网络安全代写 | linuCoursework assignment – Break ’em all
本次英国代写是网络安全相关的一个assignment
Please follow these steps first before start using the VM machine.
Step1:
Connect to the VM machine using the SSH tool as follows:
– In Windows, go to command prompt “CMD” and type ssh username@seceng.nms.kcl.ac.uk
 – In Linux, open the terminal and type ssh username@seceng.nms.kcl.ac.uk
 – Then provide your password
Step2:
You must do the following *** Important***
1- Make sure you are in the home directory , use the command pwd, it should show you your current
 location.
2- Make sure the files .profile and .bashrc are in your home directory, use the command ls -la, it
 should show you them in the output.
 We need to add the following snippet to each file ~/.profile and ~/.bashrc ( Hint: use nano editor or
 vi , no sudo required)
# DON’T REMOVE NOR CHANGE: Enabling ADDR_LIMIT_3GB to mimic the old-fashioned
 0xc0000000
trap /usr/local/bin/setarch.sh EXIT
 if [ ! -f ~/.setarch.lock ]; then
 touch ~/.setarch.lock
 setarch `uname -m` -3 -L -v $SHELL
 fi
After doing this small task you can start working on the VM.
1. ssh into seceng.nms.kcl.ac.uk as per instructions received via email after completing the
 initial form as described in the Assessment page.
2. On seceng.nms.kcl.ac.uk you will find:
 ○ a number of challenges of increasing difficulties (lev1 to lev10):
■ Challenges are in /var/challenge/levelX
 ■ You start from lev0 (group)
 ■ You can read the source code of the challenge corresponding to the level you
 are in.
 ■ Breaking the current level will give you access to the next one:
 ■ Besides spawning a shell, execute the command /usr/local/bin/l33t
 ■ Logout and log back in to retain the privilege level earned.
Check where you are by using the command score:
● At lev0 you show up nowhere. . .
 Solutions must be submitted. To this end, create a <hacker handle>.tar.gz that includes the following
 information:
● For each challenge that you have successfully solved, a program named exploit that
 successfully performs the exploit.
● A file named README.txt containing a short discussion of additional information, such as
 interesting findings, alternative exploit techniques.
 The .tar.gz file must be structured as follows:
<hacker handle>-solutions/
 README
 level1/
 Makefile
 exploit
 level2/
 Makefile
 exploit.c
 …
 …
If you need to compile some source file to obtain the exploit executable, provide a Makefile that does
 that. The exploit program can be written in either C, C++ or python.

 
                        