Learn about Reverse engineering and Binary Exploitation:
https://medium.com/swlh/intro-to-reverse-engineering-45b38370384
https://medium.com/swlh/intro-to-reverse-engineering-part-2-4087a70104e9
https://blog.usejournal.com/binary-exploitation-buffer-overflows-a9dc63e8b546
https://blog.usejournal.com/binary-exploitation-buffer-overread-c8561e7c47f1
https://medium.com/swlh/binary-exploitation-format-string-vulnerabilities-70edd501c5be
https://medium.com/swlh/binary-exploitation-data-execution-prevention-cc47edf2033b
https://medium.com/swlh/binary-exploitation-attacking-dynamic-linking-57d00ae56a83
https://medium.com/swlh/intro-to-reverse-engineering-45b38370384
https://medium.com/swlh/intro-to-reverse-engineering-part-2-4087a70104e9
https://blog.usejournal.com/binary-exploitation-buffer-overflows-a9dc63e8b546
https://blog.usejournal.com/binary-exploitation-buffer-overread-c8561e7c47f1
https://medium.com/swlh/binary-exploitation-format-string-vulnerabilities-70edd501c5be
https://medium.com/swlh/binary-exploitation-data-execution-prevention-cc47edf2033b
https://medium.com/swlh/binary-exploitation-attacking-dynamic-linking-57d00ae56a83
Medium
Intro to Reverse Engineering
Analyzing and Hacking Binaries with Ghidra.