This document contains the notes from a session exploring different Protostar format string vulnerability exercises. It summarizes the steps taken to exploit each level by overwriting memory addresses or the GOT table to modify program behavior. For level 3, it took trying multiple payloads before discovering you need to target each byte of the memory address separately due to it being multibyte.