In this writeup we will see how to run and debug a mips binary and how to exploit a simple buffer overflow.
mips