README
Name: Matryoshka
Description
There's something more in the executable, isn't there?
Hint 1: It's and ELF inside and ELF.
Vulnerability
There is a global variable storing an ELF file. The participant will retrieve it, find out what the XOR key is by matching the ELF header, extract the ELF file and run it. The executable is stripped to make things a little bit difficult for the participant.
Exploit
Script in ./sol/exploit.py
Environment
Nothing special. The executable file is to be downloaded by the participant.
Deploy
Provide the executable file to the participant.