pwncollege
DojosLeaderboardCommunity
Back to cse365-s2025

Module 9: Challenges

cse365-s2025
0/21 challenges completed

In this module, we're diving into the world of binary exploitation!

The challenges for the module are here: Binary Exploitation.


NEED HELP? The official way to get help is via our discord! Start the challenge that you need help with, and then use the /help command! That will get you pointed in the right direction.

QUESTIONS ON GRADING / DUE DATES? Check the grades page!

Corrupting Memory

Memory Errors: Introduction
Video
Slides
Memory Errors: High-level Problems
Video
Slides
Memory Errors: Smashing the Stack
Video
Slides
Memory Errors: Causes of Corruption 1
Video
Slides
Memory Errors: Causes of Corruption 2
Video
Slides
Memory Errors: Stack Canaries
Video
Slides
Memory Errors: ASLR
Video
Slides

Writing Shellcode

Shellcode Injection: Introduction
Video
Slides
Shellcode Injection: Common Challenges
Video
Slides
Useful Resources

Using Shellcode

Exploitation: Introduction
Video
Slides
Exploitation: Hijacking to Shellcode
Video
Slides
Further Learning
1
Your First Overflow (easy)
2
Your First Overflow (hard)
3
Precision (easy)
4
Precision (hard)
5
Variable Control (easy)
6
Variable Control (hard)
7
Control Hijack (easy)
8
Control Hijack (hard)
9
Tricky Control Hijack (easy)
10
Tricky Control Hijack (hard)
11
PIEs (easy)
12
PIEs (hard)
13
String Lengths (easy)
14
String Lengths (hard)
15
Basic Shellcode
16
NOP Sleds
17
NULL-Free Shellcode
18
Hijack to (Mapped) Shellcode (easy)
19
Hijack to (Mapped) Shellcode (hard)
20
Hijack to Shellcode (easy)
21
Hijack to Shellcode (hard)