Question: Examine the provided binary executable * and practice using it . The C source code for this binary is provided below and on Moodle. Run
Examine the provided binary executable and practice using it The source code for this binary is provided
below and on Moodle. Run it to test its operation. The program accepts a password input from the user.
The password is checked and if correct executes one set of code with potentially higher privilege, otherwise
executes another set of code.
Identify and briefly discuss as many software vulnerabilities as you can. Explain how each identified
vulnerability can be exploited. Name and briefly describe possible protections or mitigations against these
exploits. Use diagrams where necessary to help explain the vulnerability, exploit and exploit paths and
protections and mitigations against an exploit.
Use the List of Issues to Consider, below, to help you.
coportfoex This binary is compiled with no software protections.
C code: coportfoexc This is the corresponding source code that makes up the core
part of the binary
#include
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
