Buffer Overflow Exploitation: A Real World Example

Hello readers again! Since I am still getting deeper into penetration tests in AppSec, it helps quite a lot to write about things to get new ideas and thoughts – so I decided to write a little tutorial on how a buffer overflow basically works using a real world...
Hello World

Hello World

Welcome to my blog about IT-Security, Vulnerability Researching, Reverse Engineering, Linux, and creativity in general :-). This blog will contain everything the Security-heart loves – enjoy your reading! This site is officially still under construction since I...