Module 10: Challenges


CSE 365 - 2025 Summer.

In this module, we're integrating all of the skills you've learned so far! You'll be using your knowledge of web security, network security, cryptography, reverse engineering, and binary exploitation to solve these challenges.

The challenges for the module are here: Integrated Security.

Good luck!



Challenges

Concepts used: Cryptography + Binary Exploitation

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Concepts used: Cryptography + Binary Exploitation

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Concepts used: Cryptography + Binary Exploitation

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Concepts used: Cryptography + Binary Exploitation

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Concepts used: Reverse Engineering + Binary Exploitation

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Concepts used: Reverse Engineering + Binary Exploitation

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Concepts used: Web Security + Binary Exploitation

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Concepts used: Web Security + Binary Exploitation

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score