辅导SEED labs、讲解C/C++编程、C/C++语言辅导、讲解VM system留学生
- 首页 >> C/C++编程Homework 03
Due Wednesday, October 31 at 11:59pm
Roberto Hoyle
In this homework, you’ll be exploring two different types of buffer overflows. We’ll be making
use of the SEED labs assignments. There are several solutions to these labs posted online, I’m
asking you to not search for these as the instructions given in the lab documents are pretty
thorough and you should be able to follow them. Plus, the honor code...
You are free to partner up with another person for this lab.
1 Initial Setup
You’ll need to either log on to the VM systems that we have set up for you, or download
and install the VM on to your laptop. Instructions for the latter step are available at http:
//www.cis.syr.edu/~wedu/seed/lab_env.html. The VirtualBox software is free, but the disk
image is several gigabytes in size, so you may want to run it elsewhere.
Chris Mohler has graciously set up various virtual machines for our use. To connect to
the VM system, go to https://node08.hpc.oberlin.edu:8006/ and log in with the following
information:
Account: studentXX
Password: studentXX
Replace “XX” with a two-digit combination, from 01 to 40. Expand the item “node08” on
the left-hand side. You’ll see the virtual machine tied to this account. You may need to click
on ”Start” to boot it. Click on “Console” to bind to the console for that machine.
To suspend the session, just close the Console window. You can also shutdown the machine.
Please post on Piazza which 2-digit number you’ll be using to claim it. I’m expecting that
all of you will be respecting each other’s claims, as this is not a competition.
2 Buffer Vulnerability Lab
The first part is the Buffer Vulnerability Lab (http://www.cis.syr.edu/~wedu/seed/Labs_
16.04/Software/Buffer_Overflow/). You are required to do it in C, not in Python, though
the lab instructions include directions for both. This is very similar to what I did in class, so
feel free to use my code for it that is in my pub directory for CSCI 343.
3 Return-to-LibC Lab
The second part is the Return-to-LibC Attack Lab (http://www.cis.syr.edu/~wedu/seed/
Labs_16.04//Software/Return_to_Libc/).
1
4 Submission
Copying from the Buffer Vulnerability Lab description:
You need to submit a detailed lab report, with screenshots, to describe what you have done
and what you have observed. You also need to provide explanation to the observations that are
interesting or surprising. Please also list the important code snippets followed by explanation.
Simply attaching code without any explanation will not receive credits.