The PicoCTF 'Function Overwrite' CTF Writeup demonstrates how to exploit an arbitrary memory write vulnerability in a binary program.By overwriting the check() pointer with the address of the easy_checker() function, the program's security check can be bypassed.The write is achieved by underflowing the fun variable, which allows arbitrary memory write beyond the buffer boundaries.The writeup provides both a manual calculation method and a brute-force method to determine the necessary offsets for the exploit.