Systems Security Review


CSE 598 - Spring 2024

In the dojo of digital realms, where bytes and breaches blend. Masters of cyber arts, their keen minds they must lend. Like a martial dance of shadows, they weave through virtual walls. Each skill honed, a whisper in the vast digital expanse. Guided by wisdom, not chance, in this intricate dance. In the art of cyber shadows, only the thoughtful will advance.


Lectures and Reading


Challenges

Take advantage of yan85.. in the kernel!

Take advantage of yan85.. in the kernel!

Defeat yan85's seccomp implementation.

Defeat yan85's seccomp implementation.

Introducing... multiple ypus!

Introducing... multiple ypus!

Exploit a userland binary with mutexes.

Exploit a userland binary with mutexes.

Exploit the userland binary to run multiple ypus.

Exploit the userland binary to run multiple ypus.

Exploit the userland binary to run multiple ypus.

Exploit the userland binary to run multiple ypus.

Circumvent yan85's output sanitization.

Circumvent yan85's output sanitization.

Circumvent yan85's output sanitization with KASLR.

Circumvent yan85's output sanitization with KASLR.


30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score