Question: Part II: Hands on Practices 1 . Given the stack 0 . c and stack 1 . c please follow the files to create a
Part II: Hands on Practices
Given the stackc and stackc please follow the files to create a simple program in C that has a buffer overflow vulnerability, then exploit it
Please submit your source code of program and the input you used to overflow it
Write a shell script that simulates a port scan on a given IP range. Here you may use ping or other tools in Kali Linux.
Using Wireshark, capture and analyze network packets. Document any suspicious patterns you observe. List at least three kinds of package showing in the package you captured and tell their protocol and network functions.
Please submit screenshots of your Wireshark in your answer sheet.
Set up a basic firewall rule on a test machine to block incoming pings ICMP requests
Use a tool like dig or nslookup to analyze the DNS records of a wellknown website. Explain what information each type of record provides and how it contributes to the functioning of the DNS system.
Please submit screenshots of your settings and show how you test the settings.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
