Skip to main content

6. SNU Bank

Challenge Overview

In this challenge, you will be working with a simple C program that simulates a banking system. Your task is to identify and exploit a signal-related vulnerability in the program to read the contents of flag.txt, which is located in the same directory.

Submission

Once you've obtained the flag, please submit it to our CTF server. Then, submit both your exploit code and a 1-page report through ETL. Your report should briefly explain the code you used to get the flag and how you solved the challenge. Please do not cheat, share your flag, or disclose your solutions. Ensure that your report is strictly limited to 1 page.

Before submitting, use this command to compress your files: zip report.zip solve.py report.pdf. Make sure to rename your exploit code to solve.py and your report to report.pdf before running this command. Finally, submit report.zip through ETL.