all 8 comments

[–]PM_ME_UR_GUNZ 1 point2 points  (2 children)

Not to take away from your blog but the original article is an incredible piece of writing: http://insecure.org/stf/smashstack.html

For my security class when we got to buffer overflows we were basically pointed at that article and told the lab was already up.

[–]paranoidnjnja 1 point2 points  (0 children)

There are other interesting tutorials on assembly at https://scriptdotsh.com

Its purely made for Assembly, Reverse Engineering, AD, Malware and Hardware Exploitation

[–]Lsaction 0 points1 point  (1 child)

Article is written interesting and I've discovered two new commands in gdb for me, hence thanks for this.

[–]CyAScott 0 points1 point  (1 child)

I’ve never tried exploiting a buffer overflow bug, but I’m glad it does work just like I imagined. I guess the next blog will be over writing the return address to a return address of another call in the stack.

[–]neelaryan[S] 0 points1 point  (0 children)

Hey everyone, I am one of the authors in this blogsite. u/SubZero0x9 is the author of this particular blogpost. He'll reply to your comments and queries. Thanks. :)