(The exercises in Chapter 3 of the book "Understanding Computer Systems" can help understand the representation of the internal warehouse of the computer by attacking the buffer vulnerability.
"Deep Understanding of Computer Science" Buffer Vulnerability.pdf)