diff -r ad7ef5a7a63c -r 3a15c73d51e2 hw02.tex --- a/hw02.tex Tue Oct 02 13:57:26 2012 +0100 +++ b/hw02.tex Tue Oct 02 14:11:58 2012 +0100 @@ -4,39 +4,18 @@ \begin{document} -\section*{Homework 1} +\section*{Homework 2} \begin{enumerate} -\item {\bf (Optional)} If you want to have a look at the code presented in the lectures, install Scala available (for free) from -\begin{center} -\url{http://www.scala-lang.org} -\end{center} +\item Assume format string attacks allow you to read out the stack. What can you do + with this information? (Hint: Consider what is stored in the stack.) -\noindent -The web-applications from the first lecture are written in Scala using the Play Framework available (also for free) from -\begin{center} -\url{http://www.playframework.org} -\end{center} - -\item Practice thinking like an attacker. Assume the following situation: -\begin{quote}\it -Prof.~V.~Nasty gives the following final exam question (closed books, closed notes):\bigskip +\item Assume you can crash a program remotely. Why is this a problem? -\noindent -\begin{tabular}{@ {}l} -Write the first 100 digits of pi:\\ -3.\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ -\end{tabular} -\end{quote} +\item How can the choice of a programming language help with buffer overflow attacks? +(Hint: Why are C-programs prone to such attacks, but not Java programs.) -\noindent -Think of ways how you can cheat in this exam? - -\item Explain what hashes and salts are. Describe how they can be used for ensuring data integrity and -storing password information. - -\item What are good uses of cookies (that is browser cookies)? - +\item (Optional) How can a system that separates between \emph{users} and \emph{root} be of any help with buffer overflow attacks? \end{enumerate} \end{document}