Training wheels!
nc pwn.hsctf.com 3131
Note: If you're trying to use python or a similar program to run your exploit, make sure to keep stdin alive with cat, like this: (python; cat -) | nc pwn.hsctf.com <port>
Action | Rating | Author team |
---|---|---|
Read writeup |
1.0
|
solo team player |
Read writeup |
3.0
|
Delt-A |
Read writeup |
2.5
|
Red Cadets |
Read writeup |
2.5
|
jackdaw |
Read writeup |
3.0
|
Gr00t4 |
Read writeup |
3.0
|
SAS Hackers |
Read writeup |
3.0
|
x0rc3r3rs |