Rice University logo
 
Top blue bar image Comp327: Introduction to Computer Security
Blog and homepage for Rice's Comp327
 

Grading Criteria for HW6

No report is required for turn-in, but please tell me who is in your group and the way that work was distributed.
Below is how I will grade each groups homework:

1) For each solution, I will start from scratch (e.g. make clean)

2) After I run solution #1, I will examine the log file and the users directory to see that you created a valid user.

3) After I run solution #2, I will examine the log file and the users directory to see that you created a valid users.  Your code should perform the following actions:
a) enumerate whether these users exist in the application or not
b) use writeArticle to write arbitrary passwords into each existing user’s password as an authenticated user

You should include users you know will and will not exist in the application in your exploit, as this will be the most precise demonstration that your tool meets the grading criteria.

4)  After I run solution #3 and/or #4, I will try to connect to the remote port that the shell code binded too.  Then I will connect to the port and type:
‘ls’, ‘whoami’, and ‘date’.
I will read your code and comments to figure out how to run the exploit.  If I can’t figure out your exploit or get it to run, you will not get credit for the problem.  Be very verbose in your comments and instructions about how to run the code.

Comments are closed.