I'll try to release an interesting topical problem each class. These help you keep pace with the mastery tasks.
PCP1:
PCP2: (little tougher) findtheflag
PCP3: (HARD) Solve the February 8th "Intro Buffer Overflow" Imaginary CTF problem (Problem files with the latest glibc and patched etc can be found HERE)
PCP4: (IMPORTANT) Mastery A and B in one: Learn To See/C
PCP5: A classic crackme crackme
PCP6: Write a crackme for your fellow students and solve one student crackme.
PCP7: Flag Checker
PCP8: Solve the first of the 0-hero problems at https://sec.prof.ninja/challenge/, you'll just say "got it" in the discord, maybe your pwntools script.
PCP9: LIVE ONE! hackme running at nc 207.154.239.148 1337
(patched version with libraries: Hackme.zip)
PCP10: LIVE ONE! decaf64 in args.zip running at nc 207.154.239.148 1338
PCP11: LIVE ONE! decaf also in args.zip running at nc 207.154.239.148 1339
PCP12: Solve ROPEmporium callme32 you can say "got it" with spoilered script or some other proof.
PCP13: LIVE ONE! pltme running at nc 207.154.239.148 1340
PCP14: Help day: Pick any PCP problem, or pwn problem from the class, that was the hardest for you when you first attempted it (it might be easier for you now). Make a "write-up" that is designed to help someone else facing that same problem. Share the write-up, make the world a little more beautiful.
PCP15: LIVE ONE! pltmeHARDCORE running at nc 207.154.239.148 1341
PCP16: LIVE ONE! fmtstr.zip running at nc 207.154.239.148 1342
PCP17: LIVE ONE! got.zip running at nc 207.154.239.148 1343
PCP18: formatz is the binary for this writeup: https://ctftime.org/writeup/26750 use the write-up to actually exploit this and the libc is libc.so.6
PCP19: LIVE ONE! srop from Rooters 2019 is the binary for this writeup: write-up here nc 207.154.239.148 1345
PCP20: RESET/SIMPLE ONE! Run either of the two scripts from class using gdb
with pwndbg
and after a malloc vis
the heap, take a screenshot and share.
PCP21: RESET #2 Use the playground code from class and generate a leak using Use-After-Free. Use pwndbg to identify what you leaked. Extra points if it is a glibc leak.
PCP22: LIVE ONE! tcache.zip is running at nc 207.154.239.148 1344
PCP23: LIVE ONE! www (same source different glibc) is running at nc 207.154.239.148 1346
but compiled to Ubuntu GLIBC 2.35-0ubuntu3.1
PCP24: LIVE ONE KINDA! I'm going to do the one running at nc 207.154.239.148 1344
WITHOUT the win function
PCP25: LIVE ONE! lvl2.zip is running at nc 207.154.239.148 1347
PCP26: LIVE ONE! fbd.zip is running at nc 207.154.239.148 1348
PCP27: LIVE ONE! proj2.zip LEVEL 1 is running at nc 207.154.239.148 1369
PCP28: LIVE ONE! proj2.zip LEVEL 2 is running at nc 207.154.239.148 1370
PCP29: LIVE ONE! proj2.zip LEVEL 3 is running at nc 207.154.239.148 1371
(TRANSCEND) PCP30: LIVE ONE! cuttingedge.zip LEVEL 4 is running at nc 207.154.239.148 1773
(2.35 doublefree)
(TRANSCEND) PCP31: LIVE ONE! cuttingedge.zip LEVEL 5 is running at nc 207.154.239.148 1774
(2.35 no double free poison-null-byte)