%PDF-1.3 % 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R /OpenAction 8 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 9 0 R /F2 10 0 R /F3 19 0 R >> >> /MediaBox [0.000 0.000 595.280 841.890] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF Converter) /CreationDate (2017-11-10) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 11 0 R 13 0 R 15 0 R 17 0 R 20 0 R 22 0 R 24 0 R 26 0 R 28 0 R 30 0 R 32 0 R 34 0 R 36 0 R 38 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Filter /FlateDecode /Length 2335 >> stream xYr8}W-IUL=[xoLRgRS}(HBLZ= ^Dd^$Et>} q] ?Ż;ؿ:A91;.[0S=+^9S%{w,?hEn݉|kV*ӃU;7Ǿ^? ~\ʘ͛vX7(\!2 /0%/u0ekƓ ܽ`LjD __s |Bj-*bq}h^p :E' sC踊[ו4 H?r %o9I7+g9e<ia(sxgu~܄g(I<|w`x;oI4R]6V+ Ajx6M쒹7{ xFaxF \XkV?^+@D*^t ) y섞@O icsڒZi-gX-%k>',ƮRܷYqv/ `(ĝs(ԆԪRbA9dy!=^-#HbbDXϊknU 䦮ɵuᓨ d֖5ȁU&92Cz^kRG. Jae!MO,\X6,#pvQ4Nr+`P<']`ENڷmf+| [X dQ5e,NV2'L1>J \[ %Bk2@^nfGu4RזQUS B|\]QR&kL2,E]溢&w5gF"3۱:Zm.'j3$1*ޘwӆpt]f(՜k-5 AU[ f"(]G sͬa3a LRCB<>(ފ>{mt[V5 7,sAct>g~ߛfYe3/m)STvfRlvSW(687KˉYr %5n;bJTF0fs؟!t]P2Cӳ4$&OԊz~1+K/k(Di98l;^0,9PѼmm,o^g#~T{SI+YDi"tp ^r,xq8-!v.[7gijoHax㈞&N^aA/!8u$8nͪ.(P }}K`=olM*6\OlkﳎڶCY⠹Wo3<ބ ZGy2^b]9%Gz E'u{ EI =6*< _'Q{Phh:we8Qc{!6}e~ux ځ1 κsay]1kkG' e9hxV$ck>n &c\t6J.Wlp{'4___b'ڍ=#o.J} uN?Z_\uH:~w'T >.حחwoW ?jQ0" .1;KVk~hd0Oq>OXׯ{qNmi}ʭ`F #©TEDQ~θf]gv]ҽmqZhž'u lalkwj>2% endstream endobj 8 0 obj [6 0 R /Fit] endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Times-Roman /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Times-Italic /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Annot /Subtype /Link /A 12 0 R /Border [0 0 0] /H /I /Rect [ 144.3320 820.4980 283.6520 833.8900 ] >> endobj 12 0 obj << /Type /Action /S /URI /URI (http://www.techmantras.com) >> endobj 13 0 obj << /Type /Annot /Subtype /Link /A 14 0 R /Border [0 0 0] /H /I /Rect [ 8.0000 804.4276 37.3280 817.8196 ] >> endobj 14 0 obj << /Type /Action /S /URI /URI (/) >> endobj 15 0 obj << /Type /Annot /Subtype /Link /A 16 0 R /Border [0 0 0] /H /I /Rect [ 50.0960 804.4276 90.0920 817.8196 ] >> endobj 16 0 obj << /Type /Action /S /URI /URI (/security) >> endobj 17 0 obj << /Type /Annot /Subtype /Link /A 18 0 R /Border [0 0 0] /H /I /Rect [ 102.8600 804.4276 180.5120 817.8196 ] >> endobj 18 0 obj << /Type /Action /S /URI /URI (/category/2/32) >> endobj 19 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Times-Bold /Encoding /WinAnsiEncoding >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 121.3160 328.1444 168.3080 341.5364 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (http://www.madirish.net/?article=215) >> endobj 22 0 obj << /Type /Annot /Subtype /Link /A 23 0 R /Border [0 0 0] /H /I /Rect [ 99.3320 295.5812 176.9840 308.9732 ] >> endobj 23 0 obj << /Type /Action /S /URI /URI (http://technorati.com/tag/Ethical+Hacking) >> endobj 24 0 obj << /Type /Annot /Subtype /Link /A 25 0 R /Border [0 0 0] /H /I /Rect [ 179.9840 295.5812 315.9800 308.9732 ] >> endobj 25 0 obj << /Type /Action /S /URI /URI (http://technorati.com/tag/exploit+development+tutorial) >> endobj 26 0 obj << /Type /Annot /Subtype /Link /A 27 0 R /Border [0 0 0] /H /I /Rect [ 318.9800 295.5812 427.6520 308.9732 ] >> endobj 27 0 obj << /Type /Action /S /URI /URI (http://technorati.com/tag/exploit+writing+tutorial) >> endobj 28 0 obj << /Type /Annot /Subtype /Link /A 29 0 R /Border [0 0 0] /H /I /Rect [ 430.6520 295.5812 552.2840 308.9732 ] >> endobj 29 0 obj << /Type /Action /S /URI /URI (http://technorati.com/tag/how+to+write+a+buffer+ove) >> endobj 30 0 obj << /Type /Annot /Subtype /Link /A 31 0 R /Border [0 0 0] /H /I /Rect [ 8.0000 279.5108 203.9720 292.9028 ] >> endobj 31 0 obj << /Type /Action /S /URI /URI (http://technorati.com/tag/windows+buffer+overflow+exploit+tutorial) >> endobj 32 0 obj << /Type /Annot /Subtype /Link /A 33 0 R /Border [0 0 0] /H /I /Rect [ 55.5000 251.4404 133.1520 264.8324 ] >> endobj 33 0 obj << /Type /Action /S /URI /URI (/security/ethical-hacking) >> endobj 34 0 obj << /Type /Annot /Subtype /Link /A 35 0 R /Border [0 0 0] /H /I /Rect [ 233.2180 207.2996 365.5300 220.6916 ] >> endobj 35 0 obj << /Type /Action /S /URI /URI (http://creativecommons.org/licenses/by-sa/3.0/) >> endobj 36 0 obj << /Type /Annot /Subtype /Link /A 37 0 R /Border [0 0 0] /H /I /Rect [ 370.9300 207.2996 482.9020 220.6916 ] >> endobj 37 0 obj << /Type /Action /S /URI /URI (http://www.techmantras.com/content/disclaimer) >> endobj 38 0 obj << /Type /Annot /Subtype /Link /A 39 0 R /Border [0 0 0] /H /I /Rect [ 78.6560 176.6964 549.9200 190.0884 ] >> endobj 39 0 obj << /Type /Action /S /URI /URI (http://www.techmantras.com/content/writing-windows-buffer-overflows-exploit-step-step-tutorial) >> endobj xref 0 40 0000000000 65535 f 0000000015 00000 n 0000000098 00000 n 0000000144 00000 n 0000000320 00000 n 0000000349 00000 n 0000000425 00000 n 0000000598 00000 n 0000003007 00000 n 0000003036 00000 n 0000003145 00000 n 0000003256 00000 n 0000003384 00000 n 0000003462 00000 n 0000003587 00000 n 0000003640 00000 n 0000003766 00000 n 0000003827 00000 n 0000003955 00000 n 0000004021 00000 n 0000004130 00000 n 0000004258 00000 n 0000004346 00000 n 0000004473 00000 n 0000004566 00000 n 0000004694 00000 n 0000004800 00000 n 0000004928 00000 n 0000005030 00000 n 0000005158 00000 n 0000005261 00000 n 0000005387 00000 n 0000005505 00000 n 0000005632 00000 n 0000005709 00000 n 0000005837 00000 n 0000005935 00000 n 0000006063 00000 n 0000006160 00000 n 0000006287 00000 n trailer << /Size 40 /Root 1 0 R /Info 5 0 R >> startxref 6433 %%EOF