
Exploiting Buffer Overflow Using Return to Libc
Introduction Recently while solving a challenge on Vulnhub.com, I came across a machine called “Jigsaw: 1” At the stage of privilege escalation, a buffer overflow challenge was presented. While researching [more]