Introduction #
pwn also sometimes called binary exploitation involves finding bugs and exploiting executables. Normally these are Linux executables (ELF files), but can also be for a variety of systems (windows, arm, macos, etc).
Recommended Tools #
At some point in your CTF journey you should install and read some tutorials/docs for the following tools:
- python3
- pwntools
- pwndbg or gef
- checksec
- pwninit
- docker