Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
          reverse-engineering          buffer-overflow-attack          infosec          webshell          dirtycow          suexec          privilege-escalation-exploits          ret2libc          arbitrary-code-execution          shellcode-injection          nop-slides      
    - 
            Updated
            Feb 9, 2022 
- C