Root-Me
Root-Me is a non-profit organization which goal is to promote the spread of knowledge related to hacking and information security. They host over 400 challenges across 11 sub-disciplines.
Statistics
- Score: 2800
- Challenges: 152
- Ranking 2467
Contents
- Root-Me App - Script
- Root-Me App - System
- Root-Me Cracking
- Root-Me Cryptanalysis
- Root-Me Forensic
- Root-Me Network
- Root-Me Programming
- Root-Me Realist
- Root-Me Steganography
- Root-Me Web - Client
- Root-Me Web - Server
Root-Me | Home
Root-Me App - Script (6/28)
- Bash - System 1 ๐ธ
- sudo - weak configuration ๐ธ
- Bash - System 2 ๐ธ
- LaTeX - Input
- Powershell - Command Injection
- Bash - unquoted expression injection
- Perl - Command injection ๐ธ
- Powershell - SecureString
- Bash - cron ๐ธ
- LaTeX - Command execution
- Python - input() ๐ธ
- Bash - quoted expression injection
- Bash - race condition
- Powershell - Basic jail
- Python - pickle
- Shared Objects hijacking
- SSH - Agent Hijacking
- Python - format string
- Python - PyJail
- PHP - Jail
- Python - PyJail
- Python - Jail - Exec
- Javascript - Jail
- Python - Jail - Garbage collector
- Bash - Restricted shells
Root-Me | Home
Root-Me App - System (7/83)
- ELF x86 - Stack buffer overflow basic 1 ๐ธ
- ELF x86 - Stack buffer overflow basic 2 ๐ธ
- PE32 - Stack buffer overflow basic ๐ธ
- ELF x86 - Format string bug basic 1 ๐ธ
- ELF x64 - Stack buffer overflow - basic ๐ธ
- ELF x86 - Format string bug basic 2 ๐ธ
- ELF x86 - Race condition ๐ธ
- ELF ARM - Stack buffer overflow - basic
- ELF MIPS - Stack buffer overflow - No NX
- ELF x64 - Double free
- ELF x86 - Stack buffer overflow basic 3
- ELF x86 - Use After Free - basic
- ELF ARM - Stack Spraying
- ELF x64 - Stack buffer overflow - PIE
- ELF x86 - BSS buffer overflow
- ELF x86 - Stack buffer overflow basic 4
- ELF x86 - Stack buffer overflow basic 6
- ELF x86 - Format String Bug Basic 3
- PE32 - Advanced stack buffer overflow
- ELF ARM - Basic ROP
- ELF MIPS - Basic ROP
- ELF x86 - Stack buffer overflow - C++ vtables
- PE32+ Format string bug
- ELF x64 - Logic bug
- ELF x86 - Bug Hunting - Several issues
- ELF x86 - Stack buffer and integer overflow
- ELF x86 - Stack buffer overflow - ret2dl_resolve
- ELF x86 - Stack buffer overflow basic 5
- ELF x64 - Stack buffer overflow - advanced
- ELF MIPS - Format String Glitch
- ELF x64 - Heap Filling
- ELF x86 - Information leakage with Stack Smashing Protector
- ELF x64 - File Structure Hacking
- ELF ARM - Race condition
- ELF x64 - Browser exploit - Intro
- ELF x64 - Heap Safe-Linking Bypass
- ELF x64 - ret2dl_init
- ELF x86 - Out of bounds attack - French Paradox
- ELF x86 - Remote BSS buffer overflow
- ELF x86 - Remote Format String bug
- PE32+ Basic ROP
- ELF x64 - Remote heap buffer overflow - fastbin
- ELF x86 - Blind remote format string bug
- LinKern ARM - vulnerable syscall
- LinKern x86 - Buffer overflow basic 1
- LinKern x86 - Null pointer dereference
- LinKern x64 - Race condition
- ELF ARM - Alphanumeric shellcode
- ELF MIPS - URLEncoded Format String bug
- ELF x86 - Hardened binary 1
