Level3 is a blast from the past, with not much details and a sstriped binary!
Experiment around / partially disassemble level3, work out what it wants, and how to exploit it. Some bruteforcing may be required ;)
Binary information
Stack smashing protection (SSP): | Enabled |
---|---|
Postition Independent Executable (PIE): | Disabled |
Address space layout randomisation (ASLR): | Enabled |
Non-executable pages: | None / disabled |
Location: | /levels/level3 |