Skip to content

The objective of this practical work is to conceptually understand the use of Sockets as an IPC method.

Notifications You must be signed in to change notification settings

ichayer/capture-the-flag

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

10 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

Capture the flag

A binary named server was provided without execution instructions or a description of what it does. The idea was to discover by our own means using reverse engineering how to interact with it. Once we understood how the binary works, we had to develop a C program that replicates the behavior of the provided binary as well as a C program to interact with it.

Requirements ๐Ÿ“‹

The following image is needed to compile and run the files inside:

docker pull agodio/itba-so:1.0

Compilation ๐Ÿ› ๏ธ

Create a container with the project's folder as its root:

docker run -v "${PWD}:/root" --security-opt seccomp:unconfined -ti agodio/itba-so:1.0

Once inside the container, into root and then run:

make all

Execution ๐Ÿš€

First, run the server in background

./server &

After that execute the client

./client

About

The objective of this practical work is to conceptually understand the use of Sockets as an IPC method.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •