Binary Exploitation - (Level 4) flag

Challenge Description

Papa brought me a packed present! let’s open it. Download. This is reversing task. all you need is binary

From the description seems like it is a reverse engineering task. Let’s download the binary and load it up in ghidra.

Read More

Binary Exploitation - (Level 3) BOF

Challenge Description

Nana told me that buffer overflow is one of the most common software vulnerability. Is that true?

This challenge is a classic buffer overflow but to interact with the program we have to connect to the remote server, and this simple challenge is a very good example of remote exploitation.

Read More
Your browser is out-of-date!

Update your browser to view this website correctly.&npsb;Update my browser now

×