Buffer
Overflow Intro. ©2002, Jedidiah R. Crandall, Susan L. Gerhart, Jan G.
Hogle.
http://sfsecurity.pr.erau.edu
Patty wants into that computer!
Pretend that the part of the stack with these two things on it starts at mailbox 68. Therefore, mailboxes 68 through 77 store the 10-character last name, and mailbox 78 has the return address.
Patty the user is actually Patty the attacker, and goes by the last name SOLZHENGRAD.