While searching for more information hidden by the government, Laura intercepted communication between a member of the Development team and a member of the Operation team. In summary, meeting the demand of the Security team, a Web application was developed to provide a program used for the analysis of PE binaries. Laura found the files used on that Web application and was able to reproduce its environment using VMware as virtualizer. She suspects that the program may be vulnerable, but she doesn't master binary exploitation. Therefore, she needs your help exploiting it.
Credentials:
- Administrator:Pwn2Win
- Player:Pwn2Win
Log in as Player in order to start the vulnerable service.
- Server: http://pe-analysis-1.pwn2win.party:1337
- Server Backup: http://pe-analysis-2.pwn2win.party:1337
Author: n0ps13d