Please proceed to the bufferoverflow
folder.
You will be exploiting the buffer overflow vulnerability to override the address of a pointer.
Your job is to provide malicious input to the program launcher
. Once you run it, the program will wait for your input. It's the same program that we talked about in the lecture. Please refer to the pointer addresses printed out to the screen to exploit the buffer overflow. If you successfully override the address, you will have the correct flag; otherwise, you will see the fake flag.
Good luck.