We simply send 0x28 junk bytes + ret gadget + win_win function address(win_win is a function executing cat flag.txt whilst the ret gadget is for stack alignment)
For some reason I had to put an interactive session just when I connected to the server and hit control c so that the exploit continued in order for it to work...