with an executable stack.

Buffer overflow the binary by injecting and returning to some shellcode to become the task3-win user. Read flag3.txt to proceed to obtain your flag and proceed to the next challenge.

Task 4 - Root shell through Ret2Libc

Login as Task 4 using the credentials you got from the previous task. The challenge4 binary is setuid but does not have an executable stack.

Using the ret2libc technique covered in Lab 1, buffer overflow the binary to become root. Read flag4.txt to proceed to obtain your flag.

Submit flags and Methodology

Follow the submission instructions above to submit the flags you found with a step-by-step guide of how you found them.

Part 2

Task 5: Decompile the application

5 Marks Decompile the application and figure out:

1 Marks: Which function checks the license. ( write the function name only)

2 Marks: When this function is run. ( Code and explain the sequence)

2 Marks: How the license key is checked? (What makes a valid license?) ( Code and explain the sequence)

Task 6: Initial patching

5 Marks Initial patching process:

2 Marks Generate an unpatched key to enable app (check value). ( Flag and explain the process)

3 Marks Patch the application to disable online license checks. ( Flag and explain the process)

Task 7: Secondary patching

5 Marks Secondary patching exploits:

2 Marks Patch the application to enable the advanced features. ( Flag and explain the process)

3 Marks Patch the application to remove reporting metrics. ( Code and explain the sequence)

Setup

You may use any Linux distro of your choice so long as you are able to run Ghidra. However, do not use the VM from the previous lab as it will not be able to run the coursework application.

Kali Vagrant The official Kali rolling release Vagrant machine can be installed as follows: For this machine, the username and password are both “vagrant” and this user is in the sudoers group. Create a directory on your host machine, then from the command line run the following commands:

vagrant init kalilinux/rolling vagrant up

Once the machine launches, give it a bit of time and you will be presented with a GUI login. Enter “vagrant” and “vagrant”. Then you can open a terminal in the new VM and install Ghidra.

go to settings in VirtualBox and adjust as needed (be sure to enable 3D acceleration under "display" options) double click the VM to launch it

sudo apt update

sudo apt install openjdk-17-jdk

wget https://github.com/NationalSecurityAgency/ghidra/releases/download/Ghidra_10.2.3

_build/ghidra_10.2.3_PUBLIC_20230208.zip unzip ghidra_10.2.3_PUBLIC_20230208.zip

cd ghidra_10.2.3_PUBLIC

./ghidraRun (wait for a second or two after running this command)

Kali for VirtualBox You can also get the official Kali release for VirtualBox, where both username and password are ’kali’.

https://cdimage.kali.org/kali-2023.3/kali-linux-2023.3-virtualbox-amd64.7z extract with 7zip

Double-click on the "Virtual machine definition" file (blue icon) go to settings in VirtualBox and adjust as needed (be sure to enable 3D acceleration under "display" options)

double click the VM to launch it sudo apt update

sudo apt install openjdk-17-jdk

wget https://github.com/NationalSecurityAgency/ghidra/releases/download/Ghidra_10.2.3

_build/ghidra_10.2.3_PUBLIC_20230208.zip unzip ghidra_10.2.3_PUBLIC_20230208.zip

cd ghidra_10.2.3_PUBLIC

./ghidraRun (wait for a second or two after running this command)

For other Kali install options, please see:

https://www.kali.org/get-kali/#kali-platforms Video guide: https://www.youtube.com/watch?v=Hu1Gs3Jqymw

Thereafter, open a web browser to download the application for this part your coursework.

Download the lab6 application from the following URL: https://git.soton.ac.uk/comp6236/lab6/-

/raw/master/lab6app.zip

Use Ghidra and a hex editor of your choice to reverse engineer the binary and complete the tasks instroduced under ”Tasks and marks breakdown.

You may find the following Assembly instruction reference useful: http://ref.x86asm.net/coder64.html

If you are unable to install Ghidra please ping google or any other site to check your network connection. You will have to close the VM and then change the network options of the VM (VirtualBox -> settings -> network).

FAQ

Question: I made an error in the submission, can I resubmit?

Answer: You can resubmit as many times as you want, until the coursework deadline.

Question: What do you mean by ( Code and explain the sequence ) ?

