We set up a 32bit Linux virtual machine called testbed to let you experiment with the proposed exercises. Testbed is also the warbox where we host most challenges on reversing and binary exploitation.
Access is granted to the VM via SSH by typing:
ssh -p 2222 firstname.lastname@example.org
where username is pythonically defined as
(first_name + last_name[:8]).lower() and the password is the one you use to connect to the CTF portal. After logging in, you automatically join a persistent tmux session. We are using the default keybindings, hence starting multiple shells within your session is as easy as typing
Ctrl-b c. To cycle between the windows (i.e., the spawned shells) you can use
Ctrl-b n. We strongly encourage you to read the man page of tmux in order to get familiar with the amazing capabilities of this tool. For instance, if you want to keep an eye on the clock, try
Keep in mind that your session is monitored and we may suddenly jump into your shell to give you some useful hints. Don’t be scared, there’s no ghost in the shell.