Question: Q: Program exploitation For this component, you will need to perform exploitation to get shell - access using their program from Q 1 . To
Q: Program exploitation
For this component, you will need to perform exploitation to get shellaccess using their program from Q
To this end, you are free to use any of the memoryexploitation techniques including but not limited to the following:
Buffer overflow;
Returnoriented programming ROP;
Heap exploitation
Etc.
The deliverable for this task will be covering the following:
Brief explanation of how the chosen exploitation technique works;
Demonstration of exploitation, together with screenshots;
Countermeasures against memoryexploitation attacks.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
