/
..
#
CONTENT
#
TOP
#
c to shellcode
It is quite common in pwn problems to accept shellcode from the attacker to run,