This book "The Authoritative Guide to CTF Competition (Pwn Chapter)" (edited by Yang Chao, reviewed by Wu Shieee Team) has been put on the shelves! ! ! Purchase on JD.com Dangdang

This book is mainly aimed at beginners of CTF Pwn and focuses on Linux binary security. The book contains 12 chapters, starting from the underlying binary level, combining source code to analyze common binary security vulnerabilities, mitigation mechanisms and vulnerability exploitation methods, and supplemented by explanations of analysis tools and environment construction, step by step, allowing readers to conduct systematic learning. This book is relatively continuous and complete in terms of content and material selection. Each knowledge point is accompanied by classic examples and spent a lot of time explaining it, aiming to restore the analysis ideas and problem-solving process to the greatest extent, and achieve the effect of learning from one example and applying it to others.
Pwn is the most attractive part of cybersecurity offense and defense. For fundamentalist offense and defense personnel, pwn is the original technical embodiment. Binary pwn has always been a hot topic and difficulty in CTF competitions. This book is positioned in the content of ctf pwn and only includes pwn, which should allow people who are obsessed with offense and defense to have a feast. ——Wu Shi, head of Tencent Cohen Laboratory
The CTF questions cover a wide range of fields, and there are CTF books on the market that cover the breadth of knowledge, but there is no content in the single field, especially in the Pwn direction. This book just fills this gap: it introduces the principles and utilization techniques of various memory corruption types in detail. The IT industry often says that "You need to browse Leetcode when doing development, and you need to fight CTF when doing security" - this is almost the "unwritten rule" to enter the industry. I believe that following this book and practicing it, your Pwn combat value will be greatly improved. ——Brother Quan, author of "Vulnerability War: The Essentials of Software Vulnerability Analysis". Talk about CTF books again
If you want to enter the cybersecurity industry and achieve a leap from school to workplace, CTF is a good way to grow. I often recommend that students who lack practical experience should take the initiative to participate in CTF competitions and improve their practical ability. This book tends to be the underlying layer of the binary system. Each knowledge point can be reproduced and analyzed by "entering yourself". The content of this book is detailed, and I believe it will definitely bring you a lot of rewards. ——Zeng Yuzhi, Director of the Loop Box Security Service
The easy-to-understand perspective of CTF is a network security competition developed by simulating the technologies, tools, methods and other means used by "hackers". What you need after having the means is experience and Hacker Feel. Experience and Hacker Feel can be cultivated through reading. You must restrain your "impatient heart" when reading this book. If you lack a "street lamp" for entry-level CTF, this book will be very suitable for you. It is recommended to read the content carefully and reproduce the process inside to taste the true taste of the book. ——Kong Taoxun (K0r4dji), founder of the Breaking Security Team, 360 cybersecurity expert
About this book | Table of Contents | Sample Chapters | Related Resources (Source Code, Errata, etc.)
Reader communication QQ group: 808542982, 217863340
Please add me to WeChat group and note "Add Group". Welcome to follow the official account:
![]() | ![]() |
The book is time-consuming and laborious, and the author has devoted a lot of effort to crack down on piracy and maintain the authentic version!
Writing ing...
About this book | Table of Contents | Sample Chapters | Related Resources (Source Code, Errata, etc.)
Writing ing...
About this book | Table of Contents | Sample Chapters | Related Resources (Source Code, Errata, etc.)
——"Instead of believing rumors, it is better to keep learning."
GitHub address: https://github.com/firmianay/CTF-All-In-One
GitBook address: https://firmianay.gitbook.io/ctf-all-in-one/
Please check SUMMARY.md
Please check CONTRIBUTING.md
Please check CHANGELOG
![]() |
CC-BY-SA-4.0