Before heading into the different types of stack exploitation, let’s first understand what is the stack
Here is a list that explains each attack that can be performed on the stack:
stack