PWN Challenge

It's just like pwnable.tw for hackers to test and expand their binary exploiting skills.

This website is open source, source code: https://github.com/Ex-Origin/pwn

亲爱的用户您好:

我们经过慎重考虑,决定自2024年1月1日起正式关闭本网站。

在过去的日子里,本网站曾为您提供乐趣和挑战。我们非常感谢您一直以来的支持与陪伴。然而,随着时间的推移,本网站的意义已不如从前。为了寻求新的可能,我们决定关闭本站,让一段历史就此落幕。

在网站闭站前,我们会推出全新的CTF平台,以全新理念服务于您。我们将更加注重基础知识的训练和积累,为您打牢扎实的基础。在网站关闭后,我们也会继续通过新平台为您提供服务。

再次感谢您这些年来的支持!网站闭站是一种遗憾,但也是为了拥抱崭新的可能。让我们携手继续前行,在新的征程中创造更多美好回忆。期待与您再次相遇!

Dear users,

We are writing to inform you that our website will officially close on January 1st, 2024 after careful consideration.

Over the years, our website has provided you with fun and challenges. We are deeply grateful for your continuous support and companionship throughout this journey. However, as time goes by, the significance of this website is not what it used to be. To seek new possibilities, we have decided to shut down the site and bring this chapter to an end.

Before the website closure, we will launch a brand new CTF platform with new concepts to serve you. We will place greater emphasis on training and accumulating fundamental knowledge to build a solid foundation for you. After the shutdown, we will continue to provide services through the new platform.

Once again, thank you for your support over the years! The closure is regrettable but necessary for embracing new possibilities. Let us move forward hand in hand and create more beautiful memories in the new journey. We look forward to seeing you again!

HOW-TO

  • Try to find out the vulnerabilities exists in the challenges, exploit the remote services to get flags.
  • The flag is usually at ./flag for Linux, and .\flag.txt for Windows, but sometimes you have to get a shell to read them.
  • Most of challenges are running on Ubuntu 16.04/18.04/19.04 docker image.
  • You can share write-up or exploit code in your profile, only players who also solved the same challenge are able to see them.
  • Windows service program: http://file.eonew.cn/pwn_challenge/tools/AppJailLauncher.exe

RULES

  • Do not DOS the infrastructures.
  • Do not share the FLAGs.
  • Do not share entire solution code in public.
  • If you found any unintended bugs, please report to us, thanks.

Contact

  • Admin-Email: 2462148389@qq.com
  • QQ group: 570295461
  • Main website: www.xmcve.com

Welcome all friends to join XMCVE.