Binary Exploitation: Buffer Overflows

Prost! Well, that’s way too many characters you’re putting in there.

Hi there! Welcome back to the binary exploitation series! In the coming posts, we are going to explore concepts and tricks used in binary exploitation.

What is memory corruption?

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Vickie Li

Vickie Li

Professional investigator of nerdy stuff. Hacks and secures. Creates god awful infographics. https://twitter.com/vickieli7