Exploiting stack-based buffer overflows
Now that our basics are clear, let's move on to the exploitation of stack-based buffer overflows.