Binary Exploitation Write-ups for cs6447 System and Software Security Assessment Wargame 1-2: Basic buffer-overflow, shellcode, ret2libc, canary, format string, nx, etc. write-up 1 write-up 2 Wargame 3: Rop chain, nx, canary write-up 3 Wargame 4: Heap exploitation write-up 4