Exploiting a GOT overwrite | Cybersecurity Notes