We should find flag in memory. Let’s try
I use this script for gdb.
I will use gdb-pwndbg
Looking at assembly code i can already say that EAX will have rbp-4 value
Let’s break at *main+15
and *main+22
and see
So now we don’t have anything interesting inside EAX:
So the flag is picoCTF{0x6bc96222}