亚洲十八**毛片_亚洲综合影院_五月天精品一区二区三区_久久久噜噜噜久久中文字幕色伊伊 _欧美岛国在线观看_久久国产精品毛片_欧美va在线观看_成人黄网大全在线观看_日韩精品一区二区三区中文_亚洲一二三四区不卡

代寫COMP6236 Buffer Overflow Attacks

時間:2024-02-26  來源:  作者: 我要糾錯


COMP6236

2024

Coursework 1: Buffer Overflow Attacks and Software Hijacking

This coursework is divided into two parts. Part one is on buffer overflow attacks, which are based on Buffer Overflow Lab. You will be assessed on your ability to successfully exploit buffer overflows and other vulnerabilities and explain your methodology. Part two is on software hijacking, based on Reverse Engineering Lab and will assess your ability to carry out the successful exploitation of software. The coursework is an individual coursework and is worth 30% of the module marking in total.

Notes

The following notes are intended to highlight some common ”gotchas”.

1. Remember that Metasploit’s pattern create can be set to a length of your choice and does not have to be 100.

2. If you get stuck, try consulting the man page for the tools you are using.

3. If an exploit seems to work but closes out immediately instead of giving you a shell, remember that both “Cat” and “binsh” can be forced to remain open. Have a look at their man pages (by running “man cat” and “man /bin/sh”).

4. Remember that if you are counting characters including hex values, then the “x” should be omitted from the count.

5. You might want to increase the memory allocation to your VM when running Ghidra (VirtualBox -> settings -> system).

6. Remember that in Ghidra you can search for functions under the Symbol tree to the left, but you can also click the search option at the top and then select to search for other things, such as strings.

7. The application you have to compromise in part 2 will have multiple popups coming up to communicate both flags and errors, with more than one coming at a time. So please do not close down the application as soon as you get a popup but instead wait a few seconds.

8. Part 2 has more than one flag, so please read all the information displayed by the application on every popup and in the main window as these may change after you patched something.

9. In the settings tab for your VM, find the advanced section (settings -> general -> advanced) and then enable shared clipboard for ”host to virtual machine”. This will allow you to type commands on your host system and then copy them over to the VM.

Submission Instructions

Please use the template provided and submit using Turnitin on the module blackboard page at this link. (You should be able to see the “Assignments” tab on the left panel)

Marking Criteria

Your submission will be marked out of 35 and then refactored to a mark out of 30. The following criteria will be used.

Part

Criteria

Marking Scheme



Part 1


Ability to identify and exploit the vulnerabilities introduced during main lectures and labs, such as buffer overflows.

Up to 20 marks, awarded based on (i) how many flags are correctly retrieved and (ii) the correctness and completeness of the description about vulnerabilities and exploits.



Part 2



Ability to decompile, reverse engineer and patch a given application.

Up to 15 marks, awarded based on (i) how many flags are correctly retrieved and (ii) the correctness and completeness of the description about each

process in the licence-checking function.



Marks calculation

This coursework counts for 30% of the module mark. It has a total of 35 points available which are then refactored to a mark out of 30.





File format

Submitted file is in PDF format, the report is compliant with the provided template. If the format is not PDF, a 5 marks penalty will be applied. If the report is corrupted or cannot be opened, 0 mark will be awarded for the coursework.


Part 1

Setup

As in Reverse Engineering Lab, we will have to use an OVA image. Please download the VM from here, and import it into Virtualbox. To import the OVA, first open VirtualBox, then hit ”CTRL + I” or select ”import appliance” from the ”File” menu (top left). Then click next and follow the installation procedure. Thereafter please check the following before launching the VM:

VirtualBox 6 and earlier - Most university machines

1. Once the machine is imported, single-click on it in VirtualBox and then to the right go to ”networking” and select ”Bridged adaptor”

2. Wait for the VM to boot, and on boot login with User: info and Password: info to see the current IP address printed.

VirtualBox 7

1. You need to go File → Tools → Network Manager and make a host network if one doesn’t exist already.

2. Make sure DHCP enabled is ticked as illustrated in Figure 1 or the VM will hang at boot forever.

3. Then go to VM network settings and check it’s set to that host-only network, and specify the network you created or the one that exists.

4. Wait for the VM to boot, and on boot login with User: info and Password: info to see the current IP address printed.

Troubleshooting: If, after successfully importing it, the VM fails to launch with a networking error, just go to networking settings and change the option to one not already selected.



