This paper demonstrates and discusses the logic behind the well known buffer overflow exploit on a windows based system.