Answer: It depends on the question, if you want to copy the code and explain what the code does, then it’s fine. You will get some marks for explaining the obvious. However, in Q2 I used the keyword “when”. This means I am looking for the sequence of events in regard to the timeline. Another example, in Q3 When I used the keyword “how” then I am looking for the function/algorithm that is used to generate the key.

Question: How much code are we expected to add for these questions? Obviously, we could add the whole decompiled function, but for the example, I’ve found it in two areas and this would add a lot of source code to my answer. Any recommendations?

Answer: The code itself is not important. In the end, I don’t care how you present it. What is important your problem solving ability to answer the question. I care how you show me, “What you learned, Not what you can do”. (Hint: The use of Pseudo code is highly encouraged.)

Question: What do you mean by ( Flag and explain the sequence ) ?

Answer: Follow the same logic in the previous question. But, this has more weight, so here is a further breakdown

1 Mark: Just the flag.

1 Mark: How you did it.

1 Mark: Why it worked.

1 Mark: Other possible solutions.

1 Mark: What would have been a better implementation.

Please note: Although there is no marks for style, or grammar. If I can’t tell one category from another, I will award a mark for one and not both. For example, if I can’t distinguish between “How you did it” and 請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫 CSC8636 Visual Analysis of the Ocean Microbiome
  • 下一篇:代寫MANG6346 Business Analytics and Risk
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區
    昆明西山國家級風景名勝區
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

