免费一级欧美片在线观看网站_国产一区再线_欧美日本一区二区高清播放视频_国产99久久精品一区二区300

代寫COMP6236 Buffer Overflow Attacks

時間:2024-02-26  來源:  作者: 我要糾錯


COMP6236

2024

Coursework 1: Buffer Overflow Attacks and Software Hijacking

This coursework is divided into two parts. Part one is on buffer overflow attacks, which are based on Buffer Overflow Lab. You will be assessed on your ability to successfully exploit buffer overflows and other vulnerabilities and explain your methodology. Part two is on software hijacking, based on Reverse Engineering Lab and will assess your ability to carry out the successful exploitation of software. The coursework is an individual coursework and is worth 30% of the module marking in total.

Notes

The following notes are intended to highlight some common ”gotchas”.

1. Remember that Metasploit’s pattern create can be set to a length of your choice and does not have to be 100.

2. If you get stuck, try consulting the man page for the tools you are using.

3. If an exploit seems to work but closes out immediately instead of giving you a shell, remember that both “Cat” and “binsh” can be forced to remain open. Have a look at their man pages (by running “man cat” and “man /bin/sh”).

4. Remember that if you are counting characters including hex values, then the “x” should be omitted from the count.

5. You might want to increase the memory allocation to your VM when running Ghidra (VirtualBox -> settings -> system).

6. Remember that in Ghidra you can search for functions under the Symbol tree to the left, but you can also click the search option at the top and then select to search for other things, such as strings.

7. The application you have to compromise in part 2 will have multiple popups coming up to communicate both flags and errors, with more than one coming at a time. So please do not close down the application as soon as you get a popup but instead wait a few seconds.

8. Part 2 has more than one flag, so please read all the information displayed by the application on every popup and in the main window as these may change after you patched something.

9. In the settings tab for your VM, find the advanced section (settings -> general -> advanced) and then enable shared clipboard for ”host to virtual machine”. This will allow you to type commands on your host system and then copy them over to the VM.

Submission Instructions

Please use the template provided and submit using Turnitin on the module blackboard page at this link. (You should be able to see the “Assignments” tab on the left panel)

Marking Criteria

Your submission will be marked out of 35 and then refactored to a mark out of 30. The following criteria will be used.

Part

Criteria

Marking Scheme



Part 1


Ability to identify and exploit the vulnerabilities introduced during main lectures and labs, such as buffer overflows.

Up to 20 marks, awarded based on (i) how many flags are correctly retrieved and (ii) the correctness and completeness of the description about vulnerabilities and exploits.



Part 2



Ability to decompile, reverse engineer and patch a given application.

Up to 15 marks, awarded based on (i) how many flags are correctly retrieved and (ii) the correctness and completeness of the description about each

process in the licence-checking function.



Marks calculation

This coursework counts for 30% of the module mark. It has a total of 35 points available which are then refactored to a mark out of 30.





File format

Submitted file is in PDF format, the report is compliant with the provided template. If the format is not PDF, a 5 marks penalty will be applied. If the report is corrupted or cannot be opened, 0 mark will be awarded for the coursework.


Part 1

Setup

As in Reverse Engineering Lab, we will have to use an OVA image. Please download the VM from here, and import it into Virtualbox. To import the OVA, first open VirtualBox, then hit ”CTRL + I” or select ”import appliance” from the ”File” menu (top left). Then click next and follow the installation procedure. Thereafter please check the following before launching the VM:

VirtualBox 6 and earlier - Most university machines

1. Once the machine is imported, single-click on it in VirtualBox and then to the right go to ”networking” and select ”Bridged adaptor”

2. Wait for the VM to boot, and on boot login with User: info and Password: info to see the current IP address printed.

VirtualBox 7

1. You need to go File → Tools → Network Manager and make a host network if one doesn’t exist already.

2. Make sure DHCP enabled is ticked as illustrated in Figure 1 or the VM will hang at boot forever.

3. Then go to VM network settings and check it’s set to that host-only network, and specify the network you created or the one that exists.

4. Wait for the VM to boot, and on boot login with User: info and Password: info to see the current IP address printed.

Troubleshooting: If, after successfully importing it, the VM fails to launch with a networking error, just go to networking settings and change the option to one not already selected.



Figure 1: DHCP enabled

Marks Breakdown

This Lab contains 4 flags. Once you complete each challenge, you will need to submit your flag alongside a step-by-step guide of how you found it on the marking form.

