Program Misuse


Playing With Programs

Lectures and Reading


Challenges

Lets you directly read the flag!

Lets you directly read the flag!

Lets you directly read the flag!

Lets you directly read the flag!

Lets you directly read the flag!

Lets you directly read the flag!

Shows you that an over-privileged editor is a very powerful tool!

Shows you that an over-privileged editor is a very powerful tool!

Shows you that an over-privileged editor is a very powerful tool!

Requires you to understand their output to derive the flag from it!

Requires you to understand their output to derive the flag from it!

Requires you to understand their output to derive the flag from it!

Requires you to understand their output to derive the flag from it!

Requires you to understand their output to derive the flag from it!

Requires you to understand their output to derive the flag from it!

Requires you to understand their output to derive the flag from it!

Forces you to understand different archive formats!

Forces you to understand different archive formats!

Forces you to understand different archive formats!

Forces you to understand different archive formats!

Forces you to understand different archive formats!

Forces you to understand different archive formats!

Forces you to understand different archive formats!

Enables you to read flags by making them execute other commands!

Enables you to read flags by making them execute other commands!

Enables you to read flags by making them execute other commands!

Enables you to read flags by making them execute other commands!

Enables you to read flags by making them execute other commands!

Enables you to read flags by making them execute other commands!

Enables you to read flags by making them execute other commands!

Enables you to read flags by making them execute other commands!

Enables you to read flags by making them execute other commands!

Requires some light programming to read the flag.!

Requires some light programming to read the flag.!

Requires some light programming to read the flag.!

Requires some light programming to read the flag.!

Lets you get the flag by doing tricks with permissions!

Lets you get the flag by doing tricks with permissions!

Lets you get the flag by doing tricks with permissions!

Lets you get the flag by doing tricks with permissions!

Lets you read the flag because they let you program anything!

Lets you read the flag because they let you program anything!

Lets you read the flag because they let you program anything!

Lets you read the flag because they let you program anything!

Just straight up wasn't designed to let you read files!

Just straight up wasn't designed to let you read files!

Just straight up wasn't designed to let you read files!

Just straight up wasn't designed to let you read files!

Just straight up wasn't designed to let you read files!

Just straight up wasn't designed to let you read files! This level has a "decoy" solution that looks like it leaks the flag, but is not correct. If you're submitting what you feel should be a valid flag, and the dojo doesn't accept it, try your solution against a file with uppercase characters to see what's going on.

Shows how dangerous it is to allow users to load their own code as plugins into the program (but figuring out how is the hard part)!


30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score