BUFFER OVERFLOW
First open OllyDbg and then open the file select warFTP
after that you run and when warFTP already open then click run to start service on file.
BT then type in the command
after that you run and when warFTP already open then click run to start service on file.
BT then type in the command
after that run xfuzz.py
with the command python xfuzz.py
and look at the results
with the command python xfuzz.py
and look at the results
at the time of opening WarFTP without OllyDbg will appear a message like the following
open back OllyDbg then open the file select WarFTP and make a new user to add and then click ok
warFTP then run and type in your BT nc 192.168.56.101 21
then in another shell that you run xfuzz.py
then in another shell that you run xfuzz.py
And warFTP is lost here we can see how EIP
then type the following
and open it with kwrite type string_pattern.txt
and open it with kwrite type string_pattern.txt
and you can paste on xfuuz.py
with rules like this
then in the save
after that run back run back like previous perocess
currently existing in the memory registers warFTP application has been filled with a string that has been incorporated into the application fuzzerand here we can see the EIP has changed from the previous
by typing the following command
remember the s.send there is also changed to the value of EIP
xfuzz rerun with the same process
below we can see the value of EIP to change again
below we can see the value of EIP to change again
add more buffer + = "\ X90" * (493-len (buffer))
buffer + = "\ CC" * (1000-len (buffer))
then run back to the fuzzer as previously proceses
and note the value that appears in the registers and stack windows in illydbg will like this
OllyDbg then click on view and select the executable modules
will appear as below
will appear as below
then you can search the JMP ESP with right click --> search --> type in JMP ESP command and after that find
after that there are numbers on the JMP ESP 7C9D30D7
here you go again xfuzz.py
and you edit the buffer+= into the buffer+= "\ xD7 \ x30 \ x9D \ x7C"
here you go again xfuzz.py
and you edit the buffer+= into the buffer+= "\ xD7 \ x30 \ x9D \ x7C"
Here we see why the value of EIP does not turn into 7C9D30D7 ...?
EIP register value has changed to address that will be executed, to determine whether the address 7C9D30D7 have actually read the EIP register, it can be done to make breakpoint debugging process.
after that make payloadnya using msfweb
above you can select a category os :: win32after that you select the windows shell bind
Here you can fill in the following columns
the script below you can copy to xfuzz.py starting from * \ x
Tidak ada komentar:
Posting Komentar