Exploit code challenge on QEMU

Some remote servers are running on port 10000, 10001, 10002.

ARM server is running on port 10000.
MIPS server is running on port 10001.
AArch64 server is running on port 10002.

Flag page

ATTACK POINTS

  • Files named "word.txt" are located in all servers in the program's current directory.
  • You can obtain an attack keyword by reading "word.txt".
  • Submit the attack keyword to the score board. (ATTACK POINTS)

DEFENSE POINTS

  • Files named "flag.txt" are located in all servers in the program's current directory.
  • Write your team's defense keyword to "flag.txt".
  • But, you can write "flag.txt" in append mode only. (cannot truncate)
  • The keyword wrote in "flag.txt" is registered with the flag page in realtime. (DEFENSE POINTS)

INFORMATION

  • The servers are running on qemu-2.10.2 with special system call (readc/writec) patches.
  • This system is based on Linux.

DOWNLOAD

LIMIT OF INPUT SIZE

  • The server gets input until the limit of size. (several kilo bytes)
  • A long connection is disconnected automatically. (several seconds)
  • A request of a connection in a short interval is ignored. (several seconds)