Exploit the vulnerable program (vulnerable.c) to obtain a shell. The vulnerable program and sample exploit (you need to edit the exploit to make it work) are in the Assignments folder which in turn is in the Documents folder in the TritonApps lab environment. Provide commands and the screenshots of the outputs to illustrate your exploit. [10 pts] Answer the following questions related to the exploit: a. Which function and statement in the program is the major cause of the vulnerability? Why? [10 pts] b. What address are you using to overwrite the return address? How did you obtain this address? [10 pts] c. Draw a figure of the overflow string that leads to a successful buffer overflow attack and a shell. The figure should highlight the important addresses and contents. [10 pts] d. What offset worked for your exploit? How did you find the offset? [10 pts]

Looking for a solution written from scratch with No plagiarism and No AI?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay