# buffer overflow 1

## Challenge

Control the return address. Now we're cooking! You can overflow the buffer and return to the flag function in the [program](https://github.com/HHousen/PicoCTF-2022/blob/master/Binary%20Exploitation/buffer%20overflow%201/vuln/README.md). You can view source [here](https://github.com/HHousen/PicoCTF-2022/blob/master/Binary%20Exploitation/buffer%20overflow%201/vuln.c). And connect with it using `nc saturn.picoctf.net 62849`

## Solution

This is a basic buffer overflow where we overwrite the return address of `vuln` to the address of `win`. See the exploit [script.py](https://github.com/HHousen/PicoCTF-2022/blob/master/Binary%20Exploitation/buffer%20overflow%201/script.py) for more information.

### Flag

`picoCTF{addr3ss3s_ar3_3asy_ad2f467b}`
