This lab requires analyzing shellcode execution flow, PEB tr…

This quiz focuses on understanding how injected shellcode executes after a buffer overflow and how Windows API functions are resolved dynamically at runtime.

The questions are not asking you to write shellcode. Instead, they require you to observe the provided code and debugger output and explain what is happening at specific points.

Specifically, the quiz checks whether you can:

  • Identify buffer sizes and initial values in a vulnerable function.
  • Recognize how a buffer overflow overwrites execution flow.
  • Observe the first instruction executed when control jumps to the stack.
  • Understand whether a NOP sled is required based on where execution lands.
  • Identify the API function name being dynamically searched in the shellcode.
  • Understand how the Process Environment Block (PEB) is accessed and used.
  • Recognize the application name passed to WinExec.
  • Identify which DLL contains the target function.
  • Understand how execution returns safely after shellcode execution.

Each question ties directly to a specific part of the disassembly or debugger view, often referencing exact instructions or line numbers. Answers should be based strictly on what is shown in the provided code and runtime behavior.

Requirements: 10 aswers | Assembly Language

WRITE MY PAPER


Comments

Leave a Reply