Assembly Code and Jarvis Message Here's the connection.... The assembly code is, as mentioned elsewhere, a basic stack frame initialization in 8086 Intel code. See it as a scratchpad that is created at the start of every function where the function can store it's data and keep results. * attempting reinit 080483be: 80483be: 8d 4c 24 04 lea 0x4(%esp), %ecx 80483c2: 83 e4 f0 and $0xfffffff0,%esp 80483c5: ff 71 fc pushl 0xfffffffc(%ecx) 80483c8: 55 push %ebp However, this particular code was taken from https://www.owasp.org/index.php/Buffer_overflow_attack (credits to https://plus.google.com/u/0/+LeonZhao for finding it). A stack overflow attack comes down to a user trying to manipulate the stack in such a way that they can get control over the flow of the program. This is done by writing more data on the stack than there is space for, which could corrupt the stack, stackpointer, instruction pointer, registers... This can be used to inject code into an existing pr...