Submit a report on Buffer overflow attack. Your report must contain the following:
Page 1: Introduction and history of Buffer overflow attack
Page 2: Sample of a vulnerable problem (use the program in the Buffer overflow lab) and discussion on why it is vulnerable
Page 3 -4: Analysis of the program. Use GDB to run the program and inspect the stack and memory contains. Use the screenshots of GDB output for the discussion.
Page 5-7: Develop a payload program in python so that it generates a dash shell. Run this code, generate the payload and demonstrate the Buffer overflow attack. Give detailed descriptions for each steps.
evaluate your understanding of core cybersecurity principles that has been taught on the previous modules so far.
Sample Solution
The post Introduction and history of Buffer overflow attack appeared first on ACED ESSAYS.