Introduction #
pwn
also sometimes called binary exploitation
involves finding bugs and exploiting executables. Normally these are Linux executables (ELF files), but can also be for a variety of systems (windows, arm, macos, etc).
Recommended Tools #
At some point in your CTF journey you should install and read some tutorials/docs for the following tools:
- python3
- pwntools
- pwndbg or gef
- checksec
- pwninit
- docker