Vulnerable Code in “C” Language Introduction Welcome to module 4 of this workshop. In this module, we will experience some debugging with the vulnerable code based on Linux platform and we will be using “C” as our programming language. Prerequisites To get the most out of this module, it is recommended that you should have: • Complete previous three modules • Background in programming at least at a beginner level • Understands TCP/IP • Beginner level knowledge in information security • Passion to learn ethical hacking • Understand Debugging and Know GDB This module will not be as theoretical as we had in previous modules; however, what we will cover in our lab is the debugging on Linux and how to make good use of it for exploit development. The key of exploit development is controlling EIP, and in this module we will go to the level of overwriting EIP register with the help of GDB in debugging. Debugging on Linux with GDB We have alrea...