CSC-405 Computer Security
Assignment 2 Binary Pwnage
Description
Your goal is to break a series of x86-64 binaries using the full range of your hacking skills.
Everyone in the class was sent a user account name and password for the previous homework. You are going to use the same username and password to login to the server via . The details of how to connect are on Piazza.ssh
Every challenge can be found under the directory where is replaced by the level numbers. Each level runs with different elevated privileges, so exploiting a vulnerability in the binary in this context means to execute arbitrary code with elevated privileges. Running with elevated privileges will make a record that you managed to exploit the binary. Note that you will need to log out, then back into the server to see the upgraded level with the tool. Otherwise, you could use or , where levX is the level you just hacked./var/challenges/level
Evaluation
For each level, you need to demonstrate that you have managed to elevate your privileges in the system. Obtaining this privileged shell is done first by identifying the vulnerability, then developing a working exploit. Once you have a working exploit that has provided a privileged shell, simply execute to report your success to the grader. You will also need to demonstrate that you have successfully exploited the binary by providing the source code for your exploit and a description of how you exploited the binary. The description is important and will affect how we grade your assignment.l33t
LevelPoints
You will need to sharpen your Linux hacking toolbelt. You will probably need to become familiar with the following tools to understand the binaries that you want to break:
Evaluation
You will be awarded points based on how many levels are solved. The total number of points that can be obtained from this assignment is 110 points with 10 points being extra credit.
Submission Instru