Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Exploit the vulnerability and execute function 4 instead of function 3 ( 3 2 - bit system ) . It is important to note that

Exploit the vulnerability and execute function4 instead of function3(32-bit system). It is important to note that function4 never gets called by the main function. Your task is to inject a command line argument such that function4 gets called, instead of function3. Include screenshots of the stack exploitation demonstration. #include
#include
#include
int function1(int x, int y, int z)
{
int result_func1;
result_func1= x + y + z;
return result_func1;
}
int function2(int x, int y, char* input_string)
{
int result_func2;
char buffer[20];
strcpy(buffer, input_string);
printf("Your input string %s is copied in the buffer
", input_string);
result_func2= x - y;
return result_func2;
}
void function3(int result1, int result2)
{
printf("The result of function 1 is %d
", result1);
printf("The result of function 2 is %d
", result2);
}
void function4(void)
{
printf("This function never gets called
");
exit(-1);
}
int main(int argc, char* argv[])
{
int result1;
int result2;
result1= function1(5,10,15);
result2= function2(20,8, argv[1]);
function3(result1, result2);
}

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Professional Android 4 Application Development

Authors: Reto Meier

3rd Edition

1118223853, 9781118223857

More Books

Students also viewed these Programming questions

Question

What information is necessary to analyze a queuing system?

Answered: 1 week ago