Rating: 5.0
easy_register: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=ba448db2793d54d5ef48046ff85490b3b875831c, for GNU/Linux 3.2.0, not stripped
checksec --file easy_register
Arch: amd64-64-little
RELRO: Full RELRO
Stack: No canary found
NX: NX disabled
PIE: PIE enabled
RWX: Has RWX segments
NX disabled so we can write shellcode to the buffer, then overflow the return address with the leaked buffer address.
Full video walkthrough: [HERE](https://youtu.be/790lGRdyXaE)
K