Introduction

What?

THM challenges and CTFs

Why?

Practice exploitation of services vulnerable to buffer overflow.

How?