A common vulnerability is reading data outside of the bounds intended by the programmer (CWE-125, Out-of-bounds Read). As introduced at the start of this module, reviewing a programs source code can often highlight areas for potential vulnerabilities that could be exploited. Even without source code, programs known as disassemblers and debuggers can be utilized to explore the operation of an executable file.
This lab will be conducted in one of the virtual environments. The instructions for accessing the BU virtual labs is under the Course Materials link on the left, under the heading for Instructions for accessing BU Virtualized Lab Environment. Your instructor will provide you the location and credentials of the specific VMs that you will use in this lab.
Complete . Utilize the virtual machine assigned to you in the class virtual environment to explore and learn to recognize overrunning the intended bounds of data structures in a C program.
For this lab you will use your Labtainer virtual machine. It will automatically log you in.
Submit your completed lab report using the link above.
Leave a Reply
You must be logged in to post a comment.