No report is required for turn-in, but please tell me who is in your group and the way that work was distributed.
Below is how I will grade each groups homework:
1) For each solution, I will start from scratch (e.g. make clean)
2) After I run solution #1, I will examine the log file and the users directory to see that you created a valid user.
3) After I run solution #2, I will examine the log file and the users directory to see that you created a valid users. Your code should perform the following actions:
a) enumerate whether these users exist in the application or not
b) use writeArticle to write arbitrary passwords into each existing user’s password as an authenticated user
You should include users you know will and will not exist in the application in your exploit, as this will be the most precise demonstration that your tool meets the grading criteria.
4) After I run solution #3 and/or #4, I will try to connect to the remote port that the shell code binded too. Then I will connect to the port and type:
‘ls’, ‘whoami’, and ‘date’.
I will read your code and comments to figure out how to run the exploit. If I can’t figure out your exploit or get it to run, you will not get credit for the problem. Be very verbose in your comments and instructions about how to run the code.