Tags: pwn
Rating: 5.0
Leak stack canary --> buffer overflow --> ROP to open, read, write --> flag
[writeup](https://blog.mmaekr.com/2020/05/23/m0lecon-ctf-knife/)
In your original writeup you said that you analyze the decompilation.
Does it mean you reverse engineering the file?