- ELF x86 - Hardened binary 2
- ELF x86 - Hardened binary 3
- ELF x86 - Hardened binary 4
- LinKern MIPSel - Vulnerable ioctl
- LinKern x64 - reentrant code
- ELF ARM - Heap format string bug
- ELF x64 - Sigreturn Oriented Programming
- ELF ARM - Format String bug
- ELF ARM - Use After Free
- ELF x64 - FILE structure hijacking
- ELF x64 - Heap feng-shui
- ELF x64 - Off-by-one bug
- ELF x86 - Hardened binary 5
- LinKern ARM - Stack Overflow
- LinKern x86 - basic ROP
- ELF ARM - Heap Off-by-One
- ELF x64 - Remote Heap buffer overflow 1
- ELF x86 - Hardened binary 6
- ELF x86 - Hardened binary 7
- ELF x86 - Remote stack buffer overflow - Hardened
- LinKern x64 - RowHammer
- LinKern x64 - SLUB off-by-one
- ELF ARM - Heap buffer overflow - Wilderness
- ELF ARM - Heap Overflow
- ELF x64 - Seccomp Whitelist
- ELF x86 - Blind ROP
- Linkern x64 - Memory exploration
- WinKern x64 - Advanced stack buffer overflow - ROP
- WinKern x64 - Use After Free
- ELF x64 - Remote Heap buffer overflow 2
- ELF x64 - Advanced Heap Exploitation - Heap Leakless & Fortified
- ELF x64 - Blind ROP
- ELF x64 - Browser exploit - BitString
Root-Me | Home
Root-Me Cracking (10/46)
- ELF x86 - 0 protection ๐ธ
- ELF x86 - Basic ๐ธ
- PE x86 - 0 protection ๐ธ
- ELF C++ - 0 protection ๐ธ
- PE DotNet - 0 protection ๐ธ
- ELF MIPS - Basic Crackme ๐ธ
- ELF x64 - Golang basic ๐ธ
- ELF x86 - Fake Instructions ๐ธ
- ELF x86 - Ptrace ๐ธ
- WASM - Introduction
- ELF ARM - Basic Crackme
- ELF x64 - Basic KeygenMe
- PE DotNet - Basic Anti-Debug
- PE DotNet - Basic Crackme
- PYC - ByteCode
- ELF x86 - No software breakpoints
- Lua - Bytecode
- MachO x64 - keygenme or not
- ELF ARM - crackme 1337
- ELF x86 - CrackPass ๐ธ
- ELF x86 - ExploitMe
- ELF x86 - Random Crackme
- GB - Basic GameBoy crackme
- PDF - Javascript
- PE x86 - Xor Madness
- ELF ARM - Crypted
- ELF x64 - Crackme automating
- PE x86 - SEHVEH
- Powershell DeObfuscation
- APK - Anti-debug
- ELF x64 - Nanomites - Introduction
- ELF x86 - Anti-debug
- PE DotNet - KeygenMe
- PE x86 - AutoPE
- ELF x86 - KeygenMe
- WASM - Find the NPC
- Bash - VM
- ELF x64 - KeyGenMe
- ELF x64 - Anti-debug and equations
- ELF x64 - Nanomites
- ELF x86 - Packed
- PE x86 - RunPE
- ELF x86 - VM
- ELF x64 - Hidden Control Flow
- Ringgit
- White-Box Cryptography #2
Root-Me | Home
Root-Me Cryptanalysis (27/60)
- Encoding - ASCII ๐ธ
- Encoding - UU ๐ธ
- Hash - DCC ๐ธ
- Hash - DCC2 ๐ธ
- Hash - LM ๐ธ
- Hash - Message Digest 5 ๐ธ
- Hash - NT ๐ธ
- Hash - SHA-2 ๐ธ
- Shift cipher ๐ธ
- CISCO - Salted Password ๐ธ
- Pixel Madness ๐ธ
- ELF64 - PID encryption ๐ธ
- File - PKZIP ๐ธ
- Monoalphabetic substitution - Caesar ๐ธ
- Known plaintext - XOR ๐ธ
- Code - Pseudo Random Number Generator ๐ธ
- File - Insecure storage 1 ๐ธ
- Polyalphabetic substitution - Vigenรจre ๐ธ
- System - Android lock pattern ๐ธ
- Transposition - Rail Fence ๐ธ
- AES - CBC - Bit-Flipping Attack
- AES - ECB ๐ธ
- LFSR - Known plaintext ๐ธ
- RSA - Factorisation ๐ธ
- RSA - Decipher Oracle
- Service - Timing attack ๐ธ
- Monoalphabetic substitution - Polybe ๐ธ
