The remote service ask for a name, if you send more than 64 bytes, a memory leak happens.
The buffer next to the name's is the first random value used to init the srand()
If we get this value, and set our local srand([leaked] ^ [luckyNumber]) we will be able to predict the following randoms and win the game, but we have to see few details more ;)
The function used to read the input until the byte \n appears, but also up to 64 bytes, if we trigger this second condition there is not 0x00 and the print shows the random buffer :)
The nickname buffer:

The seed buffer:

So here it is clear, but let's see that the random values are computed with several gpu instructions which are decompiled incorrectly:


We tried to predict the random and aply the gpu divisions without luck :(

There was a missing detail in this predcitor, but there are always other creative ways to do the things.
We use the local software as a predictor, we inject the leaked seed on the local binary of the remote server and got a perfect syncronization, predicting the remote random values:

The process is a bit ugly becouse we combined automated process of leak exctraction and socket interactive mode, with the manual gdb macro.
The macro:
Related links
- Hacks And Tools
- Hack Tools
- Hacking Tools Windows
- Wifi Hacker Tools For Windows
- Hacking Tools Pc
- Pentest Automation Tools
- Hacking Tools Online
- Easy Hack Tools
- Hacking Tools Github
- Hacker Tools For Pc
- Pentest Tools Find Subdomains
- Hackrf Tools
- Pentest Tools Subdomain
- Hacking Tools For Beginners
- Hacker Tools For Pc
- Hack Tools 2019
- Pentest Box Tools Download
- Hacker Tools Online
- Hacking Tools Online
- Hacker Tools Hardware
- Hack And Tools
- Hacking Tools For Windows Free Download
- Hacker Tools Mac
- Hacker Search Tools
- Pentest Tools Framework
- Best Pentesting Tools 2018
- Pentest Tools Android
- Pentest Tools Find Subdomains
- Hack Tool Apk
- Best Hacking Tools 2019
- What Is Hacking Tools
- Hacker Tools Hardware
- Beginner Hacker Tools
- Hacking Tools Hardware
- How To Hack
- Hacking Tools 2020
- Pentest Tools Bluekeep
- Best Hacking Tools 2019
- How To Install Pentest Tools In Ubuntu
- World No 1 Hacker Software
- Pentest Tools Framework
- Pentest Tools Website
- Hacker Tools Software
- New Hacker Tools
- Hack Tools 2019
- Pentest Tools Url Fuzzer
- Hacking Tools Github
- Pentest Tools Website
- Hacks And Tools
- Hacking Tools For Pc
- Pentest Tools Bluekeep
- Pentest Tools Tcp Port Scanner
- Hackrf Tools
- Hack App
- Hack Tools For Pc
- Top Pentest Tools
- Hack Tools For Pc
- Hacker Tools 2019
- Hacker Tools For Pc
- Hacking Tools For Windows
- Hacker Tools
- Hackrf Tools
- Hacker Tools Software
- Pentest Tools Android
- Hacking Tools Windows
- Hacker Hardware Tools
- Black Hat Hacker Tools
- Pentest Reporting Tools
- Hacking App
- How To Install Pentest Tools In Ubuntu
- Pentest Automation Tools
- Hackrf Tools
- Hacking Tools 2019
- Pentest Tools Android
- Pentest Tools Android
- Nsa Hack Tools
- Hacking Tools For Games
- Pentest Tools For Ubuntu
- Tools Used For Hacking
- Hacker Tools Apk Download
- Pentest Tools Nmap
- Growth Hacker Tools
- Hacking Tools
- Hack Website Online Tool
- Hacker Tools Mac
- Hacker Tools Apk
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Find Subdomains
- Pentest Reporting Tools
- Pentest Tools Download
- Hacking Tools Free Download
- Hacker Tools For Pc
- What Are Hacking Tools
- Wifi Hacker Tools For Windows
- Pentest Tools Find Subdomains
- Pentest Tools Kali Linux
- Pentest Tools Open Source
- Pentest Tools Website
- Hacker Tools Online
- Hack Tools Github
- Hacker Techniques Tools And Incident Handling
- Computer Hacker
- Best Hacking Tools 2019
- Hacking Tools Github
- Hacker Tool Kit
- Pentest Tools For Mac
- Hack Tools 2019
- Hack Rom Tools
- Hacking Tools Mac
- Pentest Tools Linux
- Hack Rom Tools
- Hacking Tools Windows 10
- Hacking Apps
- Pentest Tools Bluekeep
- Hacking Tools For Kali Linux