Exploiting the Vulnerable Code on Linux Introduction Welcome to module 5, the last module of this workshop. So far in this workshop, we have been learning about debugging and how to work with GDB in Linux and, most importantly, controlling the EIP register. Prrequisite It is strongly recommended that you should first complete the previous four modules of this workshop and then start completing this module. In this module, we will try to go to the level of exploitation while getting help from GDB so that we know how we can develop exploit in Linux. Controlling EIP We have already presented how to control EIP in our previous module and what role GDB can play in debugging and giving you information about registers. Now, let’s focus...