Question: Exercise 1 :Examine the provided binary executable * and practice using it . Run it to test its operation. The program accepts a password input
Exercise :Examine the provided binary executable and practice using it Run it to test its operation. The program accepts a password input from the user. The password is checked and if correct executes one set of code with potentially higher privilege, otherwise executes another set of code. Identify and briefly discuss as many software vulnerabilities as you can. Explain how each identified vulnerability can be exploited. Name and briefly describe possible protections or mitigations against these exploits. Use diagrams where necessary to help explain the vulnerability, exploit and exploit paths and protections and mitigations against an exploit.
Use the List of Issues to Consider, below, to help you.
On top there a binary is compiled with no software protections.
List of issues to consider:
Buffer overflow Stack overflow Hardcoded password in the binary Other issues
WRITE WITHIN WORDS
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
