Proj 6x: Remote Shell via Format String Exploit (20 pts.)

What You Need

A 32-bit x86 Kali Linux 2.0 machine, real or virtual.

Challenge: Remote Server with Symbols (20 pts.)

To connect to the server, in a Terminal window, execute this command:

nc 6010
If you'd like a local copy of the server program to analyze, use these commands:

curl > p6x.c

curl > p6x
Exploit this process and get a shell on the server. Then put your name in this file:

Create this file:

After one minute, your name will appear on the WINNERS page here:


If your exploit fails, it might be that the port is in use. You can check the local network connections at this page:

That page is updated every 5 seconds.


If you kill the server, it will restart after one minute

There are two other identical servers running on ports 6011 and 6012

Every 15 minutes, all three servers are restarted

Saving a Screen Image

Make sure YOUR NAME (or an alias) is visible on the WINNERS page.

Capture a full-screen image.


Save the image with the filename "YOUR NAME Proj 6x", replacing "YOUR NAME" with your real name.

Turning in your Project

Email the images to with the subject line: Proj 6x from YOUR NAME
Posted 9-30-15 by Sam Bowne
URl changed to "direct" 1-19-17