Step-by-step stack-based exploitation techniques. This information aims at helping both beginners and experienced users better understand the underlaying concepts of some of the most common exploitation techniques. It is also useful to get hands-on with PWN/Binary Exploitation category in CTFs.