8: Leak PIE (bypass) and Lib-C (ret2system) - Buffer Overflows - Intro to Binary Exploitation (Pwn)
26:56
9: Overwriting Global Offset Table (GOT) Entries with printf() - Intro to Binary Exploitation (Pwn)
28:08
Finding and Exploiting a Buffer Overflow
47:41
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims
17:30
Running a Buffer Overflow Attack - Computerphile
20:40