-
The theory behind subnets and tips for calculations (with cheat sheet)
-
Learning about overwriting GOT entries using the picoCTF format string 3 challenge.
-
Learning about exploiting vulnerable printf functions using the picoCTF format string 2 challenge.