Unveiling the Tactics: How Hackers Exploit Memory Corruption Vulnerabilities