challenge

Replace this with the challenge description, source code, or binary info.

recon

Initial analysis and what you noticed first.

approach

Walk through your thought process. What did you try that didn’t work? What finally did?

# exploit code here
from pwn import *

p = process('./binary')
# ...

flag

CTF{example_flag_here}

notes

Anything worth remembering for next time.