This is level 7 on the warchall box
You can find the vulnerable binary + sourcecode in /home/level/tropic/7.
You can also view the source here
Your mission is to exploit it, circumvent the ASLR protection and read a file in the name of the executable.
© 2011, 2012, 2013, 2014, 2015, 2016 and 2017 by tropic
The warchall project is hosted on vr.org, a cloud based hosting service.
The service and support is unique, and they just have added additional 20GB HDD space for us for free! Thank you very much vr.org!