Figure 1: DHCP enabled

Marks Breakdown

This Lab contains 4 flags. Once you complete each challenge, you will need to submit your flag alongside a step-by-step guide of how you found it on the marking form.

The marks for this are broken down as follows:

1 Mark For each flag.

4 Marks For your step-by-step guide on how you completed the challenge, consisting of:

1 Mark: For clarity of your description.

1 Mark: For identifying and deploying an appropriate exploit.

2 Mark: For the process you used and the troubleshooting and problem-solving you performed.

Ultimately, The aim of the step-by-step guide is to provide the marker with evidence that you have an in- depth understanding of the task at hand. The more creative your guide, the better.

Task1 - Authentication Please

Go to the IP address of your VM in a web browser to open the first challenge. For example

http://192.168.56.101/

Buffer overflow this login system to get to the next task.

Look around the page for clues to help you. Everything you need is there!

When you complete this challenge, you will be given a flag and login details for the next challenge.

Task 2 - Return to win

Login as Task 2 using the credentials you were given at the end of the last challenge. The challenge2 binary is setuid and compiled with an executable stack.

Buffer overflow the binary to become the task2-win user.

Read flag2.txt to proceed to obtain your flag and proceed to the next challenge.

Task 3 - Shellcoding

Login as Task 3 using credentials from the previous task.

The challenge3 binary is setuid and compiled with an executable stack.

Buffer overflow the binary by injecting and returning to some shellcode to become the task3-win user. Read flag3.txt to proceed to obtain your flag and proceed to the next challenge.

Task 4 - Root shell through Ret2Libc

Login as Task 4 using the credentials you got from the previous task. The challenge4 binary is setuid but does not have an executable stack.

Using the ret2libc technique covered in Lab 1, buffer overflow the binary to become root. Read flag4.txt to proceed to obtain your flag.

Submit flags and Methodology

Follow the submission instructions above to submit the flags you found with a step-by-step guide of how you found them.

Part 2

Task 5: Decompile the application

5 Marks Decompile the application and figure out:

1 Marks: Which function checks the license. ( write the function name only)

2 Marks: When this function is run. ( Code and explain the sequence)

2 Marks: How the license key is checked? (What makes a valid license?) ( Code and explain the sequence)

Task 6: Initial patching

5 Marks Initial patching process:

2 Marks Generate an unpatched key to enable app (check value). ( Flag and explain the process)

3 Marks Patch the application to disable online license checks. ( Flag and explain the process)

Task 7: Secondary patching

5 Marks Secondary patching exploits:

2 Marks Patch the application to enable the advanced features. ( Flag and explain the process)

3 Marks Patch the application to remove reporting metrics. ( Code and explain the sequence)

Setup

You may use any Linux distro of your choice so long as you are able to run Ghidra. However, do not use the VM from the previous lab as it will not be able to run the coursework application.

Kali Vagrant The official Kali rolling release Vagrant machine can be installed as follows: For this machine, the username and password are both “vagrant” and this user is in the sudoers group. Create a directory on your host machine, then from the command line run the following commands:

vagrant init kalilinux/rolling vagrant up

Once the machine launches, give it a bit of time and you will be presented with a GUI login. Enter “vagrant” and “vagrant”. Then you can open a terminal in the new VM and install Ghidra.

go to settings in VirtualBox and adjust as needed (be sure to enable 3D acceleration under "display" options) double click the VM to launch it

sudo apt update

sudo apt install openjdk-17-jdk

wget https://github.com/NationalSecurityAgency/ghidra/releases/download/Ghidra_10.2.3

_build/ghidra_10.2.3_PUBLIC_20230208.zip unzip ghidra_10.2.3_PUBLIC_20230208.zip

cd ghidra_10.2.3_PUBLIC

./ghidraRun (wait for a second or two after running this command)

Kali for VirtualBox You can also get the official Kali release for VirtualBox, where both username and password are ’kali’.

https://cdimage.kali.org/kali-2023.3/kali-linux-2023.3-virtualbox-amd64.7z extract with 7zip

Double-click on the "Virtual machine definition" file (blue icon) go to settings in VirtualBox and adjust as needed (be sure to enable 3D acceleration under "display" options)

double click the VM to launch it sudo apt update

sudo apt install openjdk-17-jdk

wget https://github.com/NationalSecurityAgency/ghidra/releases/download/Ghidra_10.2.3

_build/ghidra_10.2.3_PUBLIC_20230208.zip unzip ghidra_10.2.3_PUBLIC_20230208.zip

cd ghidra_10.2.3_PUBLIC

./ghidraRun (wait for a second or two after running this command)

For other Kali install options, please see:

https://www.kali.org/get-kali/#kali-platforms Video guide: https://www.youtube.com/watch?v=Hu1Gs3Jqymw

Thereafter, open a web browser to download the application for this part your coursework.

