Program Misuse


CSE 466 - Fall 2022.

Lets you directly read the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Lets you directly read the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Lets you directly read the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Lets you directly read the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Lets you directly read the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Lets you directly read the flag!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Shows you that an over-privileged editor is a very powerful tool!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Shows you that an over-privileged editor is a very powerful tool!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Shows you that an over-privileged editor is a very powerful tool!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Requires you to understand their output to derive the flag from it!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Requires you to understand their output to derive the flag from it!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Requires you to understand their output to derive the flag from it!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Requires you to understand their output to derive the flag from it!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Requires you to understand their output to derive the flag from it!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Requires you to understand their output to derive the flag from it!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Requires you to understand their output to derive the flag from it!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Forces you to understand different archive formats!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Forces you to understand different archive formats!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Forces you to understand different archive formats!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Forces you to understand different archive formats!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Forces you to understand different archive formats!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Forces you to understand different archive formats!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Forces you to understand different archive formats!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Enables you to read flags by making them execute other commands!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Enables you to read flags by making them execute other commands!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Enables you to read flags by making them execute other commands!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Enables you to read flags by making them execute other commands!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Enables you to read flags by making them execute other commands!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Enables you to read flags by making them execute other commands!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Enables you to read flags by making them execute other commands!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Enables you to read flags by making them execute other commands!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Enables you to read flags by making them execute other commands!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Requires some light programming to read the flag.!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Requires some light programming to read the flag.!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Requires some light programming to read the flag.!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Requires some light programming to read the flag.!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Lets you get the flag by doing tricks with permissions!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Lets you get the flag by doing tricks with permissions!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Lets you get the flag by doing tricks with permissions!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Lets you get the flag by doing tricks with permissions!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Lets you read the flag because they let you program anything!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Lets you read the flag because they let you program anything!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Lets you read the flag because they let you program anything!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Lets you read the flag because they let you program anything!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Just straight up wasn't designed to let you read files!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Just straight up wasn't designed to let you read files!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Just straight up wasn't designed to let you read files!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Just straight up wasn't designed to let you read files!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Just straight up wasn't designed to let you read files!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Just straight up wasn't designed to let you read files!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Shows how dangerous it is to allow users to load their own code as plugins into the program (but figuring out how is the hard part)!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score