This is the beginning of the exploit development lectures. The fundamentals of processor architecture relevant to modern binary exploitation are covered. The stack is reviewed, and simple buffer overflows are explained.
Interested in having your homework graded? Contact us to learn about grading options. The release schedule for this course is available here.