Processes practice
You are given
this VirtualBox image. You have to log in using the "attacker/attacker" credentials. There is a /home/attacker/unix2.ctf/ directory with four sub-directories, each one for a different challenge. Correspondingly, there are four executable files "/usr/bin/unix2-ctf*". You have to display the contents of the following flag files:
/root/unix2/ctf1.txt, by exploiting /usr/bin/unix2-ctf1 (look at source files in "/home/attacker/unix2.ctf/ctf1")
/root/unix2/ctf2.txt, by exploiting /usr/bin/unix2-ctf2 (look at source files in "/home/attacker/unix2.ctf/ctf2")
/root/unix2/ctf3.txt, by exploiting /usr/bin/unix2-ctf3 (look at source files in "/home/attacker/unix2.ctf/ctf3")
/root/unix2/ctf4.txt, by exploiting /usr/bin/unix2-ctf4 (look at source files in "/home/attacker/unix2.ctf/ctf4")