Exploiting a simple binary!
Catering my interest in offensive security and reverse engineering, I stumbled upon an excellent video by security YouTuber LiveOverflow. I decided to try my hand at exploiting the binary he covers in this video (the licence_2 program), without following his guidance in order to build my understanding of reverse engineering and actually getting to solve a problem myself. We’re only going to be looking at the executable here, so all the other files can be ignored.