BYU logo Computer Science
CS 465 Introduction to Security and Privacy

Homework: Vulnerability Practice

For this homework, complete the following levels from the Binary Exploitation dojo on pwn.college:

  • Your First Overflow (easy)
  • Your First Overflow (hard)
  • Precision (easy)
  • Precision (hard)
  • Variable Control (easy)

Turn in

Turn in a screenshot showing your progress.