Pentest CTF Binary
Purpose
Analyze binary files to understand their behavior, identify memory corruption vulnerabilities, and develop exploits (ROP, Heap, Format String).
Core Workflow
- Static Analysis: Inspect binary properties, protections (NX, PIE), and code structure using
checksecandghidra. - Dynamic Analysis: Run the binary under a debugger (
gdb) to observe behavior and register states. - Vulnerability Identification: Locate crashes, buffer overflows, or format string bugs.
- Exploit Development: Construct payloads (shellcode, ROP chains) using
pwntools. - Remote Exploitation: Launch the exploit against the target server to retrieve the flag.
References
references/tools.mdreferences/workflows.md