Rating: 5.0

easy_register: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=ba448db2793d54d5ef48046ff85490b3b875831c, for GNU/Linux 3.2.0, not stripped

checksec --file easy_register
Arch: amd64-64-little
RELRO: Full RELRO
Stack: No canary found
NX: NX disabled
PIE: PIE enabled
RWX: Has RWX segments

NX disabled so we can write shellcode to the buffer, then overflow the return address with the leaked buffer address.

Full video walkthrough: [HERE](https://youtu.be/790lGRdyXaE)

Original writeup (https://www.youtube.com/watch?v=790lGRdyXaE).
Mohammad Zihad HossainDec. 17, 2022, 3:43 p.m.

K