generate code suitable for use in buffer overflow attacks. The Vulnerable Server A remote server sits listening on port 8001. The host on which the server resides is an x86 machine running Linux. When we connect to it, the server prompts us to enter a message. On the server side, the C fgets function is used to load the received message into a stack-based buffer. Despite using fgets, the server is vulnerable to a buffer overflow attack - study the code. THE CODE IS ATTACHED TO THIS DOCUMENT. objective Exploit the above vulnerability in order to gain remote control of the host on which the server resides (the server's prompt message includes the address of the vulnerable buffer in order to simplify the writing of the exploit) [login to view URL] and test the payload in C [login to view URL] the payload into assembly [login to view URL] the assembly into hexadecimal opcodes [login to view URL] the exploit Deliverables You are required to deliver the following in text files (include at the top of each file the names and student ID numbers its authors): Your payload in C in payload.c Your payload in assembly in payload.s (the no nulls version) The hexadecimal opcode representation of your payload in [login to view URL] Your C exploit program i.e. the program which injects the payload in exploit.c A demonstration of the exploit in action in [login to view URL]
## Deliverables
1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done.
2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables):
a) For web sites or other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in the Buyer's environment.
b) For all others including desktop software or software the buyer intends to distribute: A software installation package that will install the software in ready-to-run condition on the platform(s) specified in this bid request.
3) All deliverables will be considered "work made for hire" under U.S. Copyright law. Buyer will receive exclusive and complete copyrights to all work purchased. (No GPL, GNU, 3rd party components, etc. unless all copyright ramifications are explained AND AGREED TO by the buyer on the site per the coder's Seller Legal Agreement).
## Platform
Linux Only