Praetorian503 Posted December 25, 2012 Report Posted December 25, 2012 We will show here how we get into a system taking advantage of a buffer overflow vulnerability. When we finally get into the system we will setup a permanent connection to this computer. Source: YouTube Quote