There are a lot of high quality articles about pwn, but I want to share my experience and thus find my mistakes and complete my knowledge. Enjoy.
🔧 work in progress
pwn
?#
Refering to the ‘binary exploitation’ category, pwn
is about exploiting weaknesses in low-level and bad code issues. For exemple corrupting the memory if a program does not sanitise the user input.
I did a walkthrough of a pwn lab a few years ago, I found it cool and wanted to share my experience in this post.