READ EVERYTHING
Additional Info
Description
It is common to exploit binaries by writing too much data into a fixed-size buffer. This is called a buffer overflow. But there is one notorious example of a real-life attack that abused buffers in slightly different way.
Write-ups
Other artefacts
Tasks
Connect to target with netcat or similar tool and try to exploit it. The binary is available for inspection at target machine via HTTP on another port.