Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

7. Consider level/phase 2 of attacklab for this problem. Shown below is a portion of the stack before getbufO reads in the exploit, and after

image text in transcribed

7. Consider level/phase 2 of attacklab for this problem. Shown below is a portion of the stack before getbufO reads in the exploit, and after getbufO reads in the exploit. Provide the following addresses (2 points each address, 10 points total) .The address on the stack where the return address of test is stored. .The address to return to test that is stored on the stack .The address of touch2 .The address on the stack where the exploit is stored. .The address stored in rsp just before the assembly code in the exploit is executed. Recall the goal of Level 2 was to get CTARGET to execute the code for touch2 rather than returning to test. In this case, however, you must make it appear to touch2 as if you have passed your cookie as its argument. The code for getbuf is shown below, and the code for test is shown on the front of the exam. Values before Values after Address 0x556763f0: 0x0000000000401920 0x0000000000401920 0x556763f8: 0x000000000000fb90 0xc37eled939c7c748 0x55676400: 0x00007ffff7b06cea 0x0000000000000000 0x55676408: 0x000000000000fb80 0x0000000000000000 0x55676410: 0x00000000000000f4 0x0000000000000000 0x55676418: 0x0000000055676450 0x0000000000000000 0x55676420: 0x0000000000000000 0x0000000000000000 0x55676428: 0x0000000055586000 0x0000000000000000 0x55676430: 0x0000000000401ae2 0x00000000556763f8 0x55676438: 0x0000000000000001 0x0000000000401958 0x55676440: 0x0000000000402084 0x0000000000402000 0x55676448: 0x0000000000000000 0x0000000000000000 0x55676450: 0xf4f4f4f4f4f4f4f4 0xf4f4f4f4f4f4f4f4 0x55676458: 0xf4f4f4f4f4f4f4f4 0xf4f4f4f4f4f4f4f4 exploit read in exploit read irn 7. Consider level/phase 2 of attacklab for this problem. Shown below is a portion of the stack before getbufO reads in the exploit, and after getbufO reads in the exploit. Provide the following addresses (2 points each address, 10 points total) .The address on the stack where the return address of test is stored. .The address to return to test that is stored on the stack .The address of touch2 .The address on the stack where the exploit is stored. .The address stored in rsp just before the assembly code in the exploit is executed. Recall the goal of Level 2 was to get CTARGET to execute the code for touch2 rather than returning to test. In this case, however, you must make it appear to touch2 as if you have passed your cookie as its argument. The code for getbuf is shown below, and the code for test is shown on the front of the exam. Values before Values after Address 0x556763f0: 0x0000000000401920 0x0000000000401920 0x556763f8: 0x000000000000fb90 0xc37eled939c7c748 0x55676400: 0x00007ffff7b06cea 0x0000000000000000 0x55676408: 0x000000000000fb80 0x0000000000000000 0x55676410: 0x00000000000000f4 0x0000000000000000 0x55676418: 0x0000000055676450 0x0000000000000000 0x55676420: 0x0000000000000000 0x0000000000000000 0x55676428: 0x0000000055586000 0x0000000000000000 0x55676430: 0x0000000000401ae2 0x00000000556763f8 0x55676438: 0x0000000000000001 0x0000000000401958 0x55676440: 0x0000000000402084 0x0000000000402000 0x55676448: 0x0000000000000000 0x0000000000000000 0x55676450: 0xf4f4f4f4f4f4f4f4 0xf4f4f4f4f4f4f4f4 0x55676458: 0xf4f4f4f4f4f4f4f4 0xf4f4f4f4f4f4f4f4 exploit read in exploit read irn

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Joe Celkos Data And Databases Concepts In Practice

Authors: Joe Celko

1st Edition

1558604324, 978-1558604322

More Books

Students also viewed these Databases questions