Searching protocol for "ctf-pwn"
Master CTF memory corruption to read flags.
Plan and execute CTF exploit strategies.