Introduction Hi there, here is my first article on binary exploitation. We had a responsibility as cyb0ts to research and write an article.
This challenge, as its name bof, focuses on exploiting buffer overflow by overwriting a variable then gaining a shell. …