Vortex Level 6

Generic Binary Exploitation

You must disassemble this level's exploitable application in order to find the hole.

Reading Material