(Usually) binary exploitation exercises. Reverse engineer a provided binary that is running on a server, create an exploit for it, and launch your exploit to get arbitrary code execution and grab the ...