Question: Q: Program exploitation For this component, you will need to perform exploitation to get shell - access using their program from Q 1 . To

Q: Program exploitation
For this component, you will need to perform exploitation to get shell-access using their program from Q1.
To this end, you are free to use any of the memory-exploitation techniques (including but not limited to the following):
Buffer overflow;
Return-oriented programming (ROP);
Heap exploitation
Etc.
The deliverable for this task will be covering the following:
1. Brief explanation of how the chosen exploitation technique works;
2. Demonstration of exploitation, together with screenshots;
3. Countermeasures against memory-exploitation attacks.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!