Q1:Imagine that the program lets us modify the individual items in the public info array. When the program hits the ret instruction that you viewed in gdb, it would then return to an address you wrote. How would this be useful to a hacker or penetration tester?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here