Rating: 5.0
The microwave application is used to let your microwave tweets you favorite food.
We identified two vulnerabilities in the binary: a string format and a buffer overflow.
The string format allowed us to leak the canary and some addresses of the libc. Those
were then used to exploit the buffer overflow and access the flag.