x86 Exploitation 101: when the stack gets over its head
So, as promised, I start here a series of articles dedicated to the world of exploitation: at the end of this one, I will go deeper with the x86 Assembly series. First thing said: “what is an exploit?”. It could be described as a piece of code (or a series of commands as well) that […]