Ebeneth
46374
Standort320
Punkte28
Premium Übungen0
Compromissions
3%
App - Skript
5 Points1 / 33
- o Bash - System 1
- x sudo - weak configuration
- x Bash - System 2
- x LaTeX - Input
- x Powershell - Command Injection
- x AppArmor - Jail Introduction
- x Bash - unquoted expression injection
- x Docker - I am groot
- x Perl - Command injection
- x Powershell - SecureString
- x Bash - cron
- x LaTeX - Command execution
- x Python - input()
- x R : Code Execution
- x Powershell - Basic jail
- x Python - pickle
- x Bash - quoted expression injection
- x Docker - Sys-Admin’s Docker
- x Shared Objects hijacking
- x SSH - Agent Hijacking
- x AppArmor - Jail Medium
- x Bash - race condition
- x Docker - Talk through me
- x Python - format string
- x Python - PyJail 1
- x PHP - Jail
- x Python - PyJail 2
- x Python - Jail - Exec
- x Javascript - Jail
- x Python - Jail - Garbage collector
- x Bash - Restricted shells
- x Python - Eval Is Evil
- x Deep learning - Malicious model
2%
Anwendung - System
15 Points2 / 93
- o ELF x86 - Stack buffer overflow basic 1
- x ELF x64 - Basic heap overflow
- o ELF x86 - Stack buffer overflow basic 2
- x PE32 - Stack buffer overflow basic
- x ELF x86 - Format string bug basic 1
- x ELF x64 - Stack buffer overflow - basic
- x ELF x86 - Format string bug basic 2
- x ELF x86 - Race condition
- x ELF ARM - Stack buffer overflow - basic
- x ELF MIPS - Stack buffer overflow - No NX
- x ELF x64 - Double free
- x ELF x86 - Stack buffer overflow basic 3
- x ELF x86 - Use After Free - basic
- x ELF ARM - Stack Spraying
- x ELF x64 - Stack buffer overflow - PIE
- x ELF x86 - BSS buffer overflow
- x ELF x86 - Stack buffer overflow basic 4
- x ELF x86 - Stack buffer overflow basic 6
- x ELF x86 - Format String Bug Basic 3
- x PE32 - Advanced stack buffer overflow
- x ELF ARM - Basic ROP
- x ELF MIPS - Basic ROP
- x ELF RISC-V - Intro - let’s do the ROP
- x ELF x64 - Stack buffer overflow - Stack pivot
- x ELF x86 - Stack buffer overflow - C++ vtables
- x PE32+ Format string bug
- x ELF x64 - Logic bug
- x ELF x86 - Bug Hunting - Several issues
- x ELF x86 - Stack buffer and integer overflow
- x ELF x86 - Stack buffer overflow - ret2dl_resolve
- x ELF x86 - Stack buffer overflow basic 5
- x ELF x64 - Stack buffer overflow - advanced
- x ELF MIPS - Format String Glitch
- x ELF x64 - Heap Filling
- x ELF x86 - Information leakage with Stack Smashing Protector
- x ELF x64 - File Structure Hacking
- x ELF ARM - Race condition
- x ELF x64 - Browser exploit - Intro
- x ELF x64 - Buggy VM
- x ELF x64 - Heap Safe-Linking Bypass
- x ELF x64 - ret2dl_init
- x ELF x86 - Out of bounds attack - French Paradox
- x ELF x86 - Remote BSS buffer overflow
- x ELF x86 - Remote Format String bug
- x PE32+ Basic ROP
- x ELF x64 - Remote heap buffer overflow - tcache
- x ELF x86 - Blind remote format string bug
- x LinKern ARM - vulnerable syscall
- x LinKern x86 - Buffer overflow basic 1
- x ELF x64 - Sigreturn Oriented Programming
- x LinKern x86 - Null pointer dereference
- x ELF x64 - Syscall chaining
- x LinKern x64 - Race condition
- x ELF ARM - Alphanumeric shellcode
- x ELF MIPS - URLEncoded Format String bug
- x ELF x64 - Blind SROP
- x ELF x64 - Heap Hop
- x ELF x86 - Hardened binary 1
- x ELF x86 - Hardened binary 2
- x ELF x86 - Hardened binary 3
- x ELF x86 - Hardened binary 4
- x LinKern MIPSel - Vulnerable ioctl
- x LinKern x64 - reentrant code
- x ELF ARM - Heap format string bug
- x ELF ARM - Format String bug
- x ELF ARM - Use After Free
- x ELF x64 - FILE structure hijacking
- x ELF x64 - Heap feng-shui
- x ELF x64 - Off-by-one bug
- x ELF x86 - Hardened binary 5
- x LinKern ARM - Stack Overflow
- x LinKern x86 - basic ROP
- x ELF ARM - Heap Off-by-One
- x ELF x64 - Advanced blind format string exploitation
- x ELF x64 - Remote Heap buffer overflow 1
- x ELF x86 - Hardened binary 6
