Pwn Challenges

You can read and study the binary, for example, with IDA and run it with EDB debugger. To exploit it, you’ll have to start instance (same place where the source is) and connect to given IP and PORT, for example, with PUTTY or NETCAT.

disclaimer: I have not been able to get the flag.