Buffer
Overflow Intro. ©2002, Jedidiah R. Crandall, Susan L. Gerhart, Jan G.
Hogle.
http://sfsecurity.pr.erau.edu
Patty wants into that computer!
Pretend
that the part of the stack with these two things on it starts at mailbox 68. Therefore, mailboxes 68
through 77 store the 10-character last name, and mailbox 78 has the return address.
Patty the user is
actually Patty the attacker, and goes by the last name SOLZHENGRAD.