openCTF 2016 - tyro_shellcode2

Points: 100 Solves: Category: Exploitation Description: Baby’s first second problem, welcome to a beautiful risc architecture called MIPS. Server: 172.31.1.44:1615 Binary: 172.31.0.10/tyro_shellcode2_53af42a29d43eff55ff3adba4cf67069

openCTF 2016 - tyro_shellcode

Points: 50 Solves: Category: Exploitation Description: Baby’s first shellcode problem. Server: 172.31.1.43:1617 Binary: 172.31.0.10/tyro_shellcode1_84536cf714f0c7cc4786bb226f3a866c

openCTF 2016 - tyro_heap

Points: 50 Solves: Category: Exploitation Description:

openCTF 2016 - neophyte_cgc

Points: 300 Solves: Category: Exploitation, CRS Description: CRS (Cyber Reasoning System) are all the rage (and going on right now) … but they only have 7 syscalls ….we’re giving you 190. Good luck. Server: 172.31.1.46:1622

openCTF 2016 - apprentice_www

Points: 300 Solves: Category: Exploitation Description:

openCTF 2016 - apprentice_cgc

Points: 300 Solves: Category: Exploitation, CRS Description: So, neophyte_cgc was pretty straightforward. This isn’t. Server: 172.31.1.47:1624

SECUINSIDE Quals 2016 - Noted

Points: 180 Solves: 19 Category: Exploitation Description: get shell and execute /flag_x

GoogleCTF - Forced Puns

Points: 125 Solves: 18 Category: Exploitation Description: Can you exploit the following binary?

Finding Function's Load Address

Death by Pointer

BCTF ruin - Exploitation 200

Points: 200 Solves: 22 Category: Exploitation Description: nc 166.111.132.49 9999