Starting a new shell in a strcpy exploit using buffer overflow
I’m learning about buffer overflows and have this vulnerable code which I’m trying to start a shell from:
#include <string.h>
void myfunction(char *arg);
int main(int argc, char **argv)
{
myfunction(argv[1]);
return 0;
}…