Race Conditions


CSE 466 - Fall 2023.

Imagine you're in an adrenaline-pumping race against time, where two or more programs are fiercely competing to access or change shared data. This is the thrilling world of race condition exploits! Like daring hackers sliding under closing security gates, these exploits sneak in at just the right millisecond to alter data, causing the system to act in unexpected and often disastrous ways. In this digital race, a split-second can spell the difference between security and breach, creating a high-stakes drama that unfolds in the blink of an eye. By mastering the mechanics of race conditions, you're not just learning to code, you're stepping into a realm where timing is everything, and the prize is the fortification or exploitation of system vulnerabilities. Your code becomes a high-speed racer on the track of system resources, and understanding race conditions is your ticket to the winner's circle!


Exploit a basic race condition to get the flag.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a basic race condition to get the flag.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a race condition with a tighter timing window to read the flag. Keep in mind that tighter timing windows in race conditions generally are harder to exploit reliably!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a race condition with a tighter timing window to read the flag. Keep in mind that tighter timing windows in race conditions generally are harder to exploit reliably!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a race condtion to corrupt memory, affecting the behavior of the challenge.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a race condtion to corrupt memory, affecting the behavior of the challenge.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a race condition to corrupt memory and smash the stack!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a race condition to corrupt memory and smash the stack!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a complex race condition to read the flag. This race condition involves multiple steps, which makes it less reliable to exploit!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a complex race condition to read the flag. This race condition involves multiple steps, which makes it less reliable to exploit!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a complex race condition to read the flag. This race condition involves multiple steps, which makes it less reliable to exploit!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a complex race condition to read the flag. This race condition involves multiple steps, which makes it less reliable to exploit!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a race condition in a more realistic scenario to affect program behavior.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a race condition in a more realistic scenario to affect program behavior.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize multiple connections to the same program to trigger a race condition, affecting program behavior!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize multiple connections to the same program to trigger a race condition, affecting program behavior!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a race condition to leak information out of a program.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a race condition to leak information out of a program.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a race condition to leak information out of a program, but with additional difficulty, making the race harder!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a race condition to leak information out of a program, but with additional difficulty, making the race harder!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a race condition to leak information out of a program, but with even more additional difficulty, making the race even harder!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Utilize a race condition to leak information out of a program, but with even more additional difficulty, making the race even harder!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score