本次英国代写是网络安全相关的一个assignment
Please follow these steps first before start using the VM machine.
Step1:
Connect to the VM machine using the SSH tool as follows:
– In Windows, go to command prompt “CMD” and type ssh username@seceng.nms.kcl.ac.uk
– In Linux, open the terminal and type ssh username@seceng.nms.kcl.ac.uk
– Then provide your password
Step2:
You must do the following *** Important***
1- Make sure you are in the home directory , use the command pwd, it should show you your current
location.
2- Make sure the files .profile and .bashrc are in your home directory, use the command ls -la, it
should show you them in the output.
We need to add the following snippet to each file ~/.profile and ~/.bashrc ( Hint: use nano editor or
vi , no sudo required)
# DON’T REMOVE NOR CHANGE: Enabling ADDR_LIMIT_3GB to mimic the old-fashioned
0xc0000000
trap /usr/local/bin/setarch.sh EXIT
if [ ! -f ~/.setarch.lock ]; then
touch ~/.setarch.lock
setarch `uname -m` -3 -L -v $SHELL
fi
After doing this small task you can start working on the VM.
1. ssh into seceng.nms.kcl.ac.uk as per instructions received via email after completing the
initial form as described in the Assessment page.
2. On seceng.nms.kcl.ac.uk you will find:
○ a number of challenges of increasing difficulties (lev1 to lev10):
■ Challenges are in /var/challenge/levelX
■ You start from lev0 (group)
■ You can read the source code of the challenge corresponding to the level you
are in.
■ Breaking the current level will give you access to the next one:
■ Besides spawning a shell, execute the command /usr/local/bin/l33t
■ Logout and log back in to retain the privilege level earned.
Check where you are by using the command score:
● At lev0 you show up nowhere. . .
Solutions must be submitted. To this end, create a <hacker handle>.tar.gz that includes the following
information:
● For each challenge that you have successfully solved, a program named exploit that
successfully performs the exploit.
● A file named README.txt containing a short discussion of additional information, such as
interesting findings, alternative exploit techniques.
The .tar.gz file must be structured as follows:
<hacker handle>-solutions/
README
level1/
Makefile
exploit
level2/
Makefile
exploit.c
…
…
If you need to compile some source file to obtain the exploit executable, provide a Makefile that does
that. The exploit program can be written in either C, C++ or python.
程序辅导定制C/C++/JAVA/安卓/PYTHON/留学生/PHP/APP开发/MATLAB

本网站支持 Alipay WeChatPay PayPal等支付方式
E-mail: vipdue@outlook.com 微信号:vipnxx
如果您使用手机请先保存二维码,微信识别。如果用电脑,直接掏出手机果断扫描。
