Skip to main content
Settings
Search
Appearance
Theme Mode
About
Jekyll v3.10.0
Environment Production
Last Build
2026-05-22 22:41 UTC
Current Environment Production
Build Time May 22, 22:41
Jekyll v3.10.0
Build env (JEKYLL_ENV) production
Page Location
Page Info
Layout default
Collection docs
Path _docs/wargames/overthewire/blacksun/index.md
URL /docs/wargames/blacksun/
Date 2026-04-07
Theme Skin
SVG Backgrounds
Layer Opacity
0.6
0.04
0.08

Index

By Amr

{% include beginNote.html title="2012-04-17 - blacksun is temporarily down" %} The blacksun wargame is temporarily down because we have lost the backup (shame on us). We are currently collecting the levels from third parties to bring the game back. {...

Estimated reading time: 1 minutes

Table of Contents

Source: This content is aggregated from overthewire (MIT). Visit the original repository for the latest version.

The blacksun wargame is temporarily down because we have lost the backup (shame on us). We are currently collecting the levels from third parties to bring the game back.

About

Blacksun is a PullThePlug / OverTheWire wargame that is meant to help people learn more advanced exploitation techniques against hardened hosts and environments. It is implemented by PaX patches, and the Hardened Gentoo project. It is a work in process If you have any questions you can contact andrewg via email.

Blacksun is not an exploit novice’s game / toolset, as it assumes a bunch of previous knowledge, such as programming, format string exploitation, heap exploitation, shellcoding, and out of the box thinking, amongst other things. However, PullThePlug / OverTheWire does have another wargame that’s a lot easier, but still quite challenging available here.

Also, it is not meant to discredit any of the work that has been done towards PaX (hi pipacs!), as it is quite awesome. Perhaps even it will lead to better defensive, and maybe better offensive techniques. And most likely greater understanding with the issues involved.

Aims

Blacksun is aimed towards demonstrating and helping people better understand:

  • Address space randomisation
  • Non executable memory and things that affect it
  • Stack smashing prevention
  • Information leaks
  • Code auditing and identifying code paths and vulnerable constructs
  • Being able to construct the exploitation environment
  • Binary auditing, and differencing
  • Access control list systems

Reading material

A list of suggested reading material can be found here