Fortunately this library which I wrote few years ago could handle this. As the key size is 4-byte, we can easily find the password by brute-forcing. We can decode the string by incrementing the characters byte by byte. It can't be recognized by IDA but I loaded it as a binary file and somehow found the main routine. Thus, leave ret gadget will work as stack pivoting and rsp will move to.
Brinley. Age: 23.
I wrote a simple script to find the encryped disk.
Andrea. Age: 21.
☞ LENA HEADEY GIF HUNT
If we bypassed the SSP check in the first time, the 2nd byte of the canary is same as the least byte of. No one can beat my superb tic-tac-toe algorithm. They added this simple xor checker.