This document discusses various OS-based attacks and password attacks that can be used by attackers once they have exploited vulnerabilities in operating systems or application software. It describes buffer overflows, stack smashing attacks, dangling and wild pointers, and different types of password attacks like guessing, dictionary attacks, and brute-force attacks. The document is divided into multiple pages and provides details on how these attacks work, including diagrams of call stacks and processes in memory.