The marks for this are broken down as follows:

1 Mark For each flag.

4 Marks For your step-by-step guide on how you completed the challenge, consisting of:

1 Mark: For clarity of your description.

1 Mark: For identifying and deploying an appropriate exploit.

2 Mark: For the process you used and the troubleshooting and problem-solving you performed.

Ultimately, The aim of the step-by-step guide is to provide the marker with evidence that you have an in- depth understanding of the task at hand. The more creative your guide, the better.

Task1 - Authentication Please

Go to the IP address of your VM in a web browser to open the first challenge. For example

http://192.168.56.101/

Buffer overflow this login system to get to the next task.

Look around the page for clues to help you. Everything you need is there!

When you complete this challenge, you will be given a flag and login details for the next challenge.

Task 2 - Return to win

Login as Task 2 using the credentials you were given at the end of the last challenge. The challenge2 binary is setuid and compiled with an executable stack.

Buffer overflow the binary to become the task2-win user.

Read flag2.txt to proceed to obtain your flag and proceed to the next challenge.

Task 3 - Shellcoding

Login as Task 3 using credentials from the previous task.

The challenge3 binary is setuid and compiled with an executable stack.

Buffer overflow the binary by injecting and returning to some shellcode to become the task3-win user. Read flag3.txt to proceed to obtain your flag and proceed to the next challenge.

Task 4 - Root shell through Ret2Libc

Login as Task 4 using the credentials you got from the previous task. The challenge4 binary is setuid but does not have an executable stack.

Using the ret2libc technique covered in Lab 1, buffer overflow the binary to become root. Read flag4.txt to proceed to obtain your flag.

Submit flags and Methodology

Follow the submission instructions above to submit the flags you found with a step-by-step guide of how you found them.

Part 2

Task 5: Decompile the application

5 Marks Decompile the application and figure out:

1 Marks: Which function checks the license. ( write the function name only)

2 Marks: When this function is run. ( Code and explain the sequence)

2 Marks: How the license key is checked? (What makes a valid license?) ( Code and explain the sequence)

Task 6: Initial patching

5 Marks Initial patching process:

2 Marks Generate an unpatched key to enable app (check value). ( Flag and explain the process)

3 Marks Patch the application to disable online license checks. ( Flag and explain the process)

Task 7: Secondary patching

5 Marks Secondary patching exploits:

2 Marks Patch the application to enable the advanced features. ( Flag and explain the process)

3 Marks Patch the application to remove reporting metrics. ( Code and explain the sequence)

Setup

You may use any Linux distro of your choice so long as you are able to run Ghidra. However, do not use the VM from the previous lab as it will not be able to run the coursework application.

Kali Vagrant The official Kali rolling release Vagrant machine can be installed as follows: For this machine, the username and password are both “vagrant” and this user is in the sudoers group. Create a directory on your host machine, then from the command line run the following commands:

vagrant init kalilinux/rolling vagrant up

Once the machine launches, give it a bit of time and you will be presented with a GUI login. Enter “vagrant” and “vagrant”. Then you can open a terminal in the new VM and install Ghidra.

go to settings in VirtualBox and adjust as needed (be sure to enable 3D acceleration under "display" options) double click the VM to launch it

sudo apt update

sudo apt install openjdk-17-jdk

wget https://github.com/NationalSecurityAgency/ghidra/releases/download/Ghidra_10.2.3

_build/ghidra_10.2.3_PUBLIC_20230208.zip unzip ghidra_10.2.3_PUBLIC_20230208.zip

cd ghidra_10.2.3_PUBLIC

./ghidraRun (wait for a second or two after running this command)

Kali for VirtualBox You can also get the official Kali release for VirtualBox, where both username and password are ’kali’.

https://cdimage.kali.org/kali-2023.3/kali-linux-2023.3-virtualbox-amd64.7z extract with 7zip

Double-click on the "Virtual machine definition" file (blue icon) go to settings in VirtualBox and adjust as needed (be sure to enable 3D acceleration under "display" options)

double click the VM to launch it sudo apt update

sudo apt install openjdk-17-jdk

wget https://github.com/NationalSecurityAgency/ghidra/releases/download/Ghidra_10.2.3

_build/ghidra_10.2.3_PUBLIC_20230208.zip unzip ghidra_10.2.3_PUBLIC_20230208.zip

cd ghidra_10.2.3_PUBLIC

./ghidraRun (wait for a second or two after running this command)

For other Kali install options, please see:

https://www.kali.org/get-kali/#kali-platforms Video guide: https://www.youtube.com/watch?v=Hu1Gs3Jqymw

Thereafter, open a web browser to download the application for this part your coursework.

