hws/hw03.tex
author Christian Urban <christian dot urban at kcl dot ac dot uk>
Mon, 29 Sep 2014 21:11:06 +0100
changeset 186 f7aa15984301
parent 144 fdd0c7fa1b65
child 239 0db764174afb
permissions -rw-r--r--
updated
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
33
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     1
\documentclass{article}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     2
\usepackage{charter}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     3
\usepackage{hyperref}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     4
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     5
\begin{document}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     6
39
Christian Urban <urbanc@in.tum.de>
parents: 38
diff changeset
     7
\section*{Homework 3}
33
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     8
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     9
\begin{enumerate}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    10
\item What does the principle of least privilege say?
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    11
34
Christian Urban <urbanc@in.tum.de>
parents: 33
diff changeset
    12
\item In which of the following situations can the access control mechanism of Unix
33
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    13
file permissions be used?
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    14
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    15
\begin{itemize}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    16
\item[(a)] Alice wants to have her files readable, except for her office mates.
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    17
\item[(b)] Bob and Sam want to share some secret files.
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    18
\item[(c)] Root wants some of her files to be public.
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    19
\end{itemize}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    20
38
Christian Urban <urbanc@in.tum.de>
parents: 35
diff changeset
    21
\item What should the architecture of a network application under Unix 
33
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    22
be that processes potentially hostile data?
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    23
34
Christian Urban <urbanc@in.tum.de>
parents: 33
diff changeset
    24
\item How can you exploit the fact that every night root has a cron
110
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 97
diff changeset
    25
job that deletes the files in \texttt{/tmp}? (Hint: cron-attack)
34
Christian Urban <urbanc@in.tum.de>
parents: 33
diff changeset
    26
Christian Urban <urbanc@in.tum.de>
parents: 33
diff changeset
    27
\item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
38
Christian Urban <urbanc@in.tum.de>
parents: 35
diff changeset
    28
bit set? Why is this necessary?
110
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 97
diff changeset
    29
\item Assume format string attacks allow you to read out the stack. What can you do
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 97
diff changeset
    30
	with this information? (Hint: Consider what is stored in the stack.)
34
Christian Urban <urbanc@in.tum.de>
parents: 33
diff changeset
    31
110
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 97
diff changeset
    32
\item Assume you can crash a program remotely. Why is this a problem?
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 97
diff changeset
    33
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 97
diff changeset
    34
\item How can the choice of a programming language help with buffer overflow attacks?
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 97
diff changeset
    35
(Hint: Why are C-programs prone to such attacks, but not Java programs.)
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 97
diff changeset
    36
144
fdd0c7fa1b65 updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 110
diff changeset
    37
%\item How can a system that separates between \emph{users} and \emph{root} 
fdd0c7fa1b65 updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents: 110
diff changeset
    38
%be of any help with buffer overflow attacks?
33
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    39
\end{enumerate}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    40
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    41
\end{document}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    42
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    43
%%% Local Variables: 
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    44
%%% mode: latex
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    45
%%% TeX-master: t
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    46
%%% End: