Hi. I'm learning ASM and C n perl atm to gain more computer knowladge within the art of hacking. And all i want is when finding buffer overflows within programs that have been compiled hows do you find that an exploit can be exploited, i'm not asking to be spoon fed cause i like to learn for myself. My guess is studying an application in ASM and see if it can be exploited. Thank you for your time