I’ve been playing around with a selection of fun reversing tooling recently and thought it might be fun to go through a basic challenge to escalate privileges via a vulnerable executable. The first tool we’re going to use is gdb but we’re going to extend its capabilities significantly with pwndbg. […]