Tags: brop
Rating: 5.0
See this article for more detail. First bruteforce stack layout, then search for ROP gadgets, then find a write function, leak binary, and then finally get shell and profit.
https://thekidofarcrania.gitlab.io/2019/03/12/utctf/
I don't remember