Binary Exploitation I — Registration (Winter 2019)

Welcome. If you are interested in participating in the course, please take the following steps:
  1. Download source and binary of the vulnerable program.
  2. Make the vulnerable program execute the win function.
  3. Exploit the remote version of the vulnerable program running at
  4. Receive the flag from the server.
  5. Complete the form below.
  6. Additionally register in the Matching System.

Currently registered 17 / 16 seats.

Important: By now the course is fully booked. Any further registration is preliminary