- Twisted secret
- Initialisation Vector ๐ธ
- GEDEFU
- OTP - Implementation error
- RSA - Corrupted key 1
- RSA - Continued fractions
- RSA - Common modulus ๐ธ
- Service - Hash length extension attack
- AES - 4 Rounds
- ECDSA - Introduction
- RSA - Padding
- RSA - Signature
- AES128 - CTR
- Discrete logarithm problem
- RSA - Corrupted key 2
- RSA - Corrupted key 3
- RSA - Multiple recipients
- AES - Fault attack #1
- Enigma Machine
- ECDHE
- RSA - Lee cooper
- Service - CBC Padding
- Polyalphabetic substitution - One Time Pad
- White-Box Cryptography
- AES - Weaker variant
- Hash - SHA-3
- AES - Fault attack #2
- AES-PMAC
- ECDSA - Implementation error
Root-Me | Home
Root-Me Forensic (9/28)
- Command & Control - level 2 ๐ธ
- Logs analysis - web attack ๐ธ
- Command & Control - level 5 ๐ธ
- Find the cat ๐ธ
- Ugly Duckling ๐ธ
- Active Directory - GPO ๐ธ
- Command & Control - level 3 ๐ธ
- DNS exfiltration
- Command & Control - level 4 ๐ธ
- Job interview
- Homemade keylogger
- macOS - Keychain
- Malicious Word macro
- Ransomware Android
- InsomniโDroid
- iOS - Introduction
- Multi-devices
- Root My Droid
- Rootkit - Cold case
- Command & Control - level 6 ๐ธ
- Find me
- Second job interview
- Find me again
- Find me back
- Find me on Android
- Zeus Bot
- Try again
- The Lost Case - Mobile Investigation
Root-Me | Home
Root-Me Network (18/26)
- FTP - authentication ๐ธ
- TELNET - authentication ๐ธ
- ETHERNET - frame ๐ธ
- Twitter authentication ๐ธ
- Bluetooth - Unknown file ๐ธ
- CISCO - password ๐ธ
- DNS - zone transfert ๐ธ
- IP - Time To Live ๐ธ
- LDAP - null bind ๐ธ
- POP - APOP ๐ธ
- RF - AM Transmission ๐ธ
- RF - FM Transmission ๐ธ
- SIP - authentication ๐ธ
- ETHERNET - Patched transmission ๐ธ
- Global System Traffic for Mobile communication ๐ธ
- HTTP - DNS Rebinding
- RF - Key Fixed Code ๐ธ
- SSL - HTTP exchange ๐ธ
- Netfilter - common mistakes
- SNMP - Authentification ๐ธ
- Wired Equivalent Privacy
- ICMP payload
- RIPv1 - no authentication
- XMPP - authentication
- RF - Satellite transmission
Root-Me | Home
Root-Me Programming (8/18)
- IRC - Go back to college ๐ธ
- IRC - Encoded string ๐ธ
- IRC - The Romanโs wheel ๐ธ
- IRC - Uncompress me ๐ธ
- CAPTCHA me if you can ๐ธ
- Ethereum - Tutoreum
- Arithmetic progression ๐ธ
- ELF x64 - Shellcoding - Sheep warmup
- Ethereum - Takeover
- Various encodings ๐ธ
- ARM - Shellcoding - Egg hunter
- Ethereum - NotSoPriv8
- ELF x64 - Shellcoding - Polymorphism
- Quick Response Code ๐ธ
- WinKern x64 - shellcoding : token stealing
- Ethereum - BadStack
- ELF x64 - Sandbox shellcoding
- ELF x86 - Shellcoding - Alphanumeric
Root-Me | Home
Root-Me Realist (1/44)
- It happens, sometimes ๐ธ
- P0wn3d
- The h@ckers l4b
- Neonazi inside
- Well-known
- Bash/Awk - netstat parsing
- Breaking Root-Me like itโs 2020
- PyRat Auction
- Root them
- IPBX - call me maybe
- Marabout
- Root-We
- Starbug Bounty
- Ultra Upload
- A bittersweet shellfony
- Bash - System Disaster
- Imagick
- MALab
- SSHocker
- Web TV
- SamBox v2
- SamCMS
- BBQ Factory - First Flirt
- Django unchained
- Getting root Over it!
