# Pwnable.kr-CTF-Writeups **Repository Path**: pwn2security/Pwnable.kr-CTF-Writeups ## Basic Information - **Project Name**: Pwnable.kr-CTF-Writeups - **Description**: No description available - **Primary Language**: Unknown - **License**: MIT - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2021-02-06 - **Last Updated**: 2021-02-06 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # Pwnable.kr CTF Writeups Alternative possible / suggested writeups: https://www.youtube.com/playlist?list=PLK06XT3hFPziMAZj8QuoqC8iVaEbrlZWh https://research.checkpoint.com/wp-content/uploads/2020/03/pwnable_writeup.pdf Video WriteUps in Hebrew - https://www.youtube.com/watch?v=6QUeFn9AYtk&list=PL0bQ-dMhp1ybJRRu3UhcslUK3bQ_7hv3e ------------------------------------------------------------------------------------------ ***"pwn"\*** - means to compromise or control, specifically another computer (server or PC), web site, gateway device, or application. It is synonymous with one of the definitions of hacking or cracking, including iOS jailbreaking. - Wikipedia. 'pwnable.kr' is a non-commercial *[wargame site](https://en.wikipedia.org/wiki/Wargame_(hacking))* which provides various pwn challenges regarding system exploitation. the main purpose of pwnable.kr is *'fun'*. please consider each of the challenges as a game. while playing pwnable.kr, you could learn/improve system hacking skills but that shouldn't be your only purpose. there are *flag* files corresponding to each challenges (similar to [CTF](https://ctftime.org/ctf-wtf/)), you need to read it and submit to pwnable.kr to get the corresponding point. in order to read the flag file, you need some skills regarding programming, reverse-engineering, bug exploitation, system knowledge, cryptography. each challenges have author's *intended solution*, however, there are a lot of unintended solutions as well :) the challenges are divided into four categories. [Toddler's Bottle] - very easy challenges with simple mistakes. [Rookiss] - typical bug exploitation challenges for rookies. [Grotesque] - these challenges are grotesque-y. painful to solve it, but very tasty flag :) [Hacker's Secret] - intended solution for these challenges involves special techniques.