Skip to content

buffer overflow 0

void vuln(char *input){
  char buf2[16];
  strcpy(buf2, input);
}

An input with 20+ bytes results in SIGSEGV, whose handler prints the flag