Program Security.
It is all too easy to live life without questioning the arcane logic underlying our reality. How do the programs we use every day actually work? How do the mysteries deep within these programs impact their security? Hackers delve into these secrets, learning the subtle dance that all programs follow, and infusing it with unexpected improvisation. In this dojo, you will not only learn the true form of this dance, but develop the skill to impact it.
Stats
Hacking Now: 25
Hackers: 6,378
Challenges: 161
Solves: 196,732
Awardees: 344
Earliest Awardees:
holocircuit
·
ℱlynn
·
The Return Of Blue Shirt Yan
·
tr1shul [yellow belt]
·
Narnix
Latest Awardees:
jpaglier
·
jwrf
·
lasha
·
proflamyt
·
Etynso
Modules
-
Shellcode Injection
0 / 11 -
Reverse Engineering
8 Hacking
0 / 44 -
Intermediate Memory Errors
5 Hacking
0 / 18 -
Return Oriented Programming
6 Hacking
0 / 30 -
Dynamic Allocator Misuse
5 Hacking
0 / 40 -
Program Exploitation
1 Hacking
0 / 18
30-Day Scoreboard:
Rank | Hacker | Badges | Score |