Download the lab6 application from the following URL: https://git.soton.ac.uk/comp6236/lab6/-

/raw/master/lab6app.zip

Use Ghidra and a hex editor of your choice to reverse engineer the binary and complete the tasks instroduced under ”Tasks and marks breakdown.

You may find the following Assembly instruction reference useful: http://ref.x86asm.net/coder64.html

If you are unable to install Ghidra please ping google or any other site to check your network connection. You will have to close the VM and then change the network options of the VM (VirtualBox -> settings -> network).

FAQ

Question: I made an error in the submission, can I resubmit?

Answer: You can resubmit as many times as you want, until the coursework deadline.

Question: What do you mean by ( Code and explain the sequence ) ?

Answer: It depends on the question, if you want to copy the code and explain what the code does, then it’s fine. You will get some marks for explaining the obvious. However, in Q2 I used the keyword “when”. This means I am looking for the sequence of events in regard to the timeline. Another example, in Q3 When I used the keyword “how” then I am looking for the function/algorithm that is used to generate the key.

Question: How much code are we expected to add for these questions? Obviously, we could add the whole decompiled function, but for the example, I’ve found it in two areas and this would add a lot of source code to my answer. Any recommendations?

Answer: The code itself is not important. In the end, I don’t care how you present it. What is important your problem solving ability to answer the question. I care how you show me, “What you learned, Not what you can do”. (Hint: The use of Pseudo code is highly encouraged.)

Question: What do you mean by ( Flag and explain the sequence ) ?

Answer: Follow the same logic in the previous question. But, this has more weight, so here is a further breakdown

