hw7 - CMPSCI 177 Computer Security Fall 2011 Homework 7...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
CMPSCI 177 – Computer Security Fall 2011 Homework 7 – Buffer Overflow Due: 22 NOV 2011 @ 2PM This assignment helps you develop a detailed understanding of the call stack organization on IA32 Intel Pentium processors. It is divided into two parts as explained below. Part 1 In this part, your task is to write a program (buggy.c) that has a buffer overflow vulnerability. You must also write another program (exploit.c) that exercises the vulnerability by overwriting the return pointer and jumping to a function called not_used that would normally not be executed during normal runtime. "not_used" must be the same as the following: void not_used() { printf("The buffer was successfully overflowed. Isn't cs177 a lot of fun? \n"); exit(177); } Note: For grading purposes, calling exit(177) from outside not_used is cheating! Part 2 In this part, your task is to write a program (exploit.c) that will exploit the program, vulnerable.c, shown below. This program has been provided in your home directory on the server.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/27/2011 for the course CMPSC 117 taught by Professor Kemm during the Fall '09 term at UCSB.

Page1 / 2

hw7 - CMPSCI 177 Computer Security Fall 2011 Homework 7...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online