Question: Examine the provided binary executable * and practice using it . The C source code for this binary is provided below and on Moodle. Run

Examine the provided binary executable* and practice using it. The C source code for this binary is provided
below and on Moodle. Run it to test its operation. The program accepts a password input from the user.
The password is checked and if correct executes one set of code with potentially higher privilege, otherwise
executes another set of code.
Identify and briefly discuss as many software vulnerabilities as you can. Explain how each identified
vulnerability can be exploited. Name and briefly describe possible protections or mitigations against these
exploits. Use diagrams where necessary to help explain the vulnerability, exploit and exploit path(s), and
protections and mitigations against an exploit.
Use the List of Issues to Consider, below, to help you.
co7601_portfo_ex1- This binary is compiled with no software protections.
C code: co7601_portfo_ex1.c - This is the corresponding source code that makes up the core
part of the binary
#include ?????
???=0==0?
C
 Examine the provided binary executable* and practice using it. The C

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!