The Cyber Defenders Discovery Camp 2015 is an introductory computer security workshop slash competition targeted at students at the JC and IHL levels. This i...
Exploit a tiny binary with an extremely customised memory mapping with an infoleak leading to libc disclosure and jump to magic shell address.
Abuse the stack smashing protector infoleak vulnerability to leak the flag.
Steal the password and TOTP token from an admin using cross-site scripting.
Remote code execution in a seccomp protected python service requiring manipulating python internals to retrieve the flag in memory.
Remote code execution with a code injection vulnerability in a Forth interpreter.
Analyse a given PCAP for some secret communication between Alice and Bob and determine which messages contain a valid signature.
Directory contents are hidden with a mount.