Stage 13 Question: KimJongUnd We lost many time on this exploitation challenge for many reasons. The vulnerability is when you input the command line after the password, there is a buffer overflow and you can control EIP. Our buffer is on the stack so we spend some time finding a […]