Introduction
The previous chapter focused on writing exploits, particularly format string attacks and
race conditions. In this chapter, we will focus on exploiting overflow-related vulnerabili-
ties, including stack overflows, heap corruption, and integer bugs.
Buffer overflows and similar software bugs that ha