Identify a buffer overflow vulnerability in the source


Problem

Identify a buffer overflow vulnerability in the source of the login program. Show two possible inputs that can be used to bypass password authentication, i.e., that can allow the adversary to login without knowing the victim's password. Record a video that explains why and how your attack works. Be specific, and assume that the viewer is familiar with the concept of buffer overflows.

You can modify the code in order to better understand how it works. However, the buffer overflow presented in your video must work with the original code.

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Identify a buffer overflow vulnerability in the source
Reference No:- TGS03312668

Expected delivery within 24 Hours