Binary Exploitation I — Registration (Winter 2019)

Welcome. If you are interested in participating in the course, please take the following steps:
  1. Download source and binary of the vulnerable program.
  2. Make the vulnerable program execute the win function.
  3. Exploit the remote version of the vulnerable program running at
    bxqual.sec.in.tum.de:55555
  4. Receive the flag from the server.
  5. Complete the form below.
  6. Additionally register in the Matching System.

Currently registered 17 / 16 seats.

Important: By now the course is fully booked. Any further registration is preliminary