A brief walkthrough of the buffer overflow attack known as Attack Lab or Buffer Bomb in Computer Systems course.
There are 5 phases of the lab and your mission is to come up with a exploit strings that will enable you take control of the executable file and do as you wish.
The first 3 phases include injecting small code while the last 2 utilize the ROP (Return Oriented Programming) exploit.