Question: QUESTION 3 9 The following vulnerable code victim 3 . c has a buffer overflow vulnerability.We use arwin and get WinExec's address as 7 6
QUESTION
The following vulnerable code victim has a buffer overflow vulnerability.We use arwin and get WinExec's address as cfh The following assembly can be used to generate the shellcode True or False? A malcious string that contains the shellcode can be crafted to attack the vulnerable code victimexe above.;Assemble: nasm.exe f win calcshell.asm o calcshell.obj;LINK: GoLink.exe console entrystart calcshell.obj;IF THE obj FILE IS NOT CREATED WITH THE f win GoLink will COMPLAIN; Tested and coded on WinBITS ; BITS: Specifying Target Processor Mode bitsSECTION textglobalstart ; declare entry pointstart:;Put the string "calc.exelo" onto the stackxor ecx,ecx ; ecx push ecx ; push null string terminator onto the stackpush xx theta; exe; little endian; e is put at lower addresspush xc; calc; little endianmov ecx,esp ; esp points to "calc.exelo"push x ; window stylepush ecx ; first argument for WinExecmov eax, cfh; cfh is address of WinExec;call eax ;WinExeccalcexelo", True False
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
