Memory Errors


Program Security

Lectures and Reading


Challenges

Overflow a buffer on the stack to set the right conditions to obtain the flag!

Overflow a buffer on the stack to set the right conditions to obtain the flag!

Overflow a buffer on the stack to set trickier conditions to obtain the flag!

Overflow a buffer on the stack to set trickier conditions to obtain the flag!

Overflow a buffer and smash the stack to obtain the flag!

Overflow a buffer and smash the stack to obtain the flag!

Overflow a buffer and smash the stack to obtain the flag, but this time bypass a check designed to prevent you from doing so!

Overflow a buffer and smash the stack to obtain the flag, but this time bypass a check designed to prevent you from doing so!

Overflow a buffer and smash the stack to obtain the flag, but this time bypass another check designed to prevent you from doing so!

Overflow a buffer and smash the stack to obtain the flag, but this time bypass another check designed to prevent you from doing so!

Overflow a buffer and smash the stack to obtain the flag, but this time bypass another check designed to prevent you from doing so!

Overflow a buffer and smash the stack to obtain the flag, but this time bypass another check designed to prevent you from doing so!

Overflow a buffer and smash the stack to obtain the flag, but this time in a position independent (PIE) binary!

Overflow a buffer and smash the stack to obtain the flag, but this time in a position independent (PIE) binary!

Overflow a buffer and smash the stack to obtain the flag, but this time in a position independent (PIE) binary with an additional check on your input.

Overflow a buffer and smash the stack to obtain the flag, but this time in a position independent (PIE) binary with an additional check on your input.

Overflow a buffer and smash the stack to obtain the flag, but this time in a PIE binary with a stack canary. Be warned, this requires careful and clever payload construction!

Overflow a buffer and smash the stack to obtain the flag, but this time in a PIE binary with a stack canary. Be warned, this requires careful and clever payload construction!

Overflow a buffer and leak the flag. Be warned, this requires careful and clever payload construction!

Overflow a buffer and leak the flag. Be warned, this requires careful and clever payload construction!

Overflow a buffer and leak the flag. Be warned, this requires careful and clever payload construction!

Overflow a buffer and leak the flag. Be warned, this requires careful and clever payload construction!

Defeat a stack canary in a PIE binary by utilizing a bug left in the binary.

Defeat a stack canary in a PIE binary by utilizing a bug left in the binary.

Leak data left behind unintentionally by utilizing clever payload construction.

Leak data left behind unintentionally by utilizing clever payload construction.

Leak data left behind unintentionally to defeat a stack canary in a PIE binary.

Leak data left behind unintentionally to defeat a stack canary in a PIE binary.

Defeat a stack canary in a PIE binary by utilizing a network-style fork server in the target binary.

Defeat a stack canary in a PIE binary by utilizing a network-style fork server in the target binary.


Ranking

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score