pwn_docker_example
Example pwnable CTF challenge hosted with docker. We used this code to run a challenge in a server setup with docker, and then use a docker container as a CTF OS to write and run the exploit.
Related Binary Exploitation Resources:
- Developing an Intuition for Binary Exploitation
- Working with PIE binaries
- Another simple buffer overflow challenge
There is also a whole playlist using challenges from https://exploit.education. Later episodes explore some 64bit challenges and goes over various pitfalls: