Skip to content

Latest commit

 

History

History
37 lines (29 loc) · 1.08 KB

README.md

File metadata and controls

37 lines (29 loc) · 1.08 KB

Buffer Overflow Scripts & Learning

Useful Links

OSCP Prep on THM

Access the Windows machine

  • RDP access to the Windows machine (On Archlinux with Rdesktop)
rdesktop -u admin -p password 10.10.18.138:3389

On the Windows target

  • Start Immunity Debugger on the Windows machine and open the OSCP exe file
  • Run the exe in debug mode

On our box

  • Now able to call the binary (exposed on port 1337) from the attacker's box with:
nc 10.10.18.138 1337

Buffer Overflow Steps

1. Fuzzing

2. Crash Replication & Controlling EIP

3. Finding Bad Characters

4. Finding a Jump Point

5. Generate Payload

6. Prepend NOPs

7. Exploit

Repository Guide

  • In python-scripts you can find some TryHackMe scripts example in order to make all differents Buffer Overflow steps
  • In rust-scripts you will see my alternative written in Rust