{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

bomblab-cs3214-fall11

bomblab-cs3214-fall11 - CS 3214 Fall 2011 Project 1...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CS 3214, Fall 2011 Project 1: Defusing a Binary Bomb Due: Wednesday, September 7, 11:59PM This lab was developed by Dave O’Hallaron ( [email protected] ). It was adapted for Virginia Tech by Godmar Back ( [email protected] ). Minimum requirement: To obtain a passing grade in CS 3214, we expect that by the end of the semester your group was successful in defusing at least phase 4 of your bomb. 1 Introduction The nefarious Dr. Evil has planted a slew of “binary bombs” on our machines. A binary bomb is a program that consists of a sequence of phases. Each phase expects you to type a particular string on stdin . If you type the correct string, then the phase is defused and the bomb proceeds to the next phase. Otherwise, the bomb explodes by printing "BOOM!!!" and then terminating. The bomb is defused when every phase has been defused. There are too many bombs for us to deal with, so we are giving each group a bomb to defuse. Your mission, which you have no choice but to accept, is to defuse your bomb before the due date. Good luck, and welcome to the bomb squad! Step 1: Get Your Bomb Each group of students will attempt to defuse their own personalized bomb. Each bomb is a Linux binary executable file that has been compiled from a C program. To obtain your group’s bomb, one (and only one) of the group members should point your Web browser to the bomb request daemon at http://cs3214.cs.vt.edu:15213 Fill out the HTML form with the CS SLO IDs of your team members, and then submit the form by clicking the “Submit” button. Your CS SLO Id is the id you use to log on to rlogin.cs.vt.edu ; 1 e.g., if you log on as [email protected] , then your SLO id would be ryder . It is usually the same as your VT Pid. The request daemon will build your bomb and return it immediately to your browser in a tar file called bombk.tar , where k is the unique number of your bomb. Save the bombk.tar file to a (protected) directory in which you plan to do your work. Then give the command: tar xvf bombk.tar . This will create a directory called ./bombk with the following files: • README : Identifies the bomb and its owners....
View Full Document

{[ snackBarMessage ]}

Page1 / 4

bomblab-cs3214-fall11 - CS 3214 Fall 2011 Project 1...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon bookmark
Ask a homework question - tutors are online