2020 EUROPEAN CYBER SECURITY CHALLENGE

3-7 November 2020

Vienna, Austria

READ EVERYTHING

Event Other
Tags Crypto
Difficulty
Easy
Additional Info
Description

It is common to exploit binaries by writing too much data into a fixed-size buffer. This is called a buffer overflow. But there is one notorious example of a real-life attack that abused buffers in slightly different way.

Other artefacts
Tasks

Connect to target with netcat or similar tool and try to exploit it. The binary is available for inspection at target machine via HTTP on another port.