This presentation introduces stack buffer overflows and exploitation techniques for beginners. It discusses how buffer overflows work, potential impacts of exploitation including gaining system access and installing backdoors. It then demonstrates a sample vulnerable code, its disassembly, and how an attacker could exploit it by overwriting the return address on the stack to redirect execution to shellcode that starts a calculator program. The presentation concludes by reviewing protections like ASLR and DEP and a real-world exploit.