moving single byte from,
91,
96
and negative/non-negative EAX numbers,
100
pop and push instructions for,
105
use when making system calls,
88
EBP (extended base pointer),
17,
84
effective user ID (euid),
15
EIP (extended instruction pointer),
17,
84,
92
ELF (Executable and Linking Format) binary,
89
encryption-breaking algorithm,
176
ESP (extended stack pointer),
17,
84
Ethernet, and data-link layer,
145
euid (effective user ID),
15
Executable and Linking Format (ELF) binary,
89
execution of arbitrary code,
15
exploitation of programs,
11-15
exploit techniques,
14-15
without exploit code,
27-31
extended Euclidean algorithm,
181-84