These attacks involve insertion of malicious code within a program’s memory space. Can allow for unauthorized access and execution of arbitrary commands.

Can be exploited through use of forensics toolkits.

Examples