Compete in security challenges exploring Spectre, AES Side Channels, Hertzbleed, Flush+Reload, Fault Injection, and Web Side Channels. Each challenge isolates a real CPU or hardware vulnerability. Download the skeleton code, implement your exploit, and submit it for automated grading. Points decay over time so speed matters.
.c file.TODO sections. Use the hint button (−50 pts each) if stuck. Compile locally to verify your code builds cleanly..c file, and wait for the server to compile and run it automatically.Flag{...} in the Submit box to claim your points.| # | User | Total Pts | Spectre Score / Time |
AES Side Channel Score / Time |
Hertzbleed Score / Time |
Flush+Reload Score / Time |
Fault Injection Score / Time |
Web Side Channel Score / Time |
|---|---|---|---|---|---|---|---|---|
| Loading… | ||||||||
Exploit speculative execution to recover secret data from another process's memory space using cache timing.
Go to Challenge →Recover AES key bytes by measuring cache timing differences during encryption rounds.
Go to Challenge →Exploit CPU frequency scaling as a power-based side channel to leak secret key material from timing measurements.
Go to Challenge →Use cache flush and reload techniques to spy on another process's memory access patterns.
Go to Challenge →Induce precise hardware faults to bypass security checks and extract values from protected memory.
Go to Challenge →Exploit timing and behavioral side channels in web applications to infer secret application state.
Go to Challenge →