Exploiting a format string vulnerability in a given binary, by analyzing stack layout and gaining arbitrary code execution, by careful leveraging of %n formats. These writes enable a ret2libc attack, where the Global Offset Table (GOT) entry for puts is redirected to system, ultimately allowing the execution of a shell command.