In this assignment, we will put ourselves in the shoes of the attacker, and hack systems. The goal is to familiarize ourselves with the activities and capabilities of an attacker, so that we know what to expect when engineering security into software. Concretely, we will be crafting code injection attacks to solve capture the flag challenges.

Description

Here (TBA).

Notes

  • create & access your Haaukins VM here (TBA). use your ITU initials as Team name (e.g. "wilr")

  • your username and password inside the VM is "haaukins".

Acknowledgment

This assignment involves solving capture the flag challenges available in Haaukins - a virtualization platform for security education. A big shoutout to the developers of Haaukins for maintaining it.