>_
PWN.CTF
PWNABLE.KR PLATFORM
⚡ CHALLENGES
🏆 LEADERBOARD
SECUNEUS
LOGIN
REGISTER
BINARY EXPLOITATION
REVERSE ENGINEERING
CRYPTOGRAPHY
LINUX INTERNALS
HEAP EXPLOITATION
SHELLCODING
8
CHALLENGES
0
TOTAL SOLVES
1,900
MAX POINTS
0
OPERATORS
[ ACTIVE CHALLENGES ]
LINUX
FD
File Descriptor
Understand Linux file descriptors and how stdin/stdout/stderr work at the OS level.
50
PTS
[ LOCKED ]
PWNABLE
BOF
Buffer Overflow
Classic stack-based buffer overflow - overwrite a local variable to spawn a shell.
100
PTS
[ LOCKED ]
LOGIC
RANDOM
Predictable RNG
The PRNG is seeded with a fixed value - predict the output before it runs.
200
PTS
[ LOCKED ]
CRYPTO
COLLISION
Hash Collision
Exploit a flawed checksum function to produce a deliberate hash collision.
150
PTS
[ LOCKED ]
REVERSE
ASM
Assembly Shellcode
Write raw x86-64 shellcode to open, read, and print a flag file from the server.
300
PTS
[ LOCKED ]
LINUX
PASSCODE
GOT Overwrite
Exploit a format string + misused scanf to overwrite a GOT entry and bypass login.
250
PTS
[ LOCKED ]
PWNABLE
UAF
Use After Free
Exploit heap use-after-free to hijack a C++ vtable pointer and call give_shell().
350
PTS
[ LOCKED ]
HARD
ADVANCED
BRAINFUCK
Interpreter Exploit
Exploit a Brainfuck interpreter with arbitrary read/write to leak libc base and get a shell.
500
PTS
[ LOCKED ]