I made a super secure chat service, connects to the chat server by using the remote client.
You need to exploit the chat server to get the flag.
(service address)
(binary download link)
In deploy folder
# ./run.sh
- Make and join the room.
- In the client, when receiving chat data from the server, the local stack buffer of the client can be overflowed.
- In the server, when copying the chat data which was received from the client, the local stack buffer of the server also can be overflowed.
- The attacker needs to exploit the remote client first, to trigger the vulnerability in the chat server.
- Read the flag which located in /home/chat_server/flag by exploiting the chat server.