PWN Challenge
It's just like pwnable.tw for hackers to test and expand their binary exploiting skills.
This website is open source, source code: https://github.com/Ex-Origin/pwn
HOW-TO
- Try to find out the vulnerabilities exists in the challenges, exploit the remote services to get flags.
- The flag is usually at
./flag
for Linux, and.\flag.txt
for Windows, but sometimes you have to get a shell to read them. - Most of challenges are running on
Ubuntu 16.04/18.04/19.04
docker image. - You can share write-up or exploit code in your profile, only players who also solved the same challenge are able to see them.
- Windows service program:
http://file.eonew.cn/pwn_challenge/tools/AppJailLauncher.exe
RULES
- Do not DOS the infrastructures.
- Do not share the FLAGs.
- Do not share entire solution code in public.
- If you found any unintended bugs, please report to us, thanks.
Contact
- Admin-Email: 2462148389@qq.com
- QQ group: 570295461
- Main website: www.xmcve.com