• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

So, does anyone know how to 'hack'?

yllus

Elite Member & Lifer
To finish off my school career, among other classes I will be one entitled Computer Forensics and Security. My first assignment:

This assignment is about using remote exploits on a prescribed set of victim machines.

The goal of this assignment is to compromise several systems on a private network. In addition to fairly standard daemons running on your private victim systems, there is an instance of a server with a buffer overflow problem. You must generate an exploit for that program for each of Linux and Windows.


Pretty cool huh? Basically I require help in two areas:

1) I need to execute a successful buffer overflow in this program. Those 'in the know' recognize that C functions like gets() are inherently insecure because of the lack of bounds checking. However, this is the line I'm dealing with (edited to highlight the code to attack):

char *bp;
int s;

read(s, bp, 99);

Does anyone know what the approach should be to overload the read() command successfully? It's possible that I'm misled about what code to target and attack, but I'm pretty sure the above is correct.


2) The other servers will be running IIS 5.0, older versions of Apache, etc. Is there a certain site where I can collect prewritten exploits to compromise the systems they're running upon? We are not required to write our own code to accomplish these goals - the point is to dig and break in as efficiently as possible.
 
Back
Top