I'm doing this exercise on ROP and I'm given a stripped binary that when disassembled with ghidra gives
void secret(long num,char *str){
if(num == 1){
pass = strcmp(str, "Hewhewbrew")
if(pass == 0){
puts("you win!")
}
}
}
void io(){
char local_9;
fgets(&local_9, 0x3c, stdin);
return;
}
int main(){
setvbuf(stdin,NULL,2,0);
setvbuf(stdout,NULL,2,0);
puts("Enter input");
io();
return 0;
}
that's the gist of the source that I can gather, it's not the exact thing ghidra spits, but the code is so simple I can't think of anything in it to exploit