In this fourth part of the series, we analyze the memory corruption identified previously and manage to overwrite the program pointer!

Continue reading