Question: Exploit the vulnerability and execute function 4 instead of function 3 ( 3 2 - bit system ) . It is important to note that

Exploit the vulnerability and execute function4 instead of function3(32-bit system). It is important to note that function4 never gets called by the main function. Your task is to inject a command line argument such that function4 gets called, instead of function3. Include screenshots of the stack exploitation demonstration. #include
#include
#include
int function1(int x, int y, int z)
{
int result_func1;
result_func1= x + y + z;
return result_func1;
}
int function2(int x, int y, char* input_string)
{
int result_func2;
char buffer[20];
strcpy(buffer, input_string);
printf("Your input string %s is copied in the buffer
", input_string);
result_func2= x - y;
return result_func2;
}
void function3(int result1, int result2)
{
printf("The result of function 1 is %d
", result1);
printf("The result of function 2 is %d
", result2);
}
void function4(void)
{
printf("This function never gets called
");
exit(-1);
}
int main(int argc, char* argv[])
{
int result1;
int result2;
result1= function1(5,10,15);
result2= function2(20,8, argv[1]);
function3(result1, result2);
}

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!