Download the lab6 application from the following URL: https://git.soton.ac.uk/comp6236/lab6/-

/raw/master/lab6app.zip

Use Ghidra and a hex editor of your choice to reverse engineer the binary and complete the tasks instroduced under ”Tasks and marks breakdown.

You may find the following Assembly instruction reference useful: http://ref.x86asm.net/coder64.html

If you are unable to install Ghidra please ping google or any other site to check your network connection. You will have to close the VM and then change the network options of the VM (VirtualBox -> settings -> network).

FAQ

Question: I made an error in the submission, can I resubmit?

Answer: You can resubmit as many times as you want, until the coursework deadline.

Question: What do you mean by ( Code and explain the sequence ) ?

Answer: It depends on the question, if you want to copy the code and explain what the code does, then it’s fine. You will get some marks for explaining the obvious. However, in Q2 I used the keyword “when”. This means I am looking for the sequence of events in regard to the timeline. Another example, in Q3 When I used the keyword “how” then I am looking for the function/algorithm that is used to generate the key.

Question: How much code are we expected to add for these questions? Obviously, we could add the whole decompiled function, but for the example, I’ve found it in two areas and this would add a lot of source code to my answer. Any recommendations?

Answer: The code itself is not important. In the end, I don’t care how you present it. What is important your problem solving ability to answer the question. I care how you show me, “What you learned, Not what you can do”. (Hint: The use of Pseudo code is highly encouraged.)

Question: What do you mean by ( Flag and explain the sequence ) ?

Answer: Follow the same logic in the previous question. But, this has more weight, so here is a further breakdown

