Skip to main content


This level is another reverse engineering level, this time bundled with some elementary binary packing to make things more fun.

This level follows on from level08 in that you can sometimes turn things completely in your favour, like turning an otherwise annoying function call into a no-op :)

Vulnerability Type Stack
Position Independent Executable No
Read only relocations No
Non-Executable stack Yes
Non-Executable heap Yes
Address Space Layout Randomisation Yes
Source Fortification No

Source code

There is no source code available for this level