Search:

Type: Posts; User: trojanrs; Keyword(s):

Search: Search took 0.00 seconds.

  1. Replies
    16
    Views
    4,627

    I've used the plugin you sugested and it worked...

    I've used the plugin you sugested and it worked like a charm!
    I've tested the exploit with the windows/exec payload and booom, calculator!

    Steps to a calculator =) :
    1- Insert attack string...
  2. Replies
    16
    Views
    4,627

    ok, I've created the binary file with a python...

    ok, I've created the binary file with a python script and checked it with an hex editor, everything was as I expected it to be, but when I ran the command the program crashed...
    Can I use this...
  3. Replies
    16
    Views
    4,627

    Yes, that's correct. I could not redirect the...

    Yes, that's correct.
    I could not redirect the output of that command to a file so I built a program(just gets input without any filters) in order to analise the memory after input. In fact, the...
  4. Replies
    16
    Views
    4,627

    lupin, the jump backwards assembly code worked! I...

    lupin, the jump backwards assembly code worked! I hardcoded it into immunity dbg though, since I think my string input method is a piece of...

    This is the code I'm using to send the string:

    ...
  5. Replies
    16
    Views
    4,627

    Thank you for the replies! I've also found the...

    Thank you for the replies!
    I've also found the offensive security's webcast very didactic, pretty good resource. Thank you lupin for the links provided, I'll study that and post the results of my...
  6. Replies
    42
    Views
    5,751

    You can use msfpescan -p [TARGET], the program...

    You can use msfpescan -p [TARGET], the program will search for POP POP RETs for you and show the addresses in the screen. =)
  7. Replies
    16
    Views
    4,627

    Thanks for the help F1gureF0ur! I've made this...

    Thanks for the help F1gureF0ur!
    I've made this script in order to generate the string and redirected its output to a file:


    import sys

    sys.stdout.write("\"")
    i = 1
    while i < 255:...
  8. Replies
    16
    Views
    4,627

    AWBO Buffer Overflow Exercise

    Hello,
    I'm pretty new to developing exploits and I'm trying the awbo exercises, which can be found at snort.org/vrt/tools/awbo.html ... I've successfully triggered the vulnerability (on the first...
Results 1 to 8 of 8