Safe

Type your comment> @darkkilla said:

Hint for people stuck at finding the right technique to exploit the binary: Google the question the binary outputs and you will find a very similar example from a CTF where also the technique is mentioned and partially explained.

Thx. Found it. But in this case if we really have to do R**, this box should be at least a medium one…