Binary Exploitation I — Registration (Winter 2019)
Welcome. If you are interested in participating in the course, please take the
- Download source and binary of the vulnerable program.
- Make the vulnerable program execute the win function.
- Exploit the remote version of the vulnerable program running at
- Receive the flag from the server.
- Complete the form below.
- Additionally register in the Matching System.
Currently registered 17 / 16 seats.
Important: By now the course is fully booked. Any further registration is preliminary