edited September 2017 in Other

Just sharing my notes thus far in case anyone is interested -- still needs a lot of work especially in terms of composition/organisation so if anyone wanted to contribute to re-organizing the mess I'd be so happy.

Mostly based on my interpretation when you get to buffer overflows, I've only really experience with EIP and SEH based ones hands on so the rest is kind of speculation. If there are any inaccuracies please point them out to me! :)

Happy Hacking!



Sign In to comment.