Safe

@putuamo You can get the app itself from the regular port. Poke around a little bit and you should find it.

I was able to get the app, offsets, and put together the start of an exploit based on IppSec’s Bitterman video, but having trouble reading data from the app when using pwntools. When I run the exploit I don’t get a seg fault anymore and it just exits normally. I read earlier posts about issues with the \n character and have tried several other methods of reading data, but no luck. Any hints on the right direction?