| author | Christian Urban <christian dot urban at kcl dot ac dot uk> |
| Sat, 04 Oct 2014 00:36:51 +0100 | |
| changeset 196 | 22f027da67ec |
| parent 144 | fdd0c7fa1b65 |
| child 239 | 0db764174afb |
| permissions | -rw-r--r-- |
| 33 | 1 |
\documentclass{article}
|
2 |
\usepackage{charter}
|
|
3 |
\usepackage{hyperref}
|
|
4 |
||
5 |
\begin{document}
|
|
6 |
||
| 39 | 7 |
\section*{Homework 3}
|
| 33 | 8 |
|
9 |
\begin{enumerate}
|
|
10 |
\item What does the principle of least privilege say? |
|
11 |
||
| 34 | 12 |
\item In which of the following situations can the access control mechanism of Unix |
| 33 | 13 |
file permissions be used? |
14 |
||
15 |
\begin{itemize}
|
|
16 |
\item[(a)] Alice wants to have her files readable, except for her office mates. |
|
17 |
\item[(b)] Bob and Sam want to share some secret files. |
|
18 |
\item[(c)] Root wants some of her files to be public. |
|
19 |
\end{itemize}
|
|
20 |
||
| 38 | 21 |
\item What should the architecture of a network application under Unix |
| 33 | 22 |
be that processes potentially hostile data? |
23 |
||
| 34 | 24 |
\item How can you exploit the fact that every night root has a cron |
|
110
fefd78525434
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
97
diff
changeset
|
25 |
job that deletes the files in \texttt{/tmp}? (Hint: cron-attack)
|
| 34 | 26 |
|
27 |
\item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
|
|
| 38 | 28 |
bit set? Why is this necessary? |
|
110
fefd78525434
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
97
diff
changeset
|
29 |
\item Assume format string attacks allow you to read out the stack. What can you do |
|
fefd78525434
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
97
diff
changeset
|
30 |
with this information? (Hint: Consider what is stored in the stack.) |
| 34 | 31 |
|
|
110
fefd78525434
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
97
diff
changeset
|
32 |
\item Assume you can crash a program remotely. Why is this a problem? |
|
fefd78525434
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
97
diff
changeset
|
33 |
|
|
fefd78525434
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
97
diff
changeset
|
34 |
\item How can the choice of a programming language help with buffer overflow attacks? |
|
fefd78525434
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
97
diff
changeset
|
35 |
(Hint: Why are C-programs prone to such attacks, but not Java programs.) |
|
fefd78525434
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
97
diff
changeset
|
36 |
|
|
144
fdd0c7fa1b65
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
110
diff
changeset
|
37 |
%\item How can a system that separates between \emph{users} and \emph{root}
|
|
fdd0c7fa1b65
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
110
diff
changeset
|
38 |
%be of any help with buffer overflow attacks? |
| 33 | 39 |
\end{enumerate}
|
40 |
||
41 |
\end{document}
|
|
42 |
||
43 |
%%% Local Variables: |
|
44 |
%%% mode: latex |
|
45 |
%%% TeX-master: t |
|
46 |
%%% End: |