[Lab 2] Defending a vulnerable application1. Setup Shellcode Eater with our examples and then write your own too!Overview