This binary are 64 bit executable.
I check the binary security using checksec
And here's the look when executing the binary
It leaking some address. If we decompile it, we can see if it leaking user input's address.
The program also vulnerable to buffer overflow attack on the second input.
Because NX
protection was disabled, we can execute shellcode on the binary.
We need to find the address of our inputted string which are leaked on the program, then we need to find the exact buffer to overwriting the return address. After that we should find for appropriate shellcode and combine those all to gaining shell on the system.
You can use shellcode from this site