Get Instant Help From 5000+ Experts For
question

Writing Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

Understanding Shellcode: Metasploit, Vulnerabilities, And Exploitation

11 Pages / 2,562 Words Published On: 05-02-2021

Command explanations in Metasploit demo

Part A. Shellcode In Literature

Students are required to answer research questions based on three academic papers:
“The Shellcode Generation” https://ieeexplore.ieee.org/document/1341416/
“Evasion Techniques” https://ieeexplore.ieee.org/abstract/document/6042389/
“English Shellcode” https://dl.acm.org/citation.cfm?id=1653725 

1.In the paper “The Shellcode Generation”, what is the development bottom-line for an exploit? List and give detailed explanations to the three components for a usable exploit.

2. Read the paper “Evasion Techniques”, and explain how a piece of shellcode can bypass an intrusion detection system. more information about the shellcode issues related to computer forensic investigations

3. Read the paper “English Shellcode”, explain the concept of program counter and its importance to an attacker who uses shellcodes.

4. In the paper “English Shellcode”, what are the two advantages of using alphanumeric encoding engines to generate shellcode?

Suppose you are working for an IT security company which is subcontracted by Deakin University to test the system security of the campus network. Your manager wants you to attempt to write shellcode which takes a user’s account name and his/her password and stores the information as plain text in a text file called user.dat in the user’s current directory.

Requirements —

1. You should implement a C program to ask a user to type his username and password one a command line input (i.e., from the standard input channel).

2. Your program should demand at least two user attempts of inputting the passwords. That is, your program should only terminate when the user has entered two identical passwords.

3. Your program should store the username and password pair into a text file called user.dat in the current directory.

4. You should package your C code into a shellcode by using Shellforge

You need to write an essay to demonstrate your level of understanding about shellcode and its application on hacking platforms, operating systems vulnerability, penetration testing and exploitation. Your essay should consist of the following parts:

1. List and explain every command used in the metasploit demo https://sites.google.com/site/leoyuzhang/teaching

2. Identify the name of the shellcode used in the demo, reproduce its contents in hex and provide a screen capture of it in your essay, and explain what this shellcode is capable of doing.

3. Find and list at least five different shellcode-generating approaches. Then compare the advantages and disadvantages from the viewpoint of attackers.

4. Describe the concept of polymorphic shellcode. And discuss the impact of misusing penetration toolkits such as Metasploit for malicious purposes.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Understanding Shellcode: Metasploit, Vulnerabilities, And Exploitation. Retrieved from https://myassignmenthelp.com/free-samples/sit703-advanced-digital-forensics/cyber-attacks.html.

"Understanding Shellcode: Metasploit, Vulnerabilities, And Exploitation." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/sit703-advanced-digital-forensics/cyber-attacks.html.

My Assignment Help (2021) Understanding Shellcode: Metasploit, Vulnerabilities, And Exploitation [Online]. Available from: https://myassignmenthelp.com/free-samples/sit703-advanced-digital-forensics/cyber-attacks.html
[Accessed 22 September 2023].

My Assignment Help. 'Understanding Shellcode: Metasploit, Vulnerabilities, And Exploitation' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/sit703-advanced-digital-forensics/cyber-attacks.html> accessed 22 September 2023.

My Assignment Help. Understanding Shellcode: Metasploit, Vulnerabilities, And Exploitation [Internet]. My Assignment Help. 2021 [cited 22 September 2023]. Available from: https://myassignmenthelp.com/free-samples/sit703-advanced-digital-forensics/cyber-attacks.html.


Stuck on Any Question

Our best expert will help you with the answer of your question with best explanation.

question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

loader
250 words
Error goes here

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Other Samples
icon
5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?
close
Subtraction Payment required!

Only one step away from your solution of order no.