20-CS-5156 Security Vulnerability Assessment Spring 2017
Lab 4

Authentication, Availability, Confidentiality, Integrity, Defense Principles, Intrusion Detection, Attack vectors, more

Reverse Engineer Binary Code and Remove Exploit

Determine for what inputs this ELF-64 bit binary will rewrite stack addresses and what will be the result if it does. Modify the code keeping functionality the same but removing the vulnerability (in place of the effects of the vulnerability, print "vulnerability removed" to the console). Submit the modified binary plus the result of your examination of it.