Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Examine the provided binary executable * and practice using it . The C source code for this binary is provided below and on Moodle. Run

Examine the provided binary executable* and practice using it. The C source code for this binary is provided
below and on Moodle. Run it to test its operation. The program accepts a password input from the user.
The password is checked and if correct executes one set of code with potentially higher privilege, otherwise
executes another set of code.
Identify and briefly discuss as many software vulnerabilities as you can. Explain how each identified
vulnerability can be exploited. Name and briefly describe possible protections or mitigations against these
exploits. Use diagrams where necessary to help explain the vulnerability, exploit and exploit path(s), and
protections and mitigations against an exploit.
Use the List of Issues to Consider, below, to help you.
co7601_portfo_ex1- This binary is compiled with no software protections.
C code: co7601_portfo_ex1.c - This is the corresponding source code that makes up the core
part of the binary
#include ?????
???=0==0?
C
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Essential SQLAlchemy Mapping Python To Databases

Authors: Myers, Jason Myers

2nd Edition

1491916567, 9781491916568

More Books

Students also viewed these Databases questions

Question

What is conservative approach ?

Answered: 1 week ago

Question

What are the basic financial decisions ?

Answered: 1 week ago