Solve the second stage of the race

At this point, the binary part of the vulnerable machine will be injected into the structure of a binary file to execute the code remotely and obtain access from the machine server. This step is presented to you by Ali Amini of Advanced Afsks Research. The next step in the exploit method is to parse the damage to the machine to read the user’s flag file.