Answered step by step
Verified Expert Solution
Question
1 Approved Answer
7. Consider level/phase 2 of attacklab for this problem. Shown below is a portion of the stack before getbufO reads in the exploit, and after
7. Consider level/phase 2 of attacklab for this problem. Shown below is a portion of the stack before getbufO reads in the exploit, and after getbufO reads in the exploit. Provide the following addresses (2 points each address, 10 points total) .The address on the stack where the return address of test is stored. .The address to return to test that is stored on the stack .The address of touch2 .The address on the stack where the exploit is stored. .The address stored in rsp just before the assembly code in the exploit is executed. Recall the goal of Level 2 was to get CTARGET to execute the code for touch2 rather than returning to test. In this case, however, you must make it appear to touch2 as if you have passed your cookie as its argument. The code for getbuf is shown below, and the code for test is shown on the front of the exam. Values before Values after Address 0x556763f0: 0x0000000000401920 0x0000000000401920 0x556763f8: 0x000000000000fb90 0xc37eled939c7c748 0x55676400: 0x00007ffff7b06cea 0x0000000000000000 0x55676408: 0x000000000000fb80 0x0000000000000000 0x55676410: 0x00000000000000f4 0x0000000000000000 0x55676418: 0x0000000055676450 0x0000000000000000 0x55676420: 0x0000000000000000 0x0000000000000000 0x55676428: 0x0000000055586000 0x0000000000000000 0x55676430: 0x0000000000401ae2 0x00000000556763f8 0x55676438: 0x0000000000000001 0x0000000000401958 0x55676440: 0x0000000000402084 0x0000000000402000 0x55676448: 0x0000000000000000 0x0000000000000000 0x55676450: 0xf4f4f4f4f4f4f4f4 0xf4f4f4f4f4f4f4f4 0x55676458: 0xf4f4f4f4f4f4f4f4 0xf4f4f4f4f4f4f4f4 exploit read in exploit read irn 7. Consider level/phase 2 of attacklab for this problem. Shown below is a portion of the stack before getbufO reads in the exploit, and after getbufO reads in the exploit. Provide the following addresses (2 points each address, 10 points total) .The address on the stack where the return address of test is stored. .The address to return to test that is stored on the stack .The address of touch2 .The address on the stack where the exploit is stored. .The address stored in rsp just before the assembly code in the exploit is executed. Recall the goal of Level 2 was to get CTARGET to execute the code for touch2 rather than returning to test. In this case, however, you must make it appear to touch2 as if you have passed your cookie as its argument. The code for getbuf is shown below, and the code for test is shown on the front of the exam. Values before Values after Address 0x556763f0: 0x0000000000401920 0x0000000000401920 0x556763f8: 0x000000000000fb90 0xc37eled939c7c748 0x55676400: 0x00007ffff7b06cea 0x0000000000000000 0x55676408: 0x000000000000fb80 0x0000000000000000 0x55676410: 0x00000000000000f4 0x0000000000000000 0x55676418: 0x0000000055676450 0x0000000000000000 0x55676420: 0x0000000000000000 0x0000000000000000 0x55676428: 0x0000000055586000 0x0000000000000000 0x55676430: 0x0000000000401ae2 0x00000000556763f8 0x55676438: 0x0000000000000001 0x0000000000401958 0x55676440: 0x0000000000402084 0x0000000000402000 0x55676448: 0x0000000000000000 0x0000000000000000 0x55676450: 0xf4f4f4f4f4f4f4f4 0xf4f4f4f4f4f4f4f4 0x55676458: 0xf4f4f4f4f4f4f4f4 0xf4f4f4f4f4f4f4f4 exploit read in exploit read irn
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started