Rope

@Skajd said:
anyone know how to create perfect exploit for first step?
I don’t wanna brute force stack return address.

Any idea how to do it?

What if I told you there is no return address?