challenges-descriptions/en/my_little_pwn.html

12 lines
952 B
HTML

So, I've heard you're kinda new to pwn ? </br>
</br>
Basically, in almost every challenge you'll be provided a binary and an access to our server on which the binary is listening to you. Sometimes you'll also be provided the source code (that's the case for this challenge). </br>
Your goal is generally to read the content of a file "flag.txt" on the server. </br>
For this you'll need to exploit vulnerabilities of the given binary. So the first step would be to identify those vulnerabilities, and then to do some research to find out how to exploit them. </br>
The binary is given to you so that you can try your exploits on your local machine (which has to be running on linux, otherwise you won't be able to run the binary). </br>
I advise you to do some research about "buffer overflow" to get you started. </br>
</br>
When you'll be ready: <b>nc challenges.42ctf.org 3002</b> </br>
Good luck ! </br>
</br>
PS: don't forget to download the files