RET2 WarGames

Fundamentals of Software Exploitation — course notes & lab progress
Just another Friday night at ObfusLabs. We are working on the Fundamentals of Software Exploitation training by RET2 Systems. We analyze 64-bit Linux executables and build python-based exploits against them.
RET2 Systems Wargames screenshot

Progress

Latest: solved Mission 1, currently on the Stack Cookies lesson (third lesson). Captured another flag today.

About the course

RET2 Systems' Fundamentals of Software Exploitation trains students to read and reason about C/C++ programs, reverse engineer 64-bit Linux binaries, and craft python exploits to demonstrate and bypass modern mitigations.

Why I'm doing this

RET2 is excellent training for anyone doing low-level offensive work. I'm honing exploit skills by reading assembly, debugging ELF binaries, and turning memory-corruption bugs into reliable PoCs. Every lab sharpens my C internals knowledge and makes real exploit development feel doable.

Notes / links

Course: RET2 Systems — Fundamentals of Software Exploitation WarGames

Suggested prerequisites: familiarity with C & Python, ELF, GDB, and basic assembly. I'll post flags / writeups here as feasible.

← Back to Current Research