Advanced Stack Smashing
The two following binaries present a very similar structure to the one we exploited in the guided part of this exercise. In particular, they both present a stack-based buffer overflow, and they will display the password if you exploit that overflow in order to jump to the proper location in the program. Once you have found both passwords, add them to your submission.
Submission
Input the passwords found in the corresponding lines of the CSV file in the submission git repository, i.e.:
smashme02,password-for-smashme02-here
smashme03,password-for-smashme03-here
smashme04,password-for-smashme04-here