Starting from:
$30

$24

Homework Solution




Ethics




Is it illegal to hack a machine that you do not own or have permission to hack? Solution:



Is it illegal to hack software that you do not own or have permission to hack? Solution:



Should you mess with your friends computer when they're not looking? What if you ask for permission?












Solution:










C




What is the output of the following code? (do it by hand)



#include <stdio.h #include <stdlib.h #define xor "yup"




int tater_tots(int beans){ exit(0); printf("%X\n", beans); return 21;




}




int apples(const char* snickers){




printf("%s", snickers); return 0xBABECAFE;




}




int basketball(){




int (*c)(const char*) = &apples; int cool = apples(xor); printf("%d",tater_tots(cool));




}




int main(){ __asm__(




"jmp basketball" );




printf("hello world\n");




goto yeet;




return 1337;




yeet:




printf("bye\n");




return 9001;




}













Solution:










Assembly




What's in the RAX register at the end of main?






main:




mov rax, 2 ret













Solution:







What's in the RAX register at the end of main?






main:




mov ax, 2 movzx ebx, ax lea rax, ebx ret
















Solution:







What's in the RAX register at the end of main?






main:




mov ax, 0x37 mov al, 0x13




mov rbx, 0xFFFFFFFFFFFFFFFF add eax, 0xB33935




xor rbx, rax ret



















Page 2



Solution:










About you




How would you rate your knowledge of cybersecurity in general from 1 to 10? Solution:



How would you rate your knowledge of reverse engineering on a scale of 1 to 10? Solution:



Have you taken CMSC389R, CMSC414, HACS201, HACS408E, or ENEE459B? If so which ones. Solution:



What are you looking to learn from this class?









Solution:










































































































Page 3

More products