              9000px;">

                        91国产视频在线观看| 这里只有精品免费| 国产精品一区二区三区四区| 日韩av不卡在线观看| 一区二区三区中文字幕在线观看| 中文字幕av不卡| 国产日韩欧美a| 久久久99久久| 国产精品嫩草久久久久| 国产精品污网站| 亚洲同性同志一二三专区| 欧美激情一区二区在线| 国产精品免费丝袜| 亚洲乱码国产乱码精品精的特点 | 精品国产制服丝袜高跟| 欧美成人性战久久| 久久久久国产精品免费免费搜索| 欧美一区二区视频在线观看| 欧美电影免费观看高清完整版在线观看| 欧美性猛交xxxxxx富婆| 欧美电影一区二区| 欧美xxxx老人做受| 久久精品人人做人人综合| 国产欧美日韩精品在线| 亚洲天堂网中文字| 丝袜亚洲另类欧美| 精品亚洲欧美一区| 色香蕉久久蜜桃| 欧美一区二区三区思思人| 久久久噜噜噜久噜久久综合| 最新不卡av在线| 视频一区视频二区中文字幕| 国产精品系列在线观看| 97精品国产露脸对白| 这里只有精品视频在线观看| 国产亚洲一区字幕| 一区二区三区久久| 黑人巨大精品欧美黑白配亚洲| 成人一级黄色片| 欧美一区二区观看视频| 国产精品乱码一区二区三区软件| 一区二区三区成人| 国产成人精品免费| 91麻豆精品国产91久久久更新时间 | 午夜激情综合网| 国产成人自拍高清视频在线免费播放| 91在线免费播放| 日韩免费高清电影| 一区二区三区不卡视频在线观看| 久久成人免费网站| 欧美无乱码久久久免费午夜一区| 久久综合久久综合久久| 午夜视频在线观看一区二区三区 | 一区二区三区中文字幕| 韩国一区二区在线观看| 欧亚一区二区三区| 国产精品久久99| 国模无码大尺度一区二区三区| 色综合久久久久| 国产精品乱子久久久久| 极品尤物av久久免费看| 91精品国产高清一区二区三区蜜臀| 亚洲视频网在线直播| 国产宾馆实践打屁股91| 精品久久久久香蕉网| 日韩精品一区第一页| 欧美日韩一区二区电影| 亚洲美女在线国产| 99国产精品视频免费观看| 欧美tk—视频vk| 日本美女一区二区三区视频| 欧美日韩高清影院| 亚洲一级二级三级| 欧美体内she精视频| |精品福利一区二区三区| 顶级嫩模精品视频在线看| 精品国产区一区| 免费成人在线视频观看| 欧美日韩精品久久久| 一区二区高清免费观看影视大全| 色综合一个色综合亚洲| 亚洲男同性视频| 91福利国产成人精品照片| 亚洲欧洲综合另类在线| 91在线一区二区三区| 亚洲欧洲综合另类| 欧美巨大另类极品videosbest| 亚洲大型综合色站| 欧美一区二区久久久| 国产综合久久久久影院| 欧美经典一区二区三区| 91啦中文在线观看| 亚洲6080在线| 精品久久一区二区| 成人免费视频国产在线观看| 亚洲日穴在线视频| 欧美日本一道本在线视频| 久久精品国产亚洲a| 国产日韩欧美精品电影三级在线| 91免费精品国自产拍在线不卡| 亚洲乱码国产乱码精品精98午夜 | aaa国产一区| 亚洲一区二区三区四区在线| 欧美福利一区二区| 国产二区国产一区在线观看| 国产精品乱码人人做人人爱 | 国产日韩三级在线| 欧美日韩精品一区二区三区四区| 日产国产欧美视频一区精品| 久久久久成人黄色影片| 一本大道久久精品懂色aⅴ| 香蕉乱码成人久久天堂爱免费| 日韩免费视频一区二区| www.在线成人| 日本一区中文字幕| 综合久久综合久久| 精品伦理精品一区| 色成年激情久久综合| 韩日欧美一区二区三区| 亚洲综合视频在线观看| xfplay精品久久| 欧美性猛交xxxx黑人交| 岛国精品一区二区| 日本在线不卡视频一二三区| 国产精品毛片高清在线完整版| 制服丝袜亚洲精品中文字幕| 99久久久国产精品| 久久99久久精品| 一区二区三区四区av| 亚洲国产高清不卡| 欧美videofree性高清杂交| 色欧美乱欧美15图片| 粉嫩在线一区二区三区视频| 三级在线观看一区二区| 亚洲午夜激情网站| 中文字幕精品三区| 精品美女在线播放| 欧美日韩亚洲综合在线| 91蜜桃免费观看视频| 福利电影一区二区三区| 狠狠色丁香久久婷婷综| 日本不卡一二三区黄网| 亚洲国产精品一区二区www在线| 国产精品欧美经典| 欧美国产一区视频在线观看| 亚洲精品一区二区三区蜜桃下载 | 中文字幕一区二区三区在线播放| 久久久久久久久久看片| 日韩免费在线观看| 日韩欧美色综合网站| 欧美老肥妇做.爰bbww| 欧美美女视频在线观看| 91精品国产一区二区人妖| 欧美日韩中文字幕精品| 在线观看成人免费视频| 色94色欧美sute亚洲13| jvid福利写真一区二区三区| 成人福利视频网站| 91农村精品一区二区在线| 91麻豆精品在线观看| 欧美性感一类影片在线播放| 欧美日韩一区二区三区不卡| 欧美人伦禁忌dvd放荡欲情| 欧美精品国产精品| 欧美一三区三区四区免费在线看| 欧美一区二区三区日韩视频| 久久综合久久鬼色| 欧美极品少妇xxxxⅹ高跟鞋| 亚洲丝袜另类动漫二区| 亚洲第一二三四区| 国产在线精品一区二区三区不卡| 国产精品夜夜爽| 99精品国产热久久91蜜凸| 精品视频在线视频| 欧美videofree性高清杂交| 国产日韩精品一区二区浪潮av| 国产精品乱码妇女bbbb| 亚洲一级二级三级| 久久 天天综合| 91麻豆国产精品久久| 欧美中文字幕一区二区三区亚洲| 欧美一区午夜精品| 中文字幕一区二区三区不卡 | 亚洲妇女屁股眼交7| 久久成人精品无人区| 国产成人亚洲综合a∨婷婷| 91在线观看高清| 9191国产精品| 国产视频一区二区在线| 亚洲一二三四在线| 国产精品白丝jk黑袜喷水| 在线观看视频91| 国产日产亚洲精品系列| 亚洲成a人片在线观看中文| 国产在线精品国自产拍免费| 欧美伊人久久大香线蕉综合69| 精品美女在线播放| 亚洲国产欧美另类丝袜| 国产不卡免费视频| 日韩精品一区二区三区swag |