Observe the vulnerability of software by hacking a Linux Operating system software.
You will need to submit a detailed lab report to describe what they have done and what they have observed. Report should include the evidences to support the observations. Evidences include packet traces, screen dumps, etc.
(Remember a superior or colleague is reading this report, how would you communicate your findings?)
• Keep these questions in mind as you write the report:
• Why is controlling the misbehavior of software as important as software behaving as expected during execution?
• Why is it important to monitor and control application output?
Explain buffer overflow in your own words towards non-technical people (hint: your Executives) List and briefly explain certain strategies to defend against this in your programming.