Introduction #

pwn also sometimes called binary exploitation involves finding bugs and exploiting executables. Normally these are Linux executables (ELF files), but can also be for a variety of systems (windows, arm, macos, etc).

At some point in your CTF journey you should install and read some tutorials/docs for the following tools:

  • python3
  • pwntools
  • pwndbg or gef
  • checksec
  • pwninit
  • docker