Desperado Security

Getting Started

  1. Grab a copy of IDA Pro, and set up your attack VM (Kali Linux, etc.)
  2. Use static/dynamic analysis to find the vulnerability
  3. Follow any special instructions on the challenge's page to run the binary
  4. Create shellcode and test your exploit

Challenges

Below are some really basic exploitation challenges to get you started.

For more advanced/current challenges, check the past CTF link at the top.

STAGE 100
STAGE 101
STAGE 102
STAGE 150
STAGE 200

Upcoming

  • Next Meeting:

Resources

GW TJ TR AL

Uh-oh! The sploit have started to move!

website template design by derby web design