- x ELF x86 - Hardened binary 7
- x ELF x86 - Remote stack buffer overflow - Hardened
- x LinKern x64 - RowHammer
- x LinKern x64 - SLUB off-by-one
- x ELF ARM - Heap buffer overflow - Wilderness
- x ELF ARM - Heap Overflow
- x ELF ARM64 - Heap Underflow
- x ELF x64 - Seccomp Whitelist
- x ELF x86 - Blind ROP
- x LinKern x64 - Memory exploration
- x WinKern x64 - Advanced stack buffer overflow - ROP
- x WinKern x64 - Use After Free
- x ELF x64 - Remote Heap buffer overflow 2
- x ELF x64 - Advanced Heap Exploitation - Heap Leakless & Fortified
- x ELF x64 - Blind ROP
- x ELF x64 - Browser exploit - BitString
- x ELF ARM64 - Multithreading
0%
Knacken
0 Points0 / 66
- x ELF x86 - 0 protection
- x ELF x86 - Basic
- x PE x86 - 0 protection
- x ELF C++ - 0 protection
- x Godot - 0 protection
- x PE DotNet - 0 protection
- x APK - Introduction
- x ELF MIPS - Basic Crackme
- x ELF x64 - Golang basic
- x ELF x86 - Fake Instructions
- x ELF x86 - Ptrace
- x Godot - Bytecode
- x WASM - Introduction
- x APK - Flutter Debug
- x ELF ARM - Basic Crackme
- x ELF x64 - Basic KeygenMe
- x Unity3D Save handling
- x Godot - Mono
- x PE DotNet - Basic Anti-Debug
- x PE DotNet - Basic Crackme
- x PYC - ByteCode
- x ELF x86 - No software breakpoints
- x Lua - Bytecode
- x MachO x64 - keygenme or not
- x ELF ARM - crackme 1337
- x ELF x86 - CrackPass
- x ELF x86 - ExploitMe
- x ELF x86 - Random Crackme
- x GB - Basic GameBoy crackme
- x PDF - Javascript
- x PE x86 - Xor Madness
- x Powershell DeObfuscation
- x ELF ARM - Crypted
- x ELF x64 - Crackme automating
- x Godot - 3D model
- x NRO ARM - Switch homebrew
- x PE x86 - SEHVEH
- x APK - Anti-debug
- x APK - Insomni’Droid
- x ELF x64 - Rust backdoor
- x ELF x64 - Rust Crackme
- x PE x64 - UEFI Secure Boot
- x APK - Root My Droid
- x ELF x64 - Nanomites - Introduction
- x ELF x86 - Anti-debug
- x PE DotNet - KeygenMe
- x PE x64 - Tables in shambles
- x PE x86 - AutoPE
- x PYC - Self Modifying (Byte)Code
- x PYC - Snakeygen
- x ELF x86 - KeygenMe
- x HackerMan
- x Unity - Mono - Basic Game Hacking
- x WASM - Find the NPC
- x Bash - VM
- x ELF x64 - KeyGenMe
- x ELF x64 - Anti-debug and equations
- x Unity - IL2CPP - Basic Game Hacking
- x ELF x64 - Nanomites
- x ELF x86 - Packed
- x PE x86 - RunPE
- x ELF x86 - VM
- x ELF x64 - Hidden Control Flow
- x Ringgit
- x Voracious Nanomites
- x White-Box Cryptography #2
0%
Kryptoanalyse
0 Points0 / 69
- x Encoding - ASCII
- x Encoding - UU
- x Hash - DCC
- x Hash - DCC2
- x Hash - LM
- x Hash - Message Digest 5
- x Hash - NT
- x Hash - SHA-2
- x Shift cipher
- x CISCO - Salted Password
- x Pixel Madness
- x ELF64 - PID encryption
- x File - PKZIP
- x Monoalphabetic substitution - Caesar
- x Circular Bit Shift
- x Known plaintext - XOR
- x Code - Pseudo Random Number Generator
- x Encoding - Codebook
- x File - Insecure storage 1
- x Polyalphabetic substitution - Vigenère
- x System - Android lock pattern
- x Transposition - Rail Fence
- x AES - CBC - Bit-Flipping Attack
- x AES - ECB
- x AES - ECB - Copy Paste
- x LFSR - Known plaintext
- x RSA - Factorisation
- x RSA - Decipher Oracle
- x Service - Timing attack
- x Monoalphabetic substitution - Polybe
- x Twisted secret
- x Initialisation Vector
- x Hill Cipher
- x GEDEFU
- x OTP - Implementation error
- x RSA - Corrupted key 1
- x RSA - Continued fractions
- x RSA - Common modulus
- x Service - Hash length extension attack
- x Shamir Secret Sharing - Introduction
- x AES - 4 Rounds
- x ECDSA - Introduction
- x RSA - Padding
- x RSA - Signature
- x Shamir Secret Sharing - Traitor
- x AES128 - CTR
- x PHP - mt_rand
- x Discrete logarithm problem
- x RSA - Corrupted key 2
- x RSA - Corrupted key 3
- x RSA - Multiple recipients
- x AES - Fault attack #1
- x FEAL - Differential Cryptanalysis
- x Enigma Machine
- x Side Channel - AES : CPA
- x ECDHE
- x RSA - H-rabin