Return to Pwn
Welcome, my fellow reader, to my humble binary exploitation (pwn) journey!
Although I've been studying pwn for months, I still consider myself a newbie, so forgive me for any mistakes I might make along the way.
I'm deeply fascinated by low-level exploitation, which is essentially what binary exploitation is all about. My ultimate goal? To reach a level where I can comfortably tackle kernel exploits.
As for my study method, I'll first focus on understanding how a computer works at a low level before diving into exploitation. After all, you can never exploit something effectively without fully grasping its inner workings...especially when venturing this deep into the system.
Last updated