Skip to content

thibgil/buffer-overflow-scripts

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

Buffer Overflow Scripts & Learning

Useful Links

OSCP Prep on THM

Access the Windows machine

  • RDP access to the Windows machine (On Archlinux with Rdesktop)
rdesktop -u admin -p password 10.10.18.138:3389

On the Windows target

  • Start Immunity Debugger on the Windows machine and open the OSCP exe file
  • Run the exe in debug mode

On our box

  • Now able to call the binary (exposed on port 1337) from the attacker's box with:
nc 10.10.18.138 1337

Buffer Overflow Steps

1. Fuzzing

2. Crash Replication & Controlling EIP

3. Finding Bad Characters

4. Finding a Jump Point

5. Generate Payload

6. Prepend NOPs

7. Exploit

Repository Guide

  • In python-scripts you can find some TryHackMe scripts example in order to make all differents Buffer Overflow steps
  • In rust-scripts you will see my alternative written in Rust

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages