Buffer overflows, a condition where attacker-controlled input overwrites program data, are consistently being used in large-scale attacks, including Stuxnet in 2011 and WannaCry in 2017. In this interactive presentation we will demonstrate how to test for and craft buffer overflows, even without an application's source code. Then we will alternately introduce more exploit mitigations, including ASLR, NX, and Stack Canaries, and demonstrate how to bypass each one of them -- all with live demos! Materials at github.com/parkergarrison/overflow