# stack cache

## Challenge

Undefined behaviours are fun. It looks like Dr. Oswal allowed buffer overflows again. Analyse this [program](https://github.com/HHousen/PicoCTF-2022/blob/master/Binary%20Exploitation/stack%20cache/vuln/README.md) to identify how you can get to the flag. You can view source [here](https://github.com/HHousen/PicoCTF-2022/blob/master/Binary%20Exploitation/stack%20cache/vuln.c). And connect with it using `nc saturn.picoctf.net 63957`

## Solution

Please see the solution [script.py](https://github.com/HHousen/PicoCTF-2022/blob/master/Binary%20Exploitation/stack%20cache/script.py).

### Flag

`picoCTF{Cle4N_uP_M3m0rY_8d5089b9}`
