Question: Part II: Hands on Practices 1 . Given the stack 0 . c and stack 1 . c please follow the files to create a

Part II: Hands on Practices
1. Given the stack0.c and stack1.c please follow the files to create a simple program in C that has a buffer overflow vulnerability, then exploit it!
Please submit your source code of program and the input you used to overflow it.
2. Write a shell script that simulates a port scan on a given IP range. Here you may use ping or other tools in Kali Linux.
3. Using Wireshark, capture and analyze network packets. Document any suspicious patterns you observe. List at least three kinds of package showing in the package you captured and tell their protocol and network functions.
Please submit screenshots of your Wireshark in your answer sheet.
4. Set up a basic firewall rule on a test machine to block incoming pings (ICMP requests).
5. Use a tool like `dig` or `nslookup` to analyze the DNS records of a well-known website. Explain what information each type of record provides and how it contributes to the functioning of the DNS system.
Please submit screenshots of your settings and show how you test the settings.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!