Question: Lab 1 BufferOverflow Task 1 :We provide you with a completed exploit code called exploit . py . You need to adjust the variables of
Lab BufferOverflow
Task :We provide you with a completed exploit code called exploitpy You need to adjust the variables of the program accordingly and fill in any missing code to fulfill the buffer overflow attack.
Notes on python, you don't need to compile a py file to run it Python is an interpreted language, and you can run the scripts directly, either using:
python exploit.py
Or make your script executable by adding #usrbinpython to the top of the script, making the file executable with "chmod ux exploit.py and then running: exploitpy
The book utilizes the second version exploitpy
After you finish adjusting the above program, run it This will generate the contents for badfile Then compile and run the vulnerable program "stack.c If your exploit is implemented correctly, you should be able to get a shell:
$ id
uidseed gidseed groupsseed
Task: Find a way to obtain root shell read bookslides
you should get the following output:
VM# id
uidseed gidseed euidroot groupsseed
Task: On bit Linux machines, stacks only have bits of entropy, which means the stack base address can have possibilities. This number is not that high and can be exhausted easily with the bruteforce approach. In this task, we use such an approach to defeat the address randomization countermeasure on our bit VM First, we turn on the Ubuntus address randomization using the following command:
sudo sbinsysctl w kernel.randomizevaspace
Then use the shell script in the book to figure out how to attack the vulnerable program repeatedly.
To summarize, the lab goal is:
Task edit the given source code exploitpy so that the buffer overflow attack is successful.
Task ensure the shell is running as root.
Task Defeat the Address Randomization applied by the operating system.
In your paper show and explain the following:
The adjusted code segments, and describe what changes you made and why. How you obtained the needed addresses, show screenshots.
The screenshots of the successful buffer overflow attack.
How you made the shell run as root.
How you defeated Address Randomization, screenshot.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
