Vulnerable Code in “C” Language     Introduction        Welcome to module 4 of this workshop. In this module, we will experience some debugging with the vulnerable code based on Linux platform and we will be using “C” as our programming language.   Prerequisites   To get the most out of this module, it is recommended that you should have:   • Complete previous three modules  • Background in programming at least at a beginner level  • Understands TCP/IP  • Beginner level knowledge in information security  • Passion to learn ethical hacking  • Understand Debugging and Know GDB   This module will not be as theoretical as we had in previous modules; however, what we will cover in our lab is the debugging on Linux and how to make good use of it for exploit development. The key of exploit development is controlling EIP, and in this module we will go to the level of overwriting EIP register with the help of GDB in debugging.     Debugging on Linux with GDB    We have alrea...