Task: Indirect Business
The indirect-business/support/buff-ovf
binary contains a classic vulnerability. Use the input to alter the data in your favor.
If you experience a neural buffer overflow, take a look at the relevant lab and at online examples.
If that still doesn’t work, keep in mind that the great cybersecurity expert named Sun Tzu was a big proponent of bruteforce attacks.