Write a short paragraph explaining what the exploit does in Assembly , and how it works. How could the programmer of vecho have prevented this from happening? Solution Exploit in assembly allows us to gain unauthorized root priviledge by using buffer overflow. It allows hackers to gain access to addresses beyond the eip register. Exploits are generally used in developing virus. The command vecho, which is similar to the echo command is vulnerable and used in exploits. The programmers of vecho should have checked for the address in the eip register and any attempt to access addresses beyond it should have thrown an error..