Limited Primitives


aturt13 Dojo.

Challenges used to illustrate basic memory corruption bugs are often criticized for being too unrealistic. Sometimes real-world bugs are extremely difficult to exploit. Nevertheless, the core procedure remains the same: gain primitives, chain them, attain better control over the program and finally hijack control flow.



Challenges

I made this challenge for Czech Cybersecurity Competition 2025. Actually, it was 100% made by a LLM without the exploitability requirement. I only discovered it was indeed exploitable after long hours of debugging.

Use your limited add primitive to get a root shell. Enjoy!

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Limited by shellcode length, seccomp and remote connection. Good luck.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score