COMPX519-24B

COMPX519-24B

Assignment 1

Total Marks: 20

Due: 11 August 2024 09:00 pm

Submission: Online (Submit through Moodle)

This assignment has four parts. You will use web to complete  various  tasks  in  this assignment. Please make sure you cite all sources appropriately for information you use from any source and the ideas which are not yours.

For referencing style

https://libraryguides.waikato.ac.nz/apa-style

For all parts, read the notes carefully. Part 1 - Binary Analysis - 3 marks

Download the file Sample from Moodle. Analyse the file and answer the following short questions.

Notes:  There is no need to execute this file. For all answers, you must provide  a screenshot with a date showing when it was taken. A screenshot without a date will not be accepted.

1.   Is this file an executable or a dll?

2.   What address does the NT Header/PE Header starts from?

3.   How many sections does this PE file contain and what are they?

4.   What is the Address of the Entry Point?

5.   What functions are being imported and exported by the binary?

6.   If the file can handle large addressset?

Part 2 - Malware Functionality - 3 marks

Recently, it was found that malicious code planted inside XZ Utils breaks encrypted SSH connections and can provide a backdoor. In this part, you will use the web to read about this and answer the following questions.

Notes: There is no need to download or execute any file. Please write in your own words and make sure you cite all sources.

1.   Explain the main idea behind XZ utils backdoor (Exploitation, Impact)?

2.   How was this vulnerability discovered?

Part 3 - Malware Analysis - 4 marks

Assume that you are asked to perform. static analysis for a client. You do not have access to executable files; however, you are provided the following two hashes. In this part, you will use the web to gather relevant information and prepare a report with the following components.

Notes: There is no need to download or execute any file. Please write in your own words and make sure you cite all sources.

Hash1: db349b97c37d22f5ea1d1841e3c89eb4 Hash2: 82eecd3b80caa7d0f51aba4ee8149c1a

1.   Find the threat categories for both hashes (one or more).

2.   Briefly  explain the behaviour  for both hashes. You are not required to list each action.

•   Filesystem actions

•   Registry actions

Part 4 - Source Code Analysis - 10 marks

Assume that we have found a repository that we suspect contains part of the source code for malicious executables. You have been asked to analyse four code snippets provided below and prepare a report with the following components.

Notes: There is no need to execute code snippets. Please write in your own words and make sure you cite all sources.

1.   For each code snippet provided, explain which functionality (core and/or additional) being implemented? Refer to specific line(s) of code.

Assignment submission

Submit everything in a single (pdf) report on Moodle.

Extensions

Extensions will normally be granted only on the basis of verified sound reasons. If you require an extension, get in touch with the lecturer as early as possible (But no later than 48 hours before the deadline).

Late Submission

You can submit late. However, late submissions will be deducted 1 mark/day.

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值