What I don't like in quite a lot of CTF pwn tasks is that you have to spend 2 hours pressing F5 in IDA before you can get to the actual exploitation.
Conversation
If you want to make the task harder — either make the exploitation part harder, or make the reverse engineering part fun and unusual. Otherwise, just include the source code along with the binary.
