Intro to RE: C : part-5 [Stack Based Buffer Overflow]
Setting the Stage Today, we’re not just smashing buffers — we’re hijacking control flow with user input. Before we start our little “experiment,” let’s make sure the playground is… accommodating. (Optional) ASLR? 1 - That pesky troublemaker has to go. echo 0 | sudo tee /proc/sys/kernel/randomize_va_space Now the memory layout won’t jump around like a caffeinated squirrel. Let’s roll. 😏 The Vulnerable Program Here’s a simple CTF-style challenge: vuln.c #include <stdio....