“Pwn” is a term used in hacking and cybersecurity to describe the act of gaining unauthorized control over a computer or a system. This section is dedicated to the art and science of binary exploitation.

Here you will find a collection of tutorials, write-ups, and practical examples covering various topics in “pwn”, including:

  • Pwn Cheatsheet: A quick reference for binary exploitation commands, tools, and techniques.
  • Heap Vulnerability Cheatsheet: Summary of common heap exploitation techniques, conditions, and targets.
  • Poison Null Byte: Exploiting an off-by-one null byte to trigger backward consolidation and chunk overlapping.
  • Heap Exploitation: Techniques for exploiting vulnerabilities in heap memory management, such as use-after-free, double free, and heap overflows.
  • Stack Exploitation: Understanding and exploiting stack-based buffer overflows and other related vulnerabilities.
  • Kernel Exploitation: Resources and write-ups on kernel-space exploitation and environment setup.
  • File Stream Oriented Programming (FSOP): Exploiting internal FILE stream structures to gain arbitrary read/write or code execution.
  • Sandboxing: Techniques for escaping chroot jails, seccomp filters, and namespaces.
  • Format String Vulnerabilities: Learning how to leverage format string bugs to read from and write to arbitrary memory locations.

Whether you are a beginner just starting your journey into binary exploitation or an experienced security researcher, this section aims to provide valuable insights and hands-on learning opportunities.