TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Exploit Linux Machines Through Fun Challenges

160 pointsby turnersrabout 13 years ago

7 comments

EthanHeilmanabout 13 years ago
* I haven't played with exploit-exercises yet (definitely will when I get some downtime), but I've had a blast solving the challenges at <a href="http://io.smashthestack.org:84" rel="nofollow">http://io.smashthestack.org:84</a>. They are hosted so no need to download VMs. They have a several more here that I haven't played with: <a href="http://smashthestack.org/" rel="nofollow">http://smashthestack.org/</a><p>* I recently came across a computer security course which used CTF virtual machines for an assignment (you can download the VM and see how you do against Tufts University students): <a href="http://www.cs.tufts.edu/comp/116/assignments/a04.php" rel="nofollow">http://www.cs.tufts.edu/comp/116/assignments/a04.php</a><p>* Offensive Security's "Penetration Testing with BackTrack" (PWB) course uses a series of CTF challenges as the final exam.<p>* Any recommendations on any encryption challenges in this style?<p>We are seeing a return to the old guild system of masterpieces as proof of ability and learning aid. I couldn't be happier. I'd love to see a mash up between stackoverflow's gamification and Offensive Security certification/teaching process.
评论 #3815142 未加载
评论 #3814944 未加载
jiggy2011about 13 years ago
I've never really had much luck with stuff like this.<p>Whenever I have tried to write code in the C to be deliberately vulnerable and have tried to overwrite memory etc it never seems to work in the way I expect.<p>For example I will have two arrays that are contiguous in memory (checking this with gdb) and I will then write a big set of values into one array that should overflow into the other. Then try and do something like print the values that should have been overflowed into but I often find I either get a segfault or that the values that are printed are actually the correct values assigned the the array that should be overwritten.<p>I haven't tried these specific puzzles with the VMs though. I always do -fno-stack-protector when compiling but I don't know if there is some other security mechanism that could be stopping it from working?
评论 #3815211 未加载
评论 #3815040 未加载
评论 #3815081 未加载
SoftwareMavenabout 13 years ago
This looks awesome. I've taken a large interest in security over the last couple years and am always looking for ways to increase my knowledge in this space (FWIW, the Stanford crypto course has been great so far). This will be a good follow-on to that.
chuckbotabout 13 years ago
What exactly does the getflag command do? I seems like I can do all the levels anyway, so it doesn't seem to enable the next level.
habermanabout 13 years ago
Awesome! I was always jealous of people who had problem sets like this in their CS curriculum.
评论 #3815719 未加载
spydumabout 13 years ago
I am <i>really</i> digging the uptick in CTF related posts! Keep 'em coming!
mituljainabout 13 years ago
it's down :/
评论 #3814303 未加载