Skip to content
Quintin edited this page Jul 20, 2022 · 7 revisions

PWN

Pwning is the art of exploiting an already running system. Usually we already have the binary and if we are lucky the source code.

Videos

https://youtu.be/oS2O75H57qU

Workflow

  1. Open the binary in a static reversing tool, such as Ghidra or IDA to get baseline information. Identify the assembly type (x86, ARM, etc.), what language it is, what type of libraries are being linked, strings, etc.
  2. Run the binary inside of a VM to observe behavior. Use tools such as GDB to dynamically analyze them.
  3. Identify major functions, parts that may have weaknesses or oversights
  4. Craft and attack plan and use tools such as pwntools to automate an exploit script.
Clone this wiki locally