1 Mark: Just the flag.

1 Mark: How you did it.

1 Mark: Why it worked.

1 Mark: Other possible solutions.

1 Mark: What would have been a better implementation.

Please note: Although there is no marks for style, or grammar. If I can’t tell one category from another, I will award a mark for one and not both. For example, if I can’t distinguish between “How you did it” and 請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫 CSC8636 Visual Analysis of the Ocean Microbiome
  • 下一篇:代寫MANG6346 Business Analytics and Risk
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區
    昆明西山國家級風景名勝區
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    精品一区免费av| 成人在线免费观看视频| 日本黄色成人| 日韩不卡视频在线观看| 丁香婷婷久久| 亚洲一级大片| 自拍自偷一区二区三区| 欧美国产一级| 亚洲久久一区二区| 久久成人免费网站| 成人黄页毛片网站| 国产精品女主播在线观看| 在线欧美一级视频| 成人性视频免费网站| av不卡在线看| 成人网18免费网站| 国产一区日韩欧美| 久久激情中文| 成人中文字幕电影| 国产美女撒尿一区二区| 日韩精品一区二区三区在线播放 | 橘梨纱av一区二区三区在线观看| 欧美日韩一卡| 写真福利理论片在线播放| 蜜臀99久久精品久久久久久软件 | 少妇激情av一区二区三区| 综合自拍亚洲综合图不卡区| 7777精品久久久大香线蕉| 亚洲最大网站| 伊人久久大香线蕉av超碰演员| 国产成人亚洲综合a∨婷婷| 亚洲欧洲精品一区二区三区| 欧美一二三区精品| 欧美日韩在线播放三区| 日本乱码高清不卡字幕| 日韩**一区毛片| 国产精品夜夜嗨| 国产一二精品视频| |精品福利一区二区三区| 91在线视频官网| 一区二区电影在线观看| 欧美h版在线观看| 国产麻豆精品| 成人午夜大片免费观看| 国产欧美一区二区在线| 色综合久久久久网| 天天看天天色| 免费黄色电影在线观看| 岛国av一区二区| 韩曰欧美视频免费观看| xxx亚洲日本| 精品视频在线一区二区| 久久99精品久久久野外观看| 亚洲伊人网站| 日韩精品免费一区二区三区| 久久精品影视| 亚洲人metart人体| 久久精品国产**网站演员| 久久久久久久综合狠狠综合| 国产精品 欧美精品| 99久久精品国产亚洲精品 | 懂色av噜噜一区二区三区av| 亚洲一区二区三区四区五区黄| 欧美一二三区在线| 久久天天久久| 亚洲风情在线资源| 午夜伦理大片视频在线观看| 免费在线观看成人| 欧美日韩免费不卡视频一区二区三区| 依依成人在线| 蜜桃一区二区三区在线| 欧美孕妇孕交| 精品综合久久久久久8888| 看电影就来5566av视频在线播放| 神马电影久久| 国产一区激情在线| 欧美一级日韩不卡播放免费| 久热久精久品这里在线观看| 日韩最新av| 欧美久久99| 亚洲日本护士毛茸茸| 黄色漫画在线免费观看| 天天搞夜夜操| 国产伦理精品| 在线播放精品| 在线免费观看av电影| 青青草原在线亚洲| 懂色av中文一区二区三区| 日韩三级在线观看| 国产精品丝袜在线播放| 中文字幕 在线观看| 欧美在线看片| 欧美日韩在线电影| 国产盗摄在线观看| 欧美日韩91| 在线日韩一区二区| 欧美片第一页| 国产成人三级| 中文字幕一区二区三区色视频 | 狠狠88综合久久久久综合网| 免费久久99精品国产自在现线| 国产精品全国免费观看高清 | 这里有精品可以观看| 一区二区三区在线视频观看 | 8x8ⅹ拨牐拨牐拨牐在线观看| 欧美久色视频| 一区二区电影在线观看| 一卡二卡欧美日韩| 久久久人成影片一区二区三区在哪下载 | 国产精品一区二区三区www| 日本中文字幕一区二区有限公司| 精品少妇一区二区三区在线播放| a天堂资源在线| 天天射成人网| 国产精品欧美精品| 国产福利片在线观看| 亚洲aaa精品| 永久亚洲成a人片777777| 色综合久久天天| 欧美精品中文| 久久先锋影音av| 在线免费福利| 精品日本视频| 欧美性少妇18aaaa视频| 久久激情电影| 美国一级片在线免费观看视频 | 免费yellow网站| 久久99热这里只有精品| 欧美大片高清| 欧美国产激情一区二区三区蜜月 | 欧美日韩国产精品自在自线| 国产精品一区二区三区四区在线观看 | 专区另类欧美日韩| 97久久网站| 麻豆av电影| 成人精品高清在线| 黄网站app在线观看| 91麻豆国产香蕉久久精品| 国产一区二区av在线| 欧美一区二区三区爱爱| 精品影院一区| 91视频www| 欧美1—12sexvideos| 欧美最新大片在线看| 国产欧美日韩在线一区二区| av免费看大片| 国产精品 欧美精品| 偷拍视频一区二区三区| 亚洲成人动漫在线观看| 开心激情综合| 老鸭窝av在线| 日本不卡中文字幕| 伊人永久在线| 久久影院午夜论| 国产午夜精品一区理论片| 国产精品中文有码| 一区二区精品伦理...| 亚洲乱码国产乱码精品精98午夜| 欧美激情综合| 日韩欧美精品电影| 91麻豆精品国产自产在线| 欧美视频久久| 久久亚洲资源| 精品国产成人在线影院 | 国产一区二区三区不卡av| 91在线最新| 不卡的av中国片| 亚洲一区二区三区免费在线观看| www.神马久久| 国产乱码精品一区二区三区亚洲人| 男人天堂亚洲| 92国产在线视频| av电影在线观看| 九色porny蝌蚪视频在线观看| 欧美日韩精品三区| 亚洲资源中文字幕| 亚洲电影av| 国产图片一区| 超碰在线无需免费| 91精品免费在线| 国产91精品一区二区| 精品国产乱码久久久| 日本一区二区中文字幕| 伊人久久综合一区二区| 欧美日韩激情一区二区三区| 日韩精品免费| 伪装者免费全集在线观看| 狠狠躁夜夜躁人人爽天天天天97| 91啪九色porn原创视频在线观看| 国产一区在线观看视频| 韩国一区二区三区| 国产精品一区三区在线观看| 97超碰人人在线| 日本桃色视频| 男男gay免费网站| 欧美日产在线观看| 91.com视频| 午夜精品久久久久久不卡8050| 国产麻豆午夜三级精品| 久久久久久网|