The purpose of this assignment is to help you understand buffer overflow and how to exploit it.
$ ssh-keygen -t rsa -b 4096 $ cat ~/.ssh/id_rsa.pub
We have prepared a challenge server for you to exploit. Please connect to the server using the following command:
$ ssh -p 54321 YOUR_STUDENT_ID@teemo.kaist.ac.kr # For example, if your student ID is 20191234, please run the following command: # ssh -p 54321 20191234@teemo.kaist.ac.krIf you have any problem connecting to the server, please contact the TA.
/challenges
.
$ cd /challenges $ ls 01-basic 02-jump 03-shellcode 04-system 05-leak 06-chain 07-fullEach challenge has its own
README.md
file. Please read the file and solve the challenge.
If you solve challenges, you can read flags that are located at each challenge directory.
Create a readme
text file that contains:
Use KAIST
KLMS to submit your assignments. Your submission should
be one gzipped tar file whose name is
YourStudentID_assig3.tar.gz
For example, if your student ID is 20191234,
please name the file as
20191234_assign3.tar.gz
Create a local directory named 'YourStudentID_assign3
' and place all your files in it. Then, tar
your submission file.
Please refer here for how to archive your assignment.
Your submission need to include the following files:
Your submission file should look like this:
In total, we have 7 challenges. First 5 challenges are worth 10 points each, and the last 2 challenges are worth 20 points each. You will get 10 points if your readme file contains correct answers for 3 questions in challenges.