Skip to main content

Pwn Training

Try solving these challenge on your own, and use this guide only when needed. If you want more challenges you can search in (pwn-hub) basic attacks

Youtube - Stack Basics
75 words·1 min
Pwn Youtube
These are beginner friendly videos to get you started into the field of Binary Exploitation.
Return to Shellcode [train 1]
2125 words·10 mins
Pwn Training
This is an initiative taken by team members of ARESx.
Format String Exploitation [train 2]
1580 words·8 mins
Pwn Training
This is the 2nd challenge in the in the series. In this training we will go through the format string exploitation technique. We are provided 2 challenges of the same vulnerability. Lets go through them one by one.
Ret-to-libc [train 3]
1556 words·8 mins
Pwn Training
In this blog we will be trying to leak a libc address and try to get a shell by calling system. Here we will look into 2 challenges with similar attacks but slight variations.
Checkpoint [train 4]
516 words·3 mins
Pwn Training
Congrats on reaching this level. This level acts as a checkpoint (name suggests). You will be combining the idea of format strings, buffer overflows, canaries from previous blogposts. Try this level on your own and check for hints when stuck.
Basic - Stack Exploitation
Training Pwn
This contains most of the basic stack based exploitation techniques and challenges, I solved.
Advanced - Heap Exploitation
Pwn Training
These are some of the hard heap challenges I encountered in various CTFs.
Expert - Browser Exploitation
Training Pwn
This is my current area of research.