- TryHackMe OSCP Prep: https://tryhackme.com/r/room/bufferoverflowprep
- Tib3rius Buffer Overflow Guide: https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst
- RDP access to the Windows machine (On Archlinux with Rdesktop)
rdesktop -u admin -p password 10.10.18.138:3389
- Start Immunity Debugger on the Windows machine and open the OSCP exe file
- Run the exe in debug mode
- Now able to call the binary (exposed on port 1337) from the attacker's box with:
nc 10.10.18.138 1337
- In
python-scripts
you can find some TryHackMe scripts example in order to make all differents Buffer Overflow steps - In
rust-scripts
you will see my alternative written in Rust