bomblab-cs3214-fall11 - CS 3214, Fall 2011 Project 1:...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CS 3214, Fall 2011 Project 1: Defusing a Binary Bomb Due: Wednesday, September 7, 11:59PM This lab was developed by Dave OHallaron ( ). It was adapted for Virginia Tech by Godmar Back ( ). Minimum requirement: To obtain a passing grade in CS 3214, we expect that by the end of the semester your group was successful in defusing at least phase 4 of your bomb. 1 Introduction The nefarious Dr. Evil has planted a slew of binary bombs on our machines. A binary bomb is a program that consists of a sequence of phases. Each phase expects you to type a particular string on stdin . If you type the correct string, then the phase is defused and the bomb proceeds to the next phase. Otherwise, the bomb explodes by printing "BOOM!!!" and then terminating. The bomb is defused when every phase has been defused. There are too many bombs for us to deal with, so we are giving each group a bomb to defuse. Your mission, which you have no choice but to accept, is to defuse your bomb before the due date. Good luck, and welcome to the bomb squad! Step 1: Get Your Bomb Each group of students will attempt to defuse their own personalized bomb. Each bomb is a Linux binary executable file that has been compiled from a C program. To obtain your groups bomb, one (and only one) of the group members should point your Web browser to the bomb request daemon at Fill out the HTML form with the CS SLO IDs of your team members, and then submit the form by clicking the Submit button. Your CS SLO Id is the id you use to log on to ; 1 e.g., if you log on as , then your SLO id would be ryder . It is usually the same as your VT Pid. The request daemon will build your bomb and return it immediately to your browser in a tar file called bombk.tar , where k is the unique number of your bomb. Save the bombk.tar file to a (protected) directory in which you plan to do your work. Then give the command: tar xvf bombk.tar . This will create a directory called ./bombk with the following files: README : Identifies the bomb and its owners....
View Full Document

This note was uploaded on 12/31/2011 for the course CS 3214 taught by Professor Staff during the Fall '11 term at Virginia Tech.

Page1 / 4

bomblab-cs3214-fall11 - CS 3214, Fall 2011 Project 1:...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online