Assignment 5: Software Security
Deadline: Apr 21st, 11:59 PM PT
In this assignment, you will play with the Linux $\times 86_{-} 64$ ELF binaries.
There are two parts in this assignment: The $\times 86-64$ playground and StackOverflow. We will combine the two parts together for your final score of this assignment.
The Reverse reenignE: x86-64 Playground
In this part, you need to connect to the playgound server and answer the questions. The service domain is $50.18 .95 .99$, and the port number is 3000 . You can connect by nc $50.18 .95 .993000$. You need to provide your ASURITE name (e.g., tiffanyb) once connected so that we can recognize your identity and grade your assignment. The service will also tell you the current score once you log in with your ASURITE.
Headsup: Challenge shift and fib’s outputs depend on the format string of function printf. Here are the format strings:
shift : “\%d” fib : “\%d”
The Stack Smasher: Stack Overflow
In this part, you will pwn the stack overflow vulnerabilities. The challenges are at https://ctf.cse365.io. Similar to the midterm CTF, your goal is to get the flag and submit to the website.
Score Calculation
There are 5 challenges in $\times 86-64$ Playground and 5 challenges in Stack Overflow. The full score of this assignment is 100, and your score will be calculated as $10 *$ # (solved challenges).