Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Write a program named exploit 1.c that generates badfile. It will put the following at appropriate places in badfile: - shellcode - target address in
Write a program named exploit 1.c that generates badfile. It will put the following at appropriate places in badfile: - shellcode - target address in the stack to which control should go when bof.() returns; ideally, the address of shellcode NOP instructions to increase the chance of success exploit 1 should have exactly one command-line argument: the target address in hex format (eg, 0x1234abc) Compile and run your program to generate badfile, and then run the vulnerable stack program. If your exploit is implemented correctly, then when bof) returns it will execute your shellcode, printing the contents of /var/secret/token If the target address is 0x1234abc, you would run: $ make $ ./exploit_1 0x1234abc $ ./stack seekrit
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started