Overflow exploits are not only compiled by C. Instead, they can be compiled
by almost any programming language. The examples in this article are tested
on Linux and demonstrated by overflow exploits compiled by C, Perl, Shell
and Awk. The reason for this choice is that almost all these languages are
bundled with Unix (except for C in commercial Unix systems).
In the following examples accurate location is implemented basically by placeing
SHELLCODE to environment variables.
**Hidden Content: To see this hidden content your post count must be 10 or greater.**
