You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: guides/fallctf-2025/pwn.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: PWN
3
3
---
4
4
# Binary Exploitation (pwn)
5
5
6
-
> ![TIP]
6
+
> [!TIP]
7
7
> Many pwn challenges will require an x86 system in order to run the ELF program binaries. Because modern Apple silicon Macs are using ARM architecture, it is difficult to attempt the pwn challenges directly on Macs. We recommend using the [Linux EWS](https://answers.uillinois.edu/illinois.engineering/page.php?id=79993) systems provided by the university's engineering IT.
0 commit comments