This project consists of multiple levels, each representing a unique challenge. The goal is to exploit vulnerabilities in each level to gain access to the next one.
Each level in the project has the following structure:
flag
: A file containing the password for the next level.Ressources/
: A directory containing all resources needed to solve the challenge.README.md
: A file explaining how to solve the challenge for the current level.source
: A human readable source code version of the binary for the current level.
Here is a list of the topics covered by each level:
- Level 00 - REVERSE 1 - PLAIN PASSWORD
- Level 01 - BUFFER OVERFLOW 1 - SHELLCODE
- Level 02 - FORMAT STRING 1 - READ MEMORY
- Level 03 - REVERSE 2 - ENCRYPTED PASSWORD
- Level 04 - BUFFER OVERFLOW 2 - SYSCALL BAN
- Level 05 - FORMAT STRING 2 - PLT OVERRIDE
- Level 06 - REVERSE 3 - ENCRYPTED STRING
- Level 07 - INT OVERFLOW - NO BOUNDARIES
- Level 08 - REVERSE 4 - RELATIVE PATH
- Level 09 - BUFFER OVERFLOW 3 - EXTRA BYTE