Tags: stack_overflow ret2libc 

Rating:

This challenge has a `stack overflow` vulnerability, by which you can overwrite the return address. Then, using `return to libc` (`ret2libc`), you are able to spawn `/bin/sh`.

Original writeup (https://github.com/sajjadium/ctf-writeups/tree/master/TAMUctf/2019/pwn5).