$24
Ethics
Is it illegal to hack a machine that you do not own or have permission to hack? Solution:
Is it illegal to hack software that you do not own or have permission to hack? Solution:
Should you mess with your friends computer when they're not looking? What if you ask for permission?
Solution:
C
What is the output of the following code? (do it by hand)
#include <stdio.h #include <stdlib.h #define xor "yup"
int tater_tots(int beans){ exit(0); printf("%X\n", beans); return 21;
}
int apples(const char* snickers){
printf("%s", snickers); return 0xBABECAFE;
}
int basketball(){
int (*c)(const char*) = &apples; int cool = apples(xor); printf("%d",tater_tots(cool));
}
int main(){ __asm__(
"jmp basketball" );
printf("hello world\n");
goto yeet;
return 1337;
yeet:
printf("bye\n");
return 9001;
}
Solution:
Assembly
What's in the RAX register at the end of main?
main:
mov rax, 2 ret
Solution:
What's in the RAX register at the end of main?
main:
mov ax, 2 movzx ebx, ax lea rax, ebx ret
Solution:
What's in the RAX register at the end of main?
main:
mov ax, 0x37 mov al, 0x13
mov rbx, 0xFFFFFFFFFFFFFFFF add eax, 0xB33935
xor rbx, rax ret
Page 2
Solution:
About you
How would you rate your knowledge of cybersecurity in general from 1 to 10? Solution:
How would you rate your knowledge of reverse engineering on a scale of 1 to 10? Solution:
Have you taken CMSC389R, CMSC414, HACS201, HACS408E, or ENEE459B? If so which ones. Solution:
What are you looking to learn from this class?
Solution:
Page 3