# Lab07: remote Challenges are running on the CTF server, on ports 10700-10711. For example, to connect to the tutorial you can do, ``` $ nc [server_ip_address] [port] ``` with the CTF server's ip address given on Canvas and Piazza. Port numbers for the challenges are sequential: ``` tut07-socket 10700 tut07-remote 10701 passwd 10702 mini-shellshock 10703 obscure 10704 diehard 10705 array 10706 fmtstr-heap2 10707 memo 10708 2kills 10709 return-to-dl 10710 2048-game 10711 ``` FYI, our server runs on Ubuntu 18.04.5 LTS: ``` - Linux 5.4.0-1038-aws x86_64 GNU/Linux - /usr/arm-linux-gnueabi/lib/libc-2.27.so (md5: 4dff573013a9a75e29df6197d41899c2) - /lib/i386-linux-gnu/libc.so.6 (md5: 40860aa4eab257bd5c35e2dfac4cca07) - /lib/x86_64-linux-gnu/libc.so.6 (md5: 8ee8363b834ad2c65a05bd40c8e4623e) ``` You can download the challenge files from the server: ``` # for example, $ scp lab07@[server_ip_address]:~/obscure/target . ``` Please note that we do not provide the target binary for `passwd` and `mini-shellshock` challenge so you cannot download them. * Problems + [level 00] tut07-socket [20 points] + [level 01] tut07-remote [20 points] + [level 02] passwd [20 points] + [level 03] mini-shellshock [20 points] + [level 04] tut-remote [20 points] + [level 05] obscure [20 points] + [level 06] diehard [20 points] + [level 07] array [20 points] + [level 08] fmtstr-heap2 [20 points] + [level 09] memo [20 points] + [level 10] 2kills [20 points] + [level 11] return-to-dl [20 points] + [level 12] 2048-game [20 points] * Refs - https://docs.python.org/3/howto/sockets.html