Stack Exploitation

Before heading into the different types of stack exploitation, let’s first understand what is the stack

Here is a list that explains each attack that can be performed on the stack:

Buffer Overflow