Appearance
OUTLINE
Understanding of Stack Layout Vulnerable code Challenges in exploitation Shellcode Countermeasures