CTFs typically challenge participants in various categories, such as web applications, forensics, cryptography, and my personal favourite; binary exploitation, or pwnables.
Binary exploitation can be rewarding, but how do you get from a blackbox to the flag? In this presentation, I’ll talk about my approach to tackling these pwnables using tools and techniques to analyze the binary, find the vulnerability, and develop a working exploit.