, ,

[SOLVED] Comp3703 assignment-2 p0

$25

File Name: Comp3703__assignment_2_p0.zip
File Size: 235.5 KB

5/5 - (1 vote)

There are two problems in this assignment:
Problem 1 (stack-based exploitation). You are given a binary (implementing a parser for Intel HEX format for binary files), containing one or more vulnerabilities. You are asked to exploit these vulnerabilities, using stack-based exploitation methods, to achieve a number of objectives, culminating in an arbitrary code execution. There are 4 (four) subproblems within this problem, with increasing difficulty. The subproblems are designed in a way that helps you in building exploit primitives that would eventually lead to arbitrary code execution.
Problem 2 (heap-based exploitation). There are two binaries in this problem, with similar functionalities but different exploit mitigations in place. You are asked to find heap-related vulnerabilities (use-after-free and double-free) and exploit them to achieve a number of objectives. This problem is divided into 7 (seven) subproblems with increasing difficulty. Just as in Problem 1, these subproblems are designed to help you building the necessary primitives for the final goal of achieving arbitrary code execution.
To see the details for each problem, read the instructions in the respective folders (./stack for Problem 1 and ./heap for Problem 2).
There are two components to this assignment:
Artefact: This consists of python scripts implementing the exploitation steps.
Report: This is a PDF document explaining how you solve the assignment problems. The report file must be named following the convention: <your_uni_id>_report.pdf, e.g., u1234567_report.pdf. Limit your report length to around 3500 words.
Execution environment
This assignment assumes all the associated binaries are run inside the lab VM. You need to install two additonal software packages to run and test these binaries: socat and libreadline-dev. Install them in the lab VM using the following commands: bash $ sudo apt install socat libreadline-dev
Testing your solution scripts
Each subproblem requires you to write a python script to launch the exploit. For the purpose of assessment, you must assume that the binaries will be run in a remote server, so in particular you have no direct visibility into the program states (so, e.g., you cannot run gdb and inspect the buffer addresses or libc addresses while executing your attacks). To assist you in testing your solution, to make sure that they comply with this requirement, each problem comes with a script to run the binary as a local server application that interacts only through the (localhost) network socket. Your submitted solution scripts must interact with the binaries only through the network sockets. This can be done through pwntools’s remote() command. You are, however, free to use the process() command to interact with the binaries while you are developing your solutions, but in the final submission, the process() command must be replaced by the remote() command.
COMP3703 assignment 2
:
Code Help
Programming Help
:#The Solution needs to be customised that’s why we didn’t attach the solution
For the Programming Help for this solution email or whatsapp me at:
[email protected] Whatsapp : +1 419 877 7882

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Shopping Cart
[SOLVED] Comp3703  assignment-2 p0[SOLVED] Comp3703 assignment-2 p0
$25