A buffer overflow exploit focuses on hijacking program execution flow by overflowing a memory buffer. Typically, malicious code called "shellcode" is loaded into memory and the CPU's program counter register is manipulated to point to the shellcode, resulting in a command shell being spawned. The command shell can then be further used to control and modify the victim system, and even gain root access. By escalating privileges in the command shell to root access, complete control of the victim system is achieved.
In this section, we will going through the Buffer Overflow Megaprimer course, offered by The Security Tube. I will be presenting my course notes, as well as my attempts of implenting the course material on my own personal computer.