<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.proggen.org/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://www.proggen.org/feed.php">
        <title>proggen.org security:memory-corruption</title>
        <description></description>
        <link>https://www.proggen.org/</link>
        <image rdf:resource="https://www.proggen.org/lib/tpl/proggenX/images/favicon.ico" />
       <dc:date>2026-04-17T19:21:11+0200</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://www.proggen.org/doku.php?id=security:memory-corruption:start&amp;rev=1663869538"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://www.proggen.org/lib/tpl/proggenX/images/favicon.ico">
        <title>proggen.org</title>
        <link>https://www.proggen.org/</link>
        <url>https://www.proggen.org/lib/tpl/proggenX/images/favicon.ico</url>
    </image>
    <item rdf:about="https://www.proggen.org/doku.php?id=security:memory-corruption:start&amp;rev=1663869538">
        <dc:format>text/html</dc:format>
        <dc:date>2022-09-22T19:58:58+0200</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Memory Corruption Tutorial</title>
        <link>https://www.proggen.org/doku.php?id=security:memory-corruption:start&amp;rev=1663869538</link>
        <description>Memory Corruption Tutorial

Preface

	*  About this tutorial
	*  About the author

Background Knowledge

	*  Memory types
	*  Program execution details

Exploitation Techniques

	*  Basic concepts of buffer overflows
	*  NOP sled
	*  Environment variable and command line argument buffers
	*  Return-oriented programming (ROP)

Protection Mechanisms

	*  Dangerous standard library functions and safer alternatives
	*  ASCII-armored addresses
	*  Stack protection
	*  Address Space Layout Randomizati…</description>
    </item>
</rdf:RDF>