- Texode
- BBQ Factory - Back To The Grill
- In Your Kubernetass
- DjangocatZ
- SamBox v1
- SAP Pentest 007
- Crypto Secure
- Bozobe Hospital
- Red Pills
- SamBox v3
- ARM FTP Box
- SAP Pentest 000
- Texode Back
- Bluebox 2 - Pentest
- Nodeful
- Bluebox - Pentest
- Highway to shell
- SamBox v4
Root-Me | Home
Root-Me Steganography (17/23)
- Gunnm ๐ธ
- Squared ๐ธ
- Dot and next line ๐ธ
- Steganomobile ๐ธ
- Twitter Secret Messages ๐ธ
- Some noise ๐ธ
- George and Alfred ๐ธ
- Poem from Space ๐ธ
- Yellow dots ๐ธ
- Audio stegano ๐ธ
- Mimic - Dummy sight
- We need to go deeper ๐ธ
- APNG - Just A PNG ๐ธ
- Base Jumper ๐ธ
- ELF x64 - Duality
- Hide and seek
- PDF Object ๐ธ
- Angecryption
- Kitty spy ๐ธ
- LSB - Uncle Scrooge ๐ธ ๐ธ
- Pixel Indicator Technique
- Pixel Value Differencing
- Crypt-art ๐ธ
Root-Me | Home
Root-Me Web - Client (9/33)
- HTML - disabled buttons ๐ธ
- Javascript - Authentication ๐ธ
- Javascript - Source ๐ธ
- Javascript - Authentication 2 ๐ธ
- Javascript - Obfuscation 1 ๐ธ
- Javascript - Obfuscation 2 ๐ธ
- Javascript - Native code ๐ธ
- Javascript - Webpack ๐ธ
- Javascript - Obfuscation 3 ๐ธ
- Web Socket - 0 protection
- XSS - Stored 1
- CSP Bypass - Inline code
- CSRF - 0 protection
- XSS DOM Based - Introduction
- Flash - Authentication
- XSS DOM Based - AngularJS
- XSS DOM Based - Eval
- CSP Bypass - Dangling markup
- CSP Bypass - JSONP
- CSRF - token bypass
- XSS - Reflected
- CSP Bypass - Dangling markup 2
- Javascript - Obfuscation 4
- XSS - Stored 2
- XSS DOM Based - Filters Bypass
- HTTP Response Splitting
- Javascript - Obfuscation 5
- XSS - Stored - filter bypass
- XSS - DOM Based
Root-Me | Home
Root-Me Web - Server (40/74)
- HTML - Source code ๐ธ
- HTTP - IP restriction bypass ๐ธ
- HTTP - Open redirect ๐ธ
- HTTP - User-agent ๐ธ
- Weak password ๐ธ
- PHP - Command injection ๐ธ
- Backup file ๐ธ
- HTTP - Directory indexing ๐ธ
- HTTP - Headers ๐ธ
- HTTP - POST ๐ธ
- HTTP - Improper redirect ๐ธ
- HTTP - Verb tampering ๐ธ
- Install files ๐ธ
- CRLF ๐ธ
- File upload - Double extensions ๐ธ
- File upload - MIME type ๐ธ
- HTTP - Cookies ๐ธ
- Insecure Code Management ๐ธ
- JSON Web Token (JWT) - Introduction ๐ธ
- Directory traversal ๐ธ
- File upload - Null byte ๐ธ
- JSON Web Token (JWT) - Weak secret ๐ธ
- JWT - Revoked token ๐ธ
- PHP - assert() ๐ธ
- PHP - Filters ๐ธ
- PHP - register globals ๐ธ
- PHP - Remote Xdebug
- Python - Server-side Template Injection Introduction
- File upload - ZIP
- Command injection - Filter bypass
- Java - Server-side Template Injection ๐ธ
- JSON Web Token (JWT) - Public key
- Local File Inclusion ๐ธ
- Local File Inclusion - Double encoding ๐ธ
- Node - Eval
- PHP - Loose Comparison
- PHP - preg_replace() ๐ธ
- PHP - type juggling ๐ธ
- Remote File Inclusion ๐ธ
- SQL injection - Authentication ๐ธ
- SQL injection - Authentication - GBK
- SQL injection - String ๐ธ
- XSLT - Code execution
- LDAP injection - Authentication ๐ธ
- Node - Serialize
- NodeJS - Prototype Pollution Bypass
- NoSQL injection - Authentication
- PHP - Path Truncation
- PHP - Serialization
- SQL injection - Numeric ๐ธ
- SQL Injection - Routed ๐ธ
- SQL Truncation
- XML External Entity
- XPath injection - Authentication
- Yaml - Deserialization
- GraphQL
- Java - Spring Boot
- Local File Inclusion - Wrappers
- PHP - Eval
- PHP - Unserialize overflow
- SQL injection - Error ๐ธ
- SQL injection - Insert
- SQL injection - File reading ๐ธ
- XPath injection - String
- NoSQL injection - Blind
- SQL injection - Time based ๐ธ
- NodeJS - vm escape
- Server Side Request Forgery
- SQL injection - Blind
- LDAP injection - Blind
- PHP - Unserialize Pop Chain
- Python - Blind SSTI Filters Bypass
- XPath injection - Blind
- SQL injection - Filter bypass
Root-Me | Home
This page was last updated April 22.