Exploit Development

DEF CON China 2019

Scoreboard · Submit Flags

Scores from first DEFCON China 2019 Workshop

Scores from second DEFCON China 2019 Workshop

Level I: Command Injection

ED 200: Kali Virtual Machine Chinese  15
ED 101: Essential Linux Chinese 25
ED 102. Command Injection Chinese 60
ED 103: SQL Injection Chinese 205

Level II: Binary Exploits for Linux

ED 201: Linux Buffer Overflow With Command Injection Chinese  15
ED 201: (Cloud Version)  50
ED 202: Linux Buffer Overflow Without Shellcode Chinese  50
ED 202: (Cloud Version)  50
ED 203: Linux Buffer Overflow With Listening Shell Chinese  45
ED 204: Exploiting a Format String Vulnerability Chinese  20
ED 205: Very Simple Heap Overflow Chinese  10
ED 206: Heap Overflow via Data Overwrite Chinese  10
ED 207: Linux Buffer Overflow with ROP Chinese  15

Level III: Binary Exploits for Windows

ED 300: Windows Server 2016 Virtual Machine Chinese  15
ED 301: Windows Stack Protection I: Assembly Code Chinese  15
ED 302: Windows Stack Protection II: Exploit Without ASLR Chinese  15
ED 303: Windows Stack Protection III: Limitations of ASLR Chinese  15
ED 304: Using Jasmin to Run x86 Assembly Code Chinese  10
ED 305: Simple EXE Hacking with Ollydbg
      Win 2008 for VMware
Chinese  120
ED 306: Adding Trojan Code with LordPE and Ollydbg Chinese  20
ED 307: Ghidra Chinese  15
ED 308: Exploiting "Vulnerable Server" on Windows Chinese  25
ED 309: Defeating DEP with ROP Chinese  20
ED 310: Windows Mitigations  20
ED 311: ETERNALROMANCE v. Windows Server 2016  20
ED 312: Exploiting a Windows Domain  30

Level IV: Other Systems

ED 401: ARM Stack Overflow Exploit Chinese  20
ED 402: 64-Bit Buffer Overflow Exploit Chinese  15

Refreshing scores · Recent flags

ETERNALROMANCE added 6-2-19 5:40 am
China scores archived 6-6-19
ED 202c added 7-11-19