Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Part 1 Go to the Following website: https://free.codebashing.com/free-content/cplus/c_stack_p1 Click the image and follow the instructions. When asked to input something, take a screenshot/snip to demonstrate

Part 1

Go to the Following website: https://free.codebashing.com/free-content/cplus/c_stack_p1

Click the image and follow the instructions.

When asked to input something, take a screenshot/snip to demonstrate that you have done so.

Paste into a word document with headings identifying what each is.

Complete all the steps, documenting as they go.

Part 2

Navigate to https://github.com/benjholla/bomod

Scroll down and read the explanatory text.

Scroll back up and click the demos folder.

Download each demo by clicking its name and then view raw

Your antivirus or windows defender may warn you about the files They are fine and will not cause problems for your computer select ok or Keep or Continue -depending on your environment.

These are Java files not GUI executable. To run them:

Open a command prompt (Windows-r)

Navigate to the directory they downloaded to typically you can just type cd Downloads and press enter.

Launch each one by typing java -jar

The presentation color scheme is slightly better than the classic scheme.

Run each Java applet in the following sequence.

Jumps: Demo only- explains what stacks are and how they operate..

Stacks: Demo only- explains how variables interact with stacks and how flow control work in programs and subroutines.

Spock: Demonstrates what is commonly called a "variable attack" buffer overflow. Some interaction. The password it is expecting is 8 characters. Try entering 9 with the 9th being something relevant to the program.

Smasher: Demonstrates "stack smashing." Some interaction. Try manipulating the input to get the program to SEGFAULT. If you are careful, you can manipulate the input to overflow into the correct portion of the stack and access the hidden function (it is color coded in RED).

StackGuard: This interactive demo shows how the StackGuard compiler can help prevent "stack attacks." Try manipulating the input to overflow the canary. What happens?

To prove you have completed each demo, you will create a Word document as we have done in the past. Each demo will entail one (or more) screenshots. For each applet:

If asked to input something, take a screenshot/snip to demonstrate that you have done so.

Paste into a word document with headings identifying what each image is.

Complete all the steps, taking a screenshot of the final step..

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_step_2

Step: 3

blur-text-image_step3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions