I hereby claim:
- I am snazzysanoj on github.
- I am sanoj (https://keybase.io/sanoj) on keybase.
- I have a public key whose fingerprint is F1F5 9EDD 2797 7177 B937 1688 1653 EC54 AD1F 0150
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
<div id="render"></div> | |
<div id="cont"> | |
<h1>secure.snazzysanoj.in</h1> | |
<br> | |
<a href="https://snazzysanoj.in/" class="btn btn-danger" target="_blank">Return to Homepage</a> | |
<br> | |
</div> |
I hereby claim:
To claim this, I am signing this object:
This tutorial is based on the Computerphile video, made by Dr. Mike Pound
https://www.youtube.com/watch?v=1S0aBV-Waeo
The tutorial will show you how to trigger and exploit a buffer overflow attack against a custom C program, using Kali Linux 32-bit PAE 2016.1.
Torrent Link: https://images.offensive-security.com/virtual-images/Kali-Linux-2016.1-vbox-i686.torrent