System Exploitation


CSE 466 - Fall 2023.

Our world is built on a foundation of sand. You have seen the insecurities with individual programs. Consider that these programs, in turn, are pressed together into complex systems. Humanity tries its best, but the parts of systems do not fit perfectly, and gaps of insecurity abound within the seams. Hackers know the art of sneaking through these gaps, and now, you have reached the point of your journey where you shall develop this art as well. Push through, and join us on the other side.

Note: This module is the "final exam" of the CSE466 Fall 2023 course. This is the final boss module to obtain the green belt ranking! You have the knowledge, there are no additional lecture videos. Good Luck!


Take advantage of yan85.. in the kernel!

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Take advantage of yan85.. in the kernel!

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Defeat yan85's seccomp implementation.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Defeat yan85's seccomp implementation.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Introducing... multiple ypus!

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Introducing... multiple ypus!

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Exploit a userland binary with mutexes.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Exploit a userland binary with mutexes.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Exploit the userland binary to run multiple ypus.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Exploit the userland binary to run multiple ypus.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Exploit the userland binary to run multiple ypus.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Exploit the userland binary to run multiple ypus.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Circumvent yan85's output sanitization.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Circumvent yan85's output sanitization.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Circumvent yan85's output sanitization with KASLR.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Circumvent yan85's output sanitization with KASLR.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score