==author== alejandr0 ==level== 100 ==categ== fuzzing ==instructions== fuzz that sh*tttt!!!!!!!! 192.168.203.44:30010 a monitoring python script listens at 192.168.203.44:30011 you can poll it to view the results of crashes (if any) once you are sure you crashed the executable, come see us. a protocol input sequence that crashed the executable is the flag. REMARK FOR FUZZING 100: there is SOURCE NAT applied, thuse your IP does not appear in the log. instead, 192.168.203.42 so check the timestamp!!