🧩Binary Exploitation

Binary exploitation typically refers to a category in cyber security competitions where challengers are provided with a binary, usually an ELF (Linux executable), that contains a code vulnerability. The challengers must exploit that vulnerability to gain a shell or read a flag.txt file from a remote server hosting this vulnerable exploitable binary.

BUT! the concepts I'll be writing about aren't specific to these challenges. In fact, what’s great about these challenges is that they provide exercises to practice real-life problems.

Every vulnerability you'll read about in the following pages is real and has had a significant impact on the cybersecurity world, both historically and in the present and very likely in the future as well.

Last updated

Was this helpful?