Lab presentation here and here

Processes practice

You are given this VirtualBox image. You have to log in using the "attacker/attacker" credentials. There is a /home/attacker/unix2.ctf/ directory with four sub-directories, each one for a different challenge. Correspondingly, there are four executable files "/usr/bin/unix2-ctf*". You have to display the contents of the following flag files: /root/unix2/ctf1.txt, by exploiting /usr/bin/unix2-ctf1 (look at source files in "/home/attacker/unix2.ctf/ctf1") /root/unix2/ctf2.txt, by exploiting /usr/bin/unix2-ctf2 (look at source files in "/home/attacker/unix2.ctf/ctf2") /root/unix2/ctf3.txt, by exploiting /usr/bin/unix2-ctf3 (look at source files in "/home/attacker/unix2.ctf/ctf3") /root/unix2/ctf4.txt, by exploiting /usr/bin/unix2-ctf4 (look at source files in "/home/attacker/unix2.ctf/ctf4")

File system practice

You are given this VirtualBox image. Install it. Login using attacker/attacker credentials. Note the three files "/usr/bin/display_attacker_file_*". Their source code is given in files display_attacker_file_1.c, display_attacker_file_2.c, display_attacker_file_3.c. Execute the file such that to get the three flags in "/root/2015.10.26.ctf1.txt", "/root/2015.10.26.ctf2.txt", "/root/2015.10.26.ctf3.txt". You are required to follow the given order.