Instructions: By Friday, 10:00 AM, send email to the course staff email alias (which is available on the home page) in which you: Draw the ROP chain (the contents of the stack) for the write() system call that dumps the server binary over the socket to the attacking client. Assume the following: You can and should use notation to represent the addresess known to the attacker. You may need to make other assumptions and introduce other notation as well.