1 Mark: Just the flag.

1 Mark: How you did it.

1 Mark: Why it worked.

1 Mark: Other possible solutions.

1 Mark: What would have been a better implementation.

Please note: Although there is no marks for style, or grammar. If I can’t tell one category from another, I will award a mark for one and not both. For example, if I can’t distinguish between “How you did it” and 請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫 CSC8636 Visual Analysis of the Ocean Microbiome
  • 下一篇:代寫MANG6346 Business Analytics and Risk
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區
    昆明西山國家級風景名勝區
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    免费一级欧美片在线观看网站_国产一区再线_欧美日本一区二区高清播放视频_国产99久久精品一区二区300
    亚洲综合色自拍一区| 精品一区二区免费| 欧美日韩一区在线| 一区二区三区精品久久久| 99久久99久久精品国产片果冻| 国产欧美一区二区精品久导航 | 激情偷乱视频一区二区三区| 欧美一级黄色录像| 久久精品国产亚洲高清剧情介绍 | 五月天激情综合| 欧美理论在线播放| 日本不卡的三区四区五区| 欧美一区二区日韩| 精品一区二区三区不卡| 久久影音资源网| 国产99久久久国产精品潘金| 国产精品丝袜黑色高跟| 国产成人精品影视| 国产日韩精品一区二区浪潮av| 高清视频一区二区| 国产精品久久久99| 在线观看亚洲精品视频| 五月婷婷激情综合| 日韩三级免费观看| 国产精品白丝jk黑袜喷水| 国产精品久久久久久久午夜片| 高清久久久久久| 国产精品拍天天在线| eeuss鲁片一区二区三区在线观看| 亚洲视频香蕉人妖| 欧美日韩国产综合久久| 久久国产精品99精品国产 | 亚洲va韩国va欧美va精品| 在线播放视频一区| 极品少妇xxxx偷拍精品少妇| 国产女人18毛片水真多成人如厕| av中文字幕不卡| 亚洲免费资源在线播放| 欧美日韩国产三级| 国内欧美视频一区二区| 亚洲欧洲精品天堂一级| 欧美日韩一区不卡| 国产一区二区在线视频| 亚洲欧洲国产专区| 91精品国产91久久久久久一区二区| 国内国产精品久久| 综合久久久久久| 欧美精品电影在线播放| 国产精品一级片在线观看| 国产精品久久毛片| 精品视频在线免费看| 精品影视av免费| 亚洲婷婷国产精品电影人久久| 在线电影院国产精品| 丁香婷婷深情五月亚洲| 亚洲国产精品久久久久秋霞影院 | 亚洲精品视频在线看| 日韩一区二区中文字幕| 成人午夜又粗又硬又大| 亚洲成人自拍网| 国产人久久人人人人爽| 欧美日韩一卡二卡| 国产成人在线观看免费网站| 亚洲自拍另类综合| 国产亚洲污的网站| 欧美日韩一区 二区 三区 久久精品 | 国产精品污www在线观看| 欧美日韩成人综合天天影院| 国产99久久精品| 舔着乳尖日韩一区| 国产精品久久久久桃色tv| 日韩欧美一级二级三级久久久| 福利一区二区在线| 日韩电影在线观看一区| 国产精品久久久久婷婷| 欧美电影免费提供在线观看| 色婷婷久久一区二区三区麻豆| 极品少妇一区二区| 午夜免费久久看| 国产精品国模大尺度视频| 欧美刺激午夜性久久久久久久| 99在线热播精品免费| 久久99久久99| 亚洲chinese男男1069| 中文字幕欧美三区| 日韩精品一区二区三区在线播放| 欧美亚洲国产bt| 成人av资源下载| 国产一区二区在线观看视频| 天天av天天翘天天综合网色鬼国产| 国产人妖乱国产精品人妖| 欧美va在线播放| 欧美性极品少妇| 99国产精品国产精品久久| 韩国在线一区二区| 人人狠狠综合久久亚洲| 一区二区三区四区乱视频| 中文字幕欧美激情一区| 精品国产免费人成在线观看| 欧美日韩国产一级片| 91视视频在线观看入口直接观看www | 亚洲青青青在线视频| 国产亚洲欧美日韩俺去了| 日韩免费电影一区| 91麻豆精品国产91久久久使用方法| 一本久道久久综合中文字幕| 成人免费不卡视频| 国产一区二区三区电影在线观看 | 欧美三级中文字幕| 色屁屁一区二区| 99久久免费视频.com| 国产**成人网毛片九色 | 99re6这里只有精品视频在线观看| 国产一区三区三区| 男女性色大片免费观看一区二区| 亚洲国产日韩精品| 一区二区三区四区不卡在线 | 国产成人精品aa毛片| 国产综合色产在线精品| 青草av.久久免费一区| 视频一区二区三区入口| 天天综合色天天| 天堂在线一区二区| 石原莉奈在线亚洲二区| 性做久久久久久| 午夜精品久久久久久久久| 一区二区在线看| 亚洲日本va在线观看| 亚洲欧美日韩中文播放| 亚洲三级在线看| 亚洲精品久久久久久国产精华液| 亚洲免费伊人电影| 亚洲一区在线观看免费观看电影高清 | 亚洲一区二区三区在线| 午夜精品久久久久久久99水蜜桃| 午夜日韩在线观看| 麻豆成人久久精品二区三区小说| 精品在线观看免费| 国产aⅴ精品一区二区三区色成熟| a4yy欧美一区二区三区| 在线免费不卡视频| 制服丝袜亚洲播放| 26uuu久久天堂性欧美| 国产精品视频观看| 曰韩精品一区二区| 日韩精品免费视频人成| 国产乱子伦一区二区三区国色天香| 床上的激情91.| 欧美日精品一区视频| 日韩欧美成人激情| 国产精品久久久久一区二区三区| 亚洲自拍偷拍欧美| 久久精品国产亚洲高清剧情介绍| 成人综合日日夜夜| 欧美性生交片4| 久久综合久久久久88| 亚洲视频在线一区二区| 石原莉奈在线亚洲二区| 国产黄色成人av| 欧美亚洲动漫精品| 久久男人中文字幕资源站| 亚洲人成亚洲人成在线观看图片 | 国产偷国产偷精品高清尤物| 亚洲免费成人av| 久久国产精品72免费观看| 99久久国产综合色|国产精品| 欧美日韩国产精选| 国产精品天干天干在线综合| 午夜日韩在线电影| 成人精品视频一区二区三区| 欧美日韩中文字幕精品| 久久精品一区二区三区四区| 一区二区三区欧美| 国产露脸91国语对白| 91黄色免费版| 国产午夜精品久久久久久免费视| 夜夜爽夜夜爽精品视频| 国产精品香蕉一区二区三区| 欧美色图12p| 国产肉丝袜一区二区| 婷婷久久综合九色国产成人| 成人小视频在线| 日韩女同互慰一区二区| 亚洲免费观看高清完整版在线 | 成人av在线电影| 日韩区在线观看| 一区二区三区高清| 国产成人夜色高潮福利影视| 51精品久久久久久久蜜臀| 国产精品国产三级国产普通话蜜臀 | 亚洲国产日韩一级| av电影天堂一区二区在线观看| 欧美大胆一级视频| 香蕉加勒比综合久久| 成人av第一页| 精品国产91久久久久久久妲己| 午夜视频在线观看一区| 91在线丨porny丨国产| 久久网站最新地址| 日韩精品一二区|