辅导SEED labs、讲解C/C++编程、C/C++语言辅导、讲解VM system留学生

- 首页 >> C/C++编程

Homework 03

Due Wednesday, October 31 at 11:59pm

Roberto Hoyle

In this homework, you’ll be exploring two different types of buffer overflows. We’ll be making

use of the SEED labs assignments. There are several solutions to these labs posted online, I’m

asking you to not search for these as the instructions given in the lab documents are pretty

thorough and you should be able to follow them. Plus, the honor code...

You are free to partner up with another person for this lab.

1 Initial Setup

You’ll need to either log on to the VM systems that we have set up for you, or download

and install the VM on to your laptop. Instructions for the latter step are available at http:

//www.cis.syr.edu/~wedu/seed/lab_env.html. The VirtualBox software is free, but the disk

image is several gigabytes in size, so you may want to run it elsewhere.

Chris Mohler has graciously set up various virtual machines for our use. To connect to

the VM system, go to https://node08.hpc.oberlin.edu:8006/ and log in with the following

information:

Account: studentXX

Password: studentXX

Replace “XX” with a two-digit combination, from 01 to 40. Expand the item “node08” on

the left-hand side. You’ll see the virtual machine tied to this account. You may need to click

on ”Start” to boot it. Click on “Console” to bind to the console for that machine.

To suspend the session, just close the Console window. You can also shutdown the machine.

Please post on Piazza which 2-digit number you’ll be using to claim it. I’m expecting that

all of you will be respecting each other’s claims, as this is not a competition.

2 Buffer Vulnerability Lab

The first part is the Buffer Vulnerability Lab (http://www.cis.syr.edu/~wedu/seed/Labs_

16.04/Software/Buffer_Overflow/). You are required to do it in C, not in Python, though

the lab instructions include directions for both. This is very similar to what I did in class, so

feel free to use my code for it that is in my pub directory for CSCI 343.

3 Return-to-LibC Lab

The second part is the Return-to-LibC Attack Lab (http://www.cis.syr.edu/~wedu/seed/

Labs_16.04//Software/Return_to_Libc/).

1

4 Submission

Copying from the Buffer Vulnerability Lab description:

You need to submit a detailed lab report, with screenshots, to describe what you have done

and what you have observed. You also need to provide explanation to the observations that are

interesting or surprising. Please also list the important code snippets followed by explanation.

Simply attaching code without any explanation will not receive credits.


站长地图