Question: Need help with an seed Ubuntu assignment as soon as possible In this exercise you will repeat the steps we did in class for exploiting
In this exercise you will repeat the steps we did in class for exploiting race condition vulnerability in the vulp program. Exploit the race condition vulnerability in the vulp program race condition by creating a new user with your FirstinitialLastName with uid 0 (root) and a password of your choice. .This requires that you run the exploit twice: One time to append to the /etc/passwd file and a second time to append to the /etc/shadow. To append to the /etc/shadow file you will need to modify the attack and swaplink scripts slightly to replace the passwd files by shadow files. You will need the entry in the shadow file corresponding to your choice of password. You can create a user on the Ubuntu machine, copy the shadow entry for the user, and use it as the entry for the/etc/shadow file. (You will save it in a file, say shadow input to feed it to the vulp program). It is very important that you delete the user you have created and that in your passwd input file, the uid of the user is o .Submit screenshots of The output from running your exploit showing that the shadow file has changed The root prompt when you log in as the new user (FirstinitialastName). The modified attack.sh, swaplink.sh, passwd input, and shadow input files In this exercise you will repeat the steps we did in class for exploiting race condition vulnerability in the vulp program. Exploit the race condition vulnerability in the vulp program race condition by creating a new user with your FirstinitialLastName with uid 0 (root) and a password of your choice. .This requires that you run the exploit twice: One time to append to the /etc/passwd file and a second time to append to the /etc/shadow. To append to the /etc/shadow file you will need to modify the attack and swaplink scripts slightly to replace the passwd files by shadow files. You will need the entry in the shadow file corresponding to your choice of password. You can create a user on the Ubuntu machine, copy the shadow entry for the user, and use it as the entry for the/etc/shadow file. (You will save it in a file, say shadow input to feed it to the vulp program). It is very important that you delete the user you have created and that in your passwd input file, the uid of the user is o .Submit screenshots of The output from running your exploit showing that the shadow file has changed The root prompt when you log in as the new user (FirstinitialastName). The modified attack.sh, swaplink.sh, passwd input, and shadow input files
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
