This document provides an introduction to stack buffer overflows on x86 architecture. It explains what a buffer is, how an overflow occurs when too much data is stored in a buffer, and how this can be exploited to overwrite the instruction pointer and redirect program flow. It discusses CPU registers like EBP, ESP and EIP that are involved. Finally, it outlines the steps to craft an exploit, including using patterns to find the offset, msfvenom to generate shellcode, and a NOP sled and JMP ESP to redirect execution to the shellcode.