Question: Objectives 1 . Exploit the program and gain access to the restricted area. ( 4 points ) 2 . Exploit the program and redirect the

Objectives
1. Exploit the program and gain access to the restricted area. (4 points)
2. Exploit the program and redirect the control flow to a shellcode that prints out your name upon successful execution.
Use the Metasploit framework to generate a shellcode that does this sort of functionality for you. (10 points)
3. Use a tool to extract and list the system calls that have been used in this